This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical schema.
제공자:
이 강좌에 대하여
직원에게 수요가 높은 기술을 교육하면 회사가 이점을 얻을 수 있습니까?
비즈니스를 위한 Coursera 경험해 보기귀하가 습득할 기술
- Cybersecurity
- Cryptography
- Public-Key Cryptography
직원에게 수요가 높은 기술을 교육하면 회사가 이점을 얻을 수 있습니까?
비즈니스를 위한 Coursera 경험해 보기강의 계획표 - 이 강좌에서 배울 내용
Cyber Security Safeguards
Understanding Authentication Protocols
Introducing Conventional Cryptography
Overview of Public Key Cryptographic Methods
검토
- 5 stars81.66%
- 4 stars15%
- 3 stars2%
- 2 stars0.83%
- 1 star0.50%
CYBER ATTACK COUNTERMEASURES의 최상위 리뷰
I like how Dr. Amoroso made some complicated concept sounds easy. I also love when he told us about the history of cyber security in this course.
Instructor makes it easy to understand and keeps it interesting. Especially enjoy the talks and due credits to the unsung hero's of the early cyber security scene.
This is an excellent course with enough historical context for those who are not familiar with cybersecurity and good videos and current developments in the field.
Fantastic job by Dr. Amoroso as always. SImple, lucid and succinct explanation of complex subject matter with a personal touch.
Introduction to Cyber Security 특화 과정 정보

자주 묻는 질문
강의 및 과제를 언제 이용할 수 있게 되나요?
이 전문 분야를 구독하면 무엇을 이용할 수 있나요?
재정 지원을 받을 수 있나요?
궁금한 점이 더 있으신가요? 학습자 도움말 센터를 방문해 보세요.