このコースについて

100%オンライン

自分のスケジュールですぐに学習を始めてください。

柔軟性のある期限

スケジュールに従って期限をリセットします。

初級レベル

約12時間で修了

推奨:7 hours/week...

英語

字幕:英語

100%オンライン

自分のスケジュールですぐに学習を始めてください。

柔軟性のある期限

スケジュールに従って期限をリセットします。

初級レベル

約12時間で修了

推奨:7 hours/week...

英語

字幕:英語

シラバス - 本コースの学習内容

1
4時間で修了

Enhance Security with Geolocation

In this module, we discuss the geoencryption techniques, the issues in the design and analysis of a Secure Enhanced Geolocking system for protected encrypted info with geolocking. We learn the web based implementation of an Secure Enhancing Geolocking system using Javascript with Google Map API and CryptoJS API.

...
3件のビデオ (合計20分), 2 readings, 5 quizzes
3件のビデオ
Lesson 4.2 Secure Enhanced Geolocking8 分
Ensure Data Delivery to Right Location2 分
2件の学習用教材
Read the seminal location based encryption paper by Scott Logan and Dorothy E. Denning.1 時間
Read SEG master project report by Ashish Korpe1 時間
4の練習問題
L1.1 Practice Quiz10 分
L1.2. Practice Quiz15 分
L1.3. Practice Quiz9 分
Quiz: M1 quiz20 分
2
3時間で修了

Enhance Security with Network and Context Information

In this module, we learn the techniques for using WiFi or BLE signals to estimate the geolocation of a user. We also show the technique where the value added Software Defined Network services can be used to ensure the data are delivered through a designated path to the right location.

...
3件のビデオ (合計14分), 3 readings, 4 quizzes
3件のビデオ
Location Verification Using Bluetooth Low Energy Devices5 分
Right Path Right Place Data Delivery3 分
3件の学習用教材
Read the following papers related to Right Place Verification30 分
Read paper on using RSSI measurement of BLE devices for localization30 分
Read R2D2 paper on BLE location verification and SDN Data Path Confidence Analysis40 分
4の練習問題
L2.1 Practice Quiz9 分
L2.2. Practice Quiz12 分
L2.3 Practice Quiz9 分
M2 quiz30 分
3
3時間で修了

Authentication and Role Based Access Control

In this module, we discuss the definition of the authentication, the types of authentication credentials, and the authentication process and related requirements. we learn the Role Based Access Control, short for RBAC, which is an security approach to restricting system access to authorized users and to help specify organization's security policies reflecting its organizational structure. We use Docker Universal Control Plan and AWS IAM access control as examples for illustrating how RBAC simplifies the access control specification and management.

...
4件のビデオ (合計24分), 4 readings, 4 quizzes
4件のビデオ
Digital Certificate Creation7 分
Role Based Access Control (RBAC)4 分
RBAC Examples: Docker UCP and AWS IAM5 分
4件の学習用教材
Watch OAuth presentation.1 時間
Read how digital certificates are created for secure web access15 分
Reading assignments for RBAC.20 分
Read Docker and AWS RBAC support example.10 分
4の練習問題
L3.1 Practice Quiz8 分
L3.2 Practice Quiz8 分
L3.3 Practice Quiz8 分
M3 Quiz30 分
4
3時間で修了

Authorization and Attribute Based Access Control

In this module, we discuss PMI Privilege Management Infrastructure for managing the authorization of privileges within a system. We use attribute certificates as an instrument to associate access rights of the resources/services in the system to the identities or roles of the intended users of the system. We compare the differences between the PKI, the public key infrastructure which is focused on identity management, with the PMI which is focused on the management of the privileges authorized for users. We discuss their difference usages for the access control of the system. We then present the XACML, which is an eXtensible Access Control Markup Language (XACML) for specifying policies. It is an attribute-based access control system (ABAC), where attributes associated with a user or action or resource are inputs into the decision of whether a given user may access a given resource in a particular way. An implementation of ABAC system using Sun’s XACML 2.0 Java reference implementation called ENFORCE is then presented as an example.

...
4件のビデオ (合計23分), 3 readings, 4 quizzes
4件のビデオ
eXtensible Access Control Markup Language (XACML)4 分
Attribute Based Access Control4 分
Enforce Testbed as an ABAC Example6 分
3件の学習用教材
Read the following paper which utilize attribute certificates for secure information sharing.1 時間
Read key sections of OASIS Standard XACML version 3.020 分
Read Osama Khaleel's master thesis on Implementing an ABAC system with XACML 2.020 分
4の練習問題
L4.1 Practice Quiz8 分
L4.2 Practice Quiz16 分
Quiz L4.3 Practice Quiz6 分
M4 Quiz30 分

講師

Avatar

Edward Chow

Professor
Computer Science
Avatar

Greg Williams

Lecturer
Department of Computer Science
Avatar

Richard White

Assistant Research Professor
Computer Science

University of Colorado Systemについて

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

Advanced System Security Designの専門講座について

This specialization is intended for intermediate level learners with basic programming skills and basic cybersecurity knowledge. Through this course learner will learn about advanced secure software techniques such as those for cloud computing, TOR, web-based cryptography, and geo-location/context based access control. With these techniques, learners will be better prepared to implement new security and privacy preserving data security features, to perform secure system design and implementation, vulnerability analysis, and Securely Provision (SP), Operate and Maintain (OM), Oversee and Govern (OV), Protect and Defend (PR), Analyze (AN), Collect and Operate (CO), and investigate (IN) tasks....
Advanced System Security Design

よくある質問

  • 修了証に登録すると、すべてのビデオ、テスト、およびプログラミング課題(該当する場合)にアクセスできます。ピアレビュー課題は、セッションが開始してからのみ、提出およびレビューできます。購入せずにコースを検討することを選択する場合、特定の課題にアクセスすることはできません。

  • コースに登録する際、専門講座のすべてのコースにアクセスできます。コースの完了時には修了証を取得できます。電子修了証が成果のページに追加され、そこから修了証を印刷したり、LinkedInのプロフィールに追加したりできます。コースの内容の閲覧のみを希望する場合は、無料でコースを聴講できます。

さらに質問がある場合は、受講者向けヘルプセンターにアクセスしてください。