このコースについて

100%オンライン

自分のスケジュールですぐに学習を始めてください。

柔軟性のある期限

スケジュールに従って期限をリセットします。

中級レベル

英語

字幕:英語

100%オンライン

自分のスケジュールですぐに学習を始めてください。

柔軟性のある期限

スケジュールに従って期限をリセットします。

中級レベル

英語

字幕:英語

シラバス - 本コースの学習内容

1
5時間で修了

The Onion Routing (TOR)

In this module, we learn the basic concepts of Tor network for protecting the privacy of Tor users and how to use the Tor browser features to access the web sites while preserving the anonimity, change the entry guard and exit node of the Tor circuit, learn how to setup Tor software package on a Linux machine and start its service, and use torify to run network commands, such as ssh or curl command, but use a Tor circuit as an outgoing connection

...
4件のビデオ (合計24分), 3 readings, 4 quizzes
4件のビデオ
TOR Basic Concepts6 分
Realize Anonymity in TOR4 分
Sniper Attack on TOR10 分
3件の学習用教材
TEDTalk: The Tor Project, protecting online anonimity18 分
Basic TOR Concepts10 分
The Sniper Attacks: Anonymously deanonymizing and disabling the Tor network10 分
3の練習問題
L1.1 Practice Quiz8 分
L1.2 Practice Quiz8 分
M1 Exam15 分
2
5時間で修了

Hidden Service on TOR and their Attacks

In this module, we learn how the hidden service architecture and protocol work, and how to set up the hidden server to provide network services on the Tor network without revealing the public IP address. We also learn the best practice of managing the hidden server anonymously and hide the version information of web server, OS, and installed software packages.

...
3件のビデオ (合計20分), 1 reading, 3 quizzes
3件のビデオ
Defense Against Deanonymizing Attack5 分
Cloud Based TOR9 分
1件の学習用教材
Setup procedures and Best Practices for Hosting Onion Services10 分
2の練習問題
L2.1 Practice Quiz15 分
M2 Exam20 分
3
4時間で修了

Censorship Systems

In this module we learn the basic components of the censorship systems, the censor model and the related challenges. We learn to define the censor's sphere of influence and sphere of visibility, and their impact on the techniques that can be deployed by the censorship systems. We will be able to describe the basic components of the censor's attack model, explain different fingerprinting methods and evaluating their strength and weakness. We will study different direct censorship method and learn the limitations imposed upon the range of censorship actions.

...
5件のビデオ (合計35分), 5 readings, 6 quizzes
5件のビデオ
L3-2 CS6910 Censor Attack Model and Apparatus10 分
L3-3 Fingerprinting6 分
L3-4. Direct Censorship4 分
L3.5. Range of Censorship Actions5 分
5件の学習用教材
Read Section 1 of "SoK: Making Sense of Censorship Resistance Systems"10 分
Read censorship apparatus model and censor's attack model10 分
L3-3. Fingerprinting.10 分
L3.4. Direct Censorship10 分
L3.5. Range of Censorship Actions10 分
6の練習問題
L1 Practice Quiz8 分
L3.2 Practice Quiz8 分
L3.3 Practice Quiz8 分
L3.4 Practice Quiz8 分
L3.5 Practice Quiz8 分
M3 Exam2 時間
4
4時間で修了

Censorship Resistance System (CRS)

In this module, we will learn the two main functional components of censorship resistance system (CRS) and explain the steps to establish the CRS communications. We will understand the operating requirements for establishing the CRS communications and learn the techniques for hiding information and avoid tracking using CRS channels. We will learn the basic CRS properties shared by CRS' and their purposes. We will comprehend different methods for obtaining CRS credentials and reduce faking/testing of them. We will be able to deploy different schemes for resisting active probing, identify different schemes to establish user trust. We will learn how to implement methods for evading censor detection and blocking. We will understand various methods for protecting publisher information and current open and active CRS research areas.

...
5件のビデオ (合計28分), 5 readings, 6 quizzes
5件のビデオ
L4.2. CRS Properties11 分
L4.3. Techniques for CRS Communication Establishment Phase3 分
L4.4. Techniques for CRS Conversation Phase.4 分
L4.5. Open CRS Research Areas3 分
5件の学習用教材
L4.1. Censorship Resistancde System Overview10 分
L4.2. CRS Properties.10 分
L4.3. Techniques for Communication Establishment Phase .10 分
L4.4. Techniques for Conversation Phase10 分
L4.5. Open Areas and Research Challenges.10 分
6の練習問題
L4.1 Practice Quiz8 分
L4.2 Practice Quiz8 分
L4.3 Practice Quiz8 分
L4.4 Practice Quiz8 分
L4.5 Practice Quiz4 分
M4 Exam2 時間

講師

Avatar

Edward Chow

Professor
Computer Science
Avatar

Greg Williams

Lecturer
Department of Computer Science
Avatar

Richard White

Assistant Research Professor
Computer Science

University of Colorado Systemについて

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

Advanced System Security Designの専門講座について

This specialization is intended for intermediate level learners with basic programming skills and basic cybersecurity knowledge. Through this course learner will learn about advanced secure software techniques such as those for cloud computing, TOR, web-based cryptography, and geo-location/context based access control. With these techniques, learners will be better prepared to implement new security and privacy preserving data security features, to perform secure system design and implementation, vulnerability analysis, and Securely Provision (SP), Operate and Maintain (OM), Oversee and Govern (OV), Protect and Defend (PR), Analyze (AN), Collect and Operate (CO), and investigate (IN) tasks....
Advanced System Security Design

よくある質問

  • 修了証に登録すると、すべてのビデオ、テスト、およびプログラミング課題(該当する場合)にアクセスできます。ピアレビュー課題は、セッションが開始してからのみ、提出およびレビューできます。購入せずにコースを検討することを選択する場合、特定の課題にアクセスすることはできません。

  • コースに登録する際、専門講座のすべてのコースにアクセスできます。コースの完了時には修了証を取得できます。電子修了証が成果のページに追加され、そこから修了証を印刷したり、LinkedInのプロフィールに追加したりできます。コースの内容の閲覧のみを希望する場合は、無料でコースを聴講できます。

さらに質問がある場合は、受講者向けヘルプセンターにアクセスしてください。