This specialization is intended for intermediate level learners with basic programming skills and basic cybersecurity knowledge. Through this course learner will learn about advanced secure software techniques such as those for cloud computing, TOR, web-based cryptography, and geo-location/context based access control. With these techniques, learners will be better prepared to implement new security and privacy preserving data security features, to perform secure system design and implementation, vulnerability analysis, and Securely Provision (SP), Operate and Maintain (OM), Oversee and Govern (OV), Protect and Defend (PR), Analyze (AN), Collect and Operate (CO), and investigate (IN) tasks.
With high available AWS load balancing cluster project, the learners apply the knowledge and skills of cloud computing security to demonstrate the abilities to create high available secure systems; with anonymous TOR browser and hidden server project, the learners apply the knowledge and skills of security and privacy in censorship resistance systems to protect the anonymity of the users or servers; with secure geo-coding project, the learners apply apply the knowledge and skills of RBAC/ABAC and context-aware access controls to implement secure data delivery service using web crypto and geolocaiton API.
Basic computer science background
Basic computer science background
The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.
What is the refund policy?
If you subscribed, you get a 7-day free trial during which you can cancel at no penalty. After that, we don’t give refunds, but you can cancel your subscription at any time. See our full refund policy.
Can I just enroll in a single course?
Yes! To get started, click the course card that interests you and enroll. You can enroll and complete the course to earn a shareable certificate, or you can audit it to view the course materials for free. When you subscribe to a course that is part of a Specialization, you’re automatically subscribed to the full Specialization. Visit your learner dashboard to track your progress.
Is financial aid available?
Yes, Coursera provides financial aid to learners who cannot afford the fee. Apply for it by clicking on the Financial Aid link beneath the "Enroll" button on the left. You'll be prompted to complete an application and will be notified if you are approved. You'll need to complete this step for each course in the Specialization, including the Capstone Project. Learn more.
Can I take the course for free?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. If you only want to read and view the course content, you can audit the course for free. If you cannot afford the fee, you can apply for financial aid.
Is this course really 100% online? Do I need to attend any classes in person?
This course is completely online, so there’s no need to show up to a classroom in person. You can access your lectures, readings and assignments anytime and anywhere via the web or your mobile device.
How long does it take to complete the Specialization?
What background knowledge is necessary?
Know one high level programming language, basic Unix system commands, and discrete mathematics in particular the number theory. knowledge of basic cybersecurity will help, e.g., those in the Fundamentals of Computer Network Security Specialization.
Do I need to take the courses in a specific order?
No. These four MOOCs are pretty much independent.
Will I earn university credit for completing the Specialization?
No. But It will help you prepare to complete related university cybersecurity classes.
What will I be able to do upon completing the Specialization?
You should be able to develop advanced secure software tools and high available systems using cloud computing, TOR, and web-based crypto API.
You will know how to implement new security and privacy preserving data security features including how to ensure data is requested and delivered to a specific location and over a specific path.
You will know how to perform secure system design and implementation, vulnerability analysis.
You will have better KSAs in performing Securely Provision (SP), Operate and Maintain (OM), Oversee and Govern (OV), Protect and Defend (PR), Analyze (AN), Collect and Operate (CO), and investigate (IN) tasks.