In this MOOC, we learn RBAC and ABAC access control to facilitate the specification and management of access policies. We learn examples of how RBAC is supported by modern systems such as Docker and AWS IAM. We learn XACML 3.0 and an ABAC implementation for controling secure access to web documents and network resources with attribute certificates, and XACML architecture components. We show how to exhance the data security with GeoEncryption, Secure Enhanced Geolocking, and R2D2 concepts which deliver data to right places via right path. We show how Google Map and Web Crytpo
Informações sobre o curso
Sistema de Universidades do ColoradoUniversidade do Colorado
The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.
- 5 stars
- 4 stars
- 3 stars
- 2 stars
- 1 star
Principais avaliações do ADVANCED SYSTEM SECURITY TOPICS
Thanks Coursera for this course but i am not happy because in mt certificate my name is change so please help me to change my name
Quality learning materials. Enjoyed the cryptography systems introduction, especially the one based on GPS coordinates.
this is good , but i think it's gonna be better by including subtitle inside a video.
Very Good source for beginners and intermediate kb.
Sobre Programa de cursos integrados Advanced System Security Design
This specialization is intended for intermediate level learners with basic programming skills and basic cybersecurity knowledge. Through this course learner will learn about advanced secure software techniques such as those for cloud computing, TOR, web-based cryptography, and geo-location/context based access control. With these techniques, learners will be better prepared to implement new security and privacy preserving data security features, to perform secure system design and implementation, vulnerability analysis, and Securely Provision (SP), Operate and Maintain (OM), Oversee and Govern (OV), Protect and Defend (PR), Analyze (AN), Collect and Operate (CO), and investigate (IN) tasks.
Perguntas Frequentes – FAQ
Quando terei acesso às palestras e às tarefas?
O que recebo ao me inscrever nesta Especialização?
Is financial aid available?
Mais dúvidas? Visite o Central de Ajuda ao Aprendiz.