Informações sobre o curso
1,372

100% online

Comece imediatamente e aprenda em seu próprio cronograma.

Prazos flexíveis

Redefinir os prazos de acordo com sua programação.

Nível intermediário

Aprox. 10 horas para completar

Sugerido: 15 hours/week...

Inglês

Legendas: Inglês

100% online

Comece imediatamente e aprenda em seu próprio cronograma.

Prazos flexíveis

Redefinir os prazos de acordo com sua programação.

Nível intermediário

Aprox. 10 horas para completar

Sugerido: 15 hours/week...

Inglês

Legendas: Inglês

Programa - O que você aprenderá com este curso

Semana
1
5 horas para concluir

The Onion Routing (TOR)

In this module, we learn the basic concepts of Tor network for protecting the privacy of Tor users and how to use the Tor browser features to access the web sites while preserving the anonimity, change the entry guard and exit node of the Tor circuit, learn how to setup Tor software package on a Linux machine and start its service, and use torify to run network commands, such as ssh or curl command, but use a Tor circuit as an outgoing connection...
4 vídeos (total de (Total 24 mín.) min), 3 leituras, 4 testes
4 videos
TOR Basic Concepts6min
Realize Anonymity in TOR4min
Sniper Attack on TOR10min
3 leituras
TEDTalk: The Tor Project, protecting online anonimity18min
Basic TOR Concepts10min
The Sniper Attacks: Anonymously deanonymizing and disabling the Tor network10min
3 exercícios práticos
L1.1 Practice Quiz8min
L1.2 Practice Quiz8min
M1 Exam15min
Semana
2
5 horas para concluir

Hidden Service on TOR and their Attacks

In this module, we learn how the hidden service architecture and protocol work, and how to set up the hidden server to provide network services on the Tor network without revealing the public IP address. We also learn the best practice of managing the hidden server anonymously and hide the version information of web server, OS, and installed software packages....
3 vídeos (total de (Total 20 mín.) min), 1 leitura, 3 testes
3 videos
Defense Against Deanonymizing Attack5min
Cloud Based TOR9min
1 leituras
Setup procedures and Best Practices for Hosting Onion Services10min
2 exercícios práticos
L2.1 Practice Quiz15min
M2 Exam20min
Semana
3
4 horas para concluir

Censorship Systems

In this module we learn the basic components of the censorship systems, the censor model and the related challenges. We learn to define the censor's sphere of influence and sphere of visibility, and their impact on the techniques that can be deployed by the censorship systems. We will be able to describe the basic components of the censor's attack model, explain different fingerprinting methods and evaluating their strength and weakness. We will study different direct censorship method and learn the limitations imposed upon the range of censorship actions. ...
5 vídeos (total de (Total 35 mín.) min), 5 leituras, 6 testes
5 videos
L3-2 CS6910 Censor Attack Model and Apparatus10min
L3-3 Fingerprinting6min
L3-4. Direct Censorship4min
L3.5. Range of Censorship Actions5min
5 leituras
Read Section 1 of "SoK: Making Sense of Censorship Resistance Systems"10min
Read censorship apparatus model and censor's attack model10min
L3-3. Fingerprinting.10min
L3.4. Direct Censorship10min
L3.5. Range of Censorship Actions10min
6 exercícios práticos
L1 Practice Quiz8min
L3.2 Practice Quiz8min
L3.3 Practice Quiz8min
L3.4 Practice Quiz8min
L3.5 Practice Quiz8min
M3 Exams
Semana
4
4 horas para concluir

Censorship Resistance System (CRS)

In this module, we will learn the two main functional components of censorship resistance system (CRS) and explain the steps to establish the CRS communications. We will understand the operating requirements for establishing the CRS communications and learn the techniques for hiding information and avoid tracking using CRS channels. We will learn the basic CRS properties shared by CRS' and their purposes. We will comprehend different methods for obtaining CRS credentials and reduce faking/testing of them. We will be able to deploy different schemes for resisting active probing, identify different schemes to establish user trust. We will learn how to implement methods for evading censor detection and blocking. We will understand various methods for protecting publisher information and current open and active CRS research areas....
5 vídeos (total de (Total 28 mín.) min), 5 leituras, 6 testes
5 videos
L4.2. CRS Properties11min
L4.3. Techniques for CRS Communication Establishment Phase3min
L4.4. Techniques for CRS Conversation Phase.4min
L4.5. Open CRS Research Areas3min
5 leituras
L4.1. Censorship Resistancde System Overview10min
L4.2. CRS Properties.10min
L4.3. Techniques for Communication Establishment Phase .10min
L4.4. Techniques for Conversation Phase10min
L4.5. Open Areas and Research Challenges.10min
6 exercícios práticos
L4.1 Practice Quiz8min
L4.2 Practice Quiz8min
L4.3 Practice Quiz8min
L4.4 Practice Quiz8min
L4.5 Practice Quiz4min
M4 Exams

Instrutores

Avatar

Edward Chow

Professor
Computer Science
Avatar

Greg Williams

Lecturer
Department of Computer Science
Avatar

Richard White

Assistant Research Professor
Computer Science

Sobre Sistema de Universidades do ColoradoUniversidade do Colorado

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

Sobre o Programa de cursos integrados Advanced System Security Design

This specialization is intended for intermediate level learners with basic programming skills and basic cybersecurity knowledge. Through this course learner will learn about advanced secure software techniques such as those for cloud computing, TOR, web-based cryptography, and geo-location/context based access control. With these techniques, learners will be better prepared to implement new security and privacy preserving data security features, to perform secure system design and implementation, vulnerability analysis, and Securely Provision (SP), Operate and Maintain (OM), Oversee and Govern (OV), Protect and Defend (PR), Analyze (AN), Collect and Operate (CO), and investigate (IN) tasks....
Advanced System Security Design

Perguntas Frequentes – FAQ

  • Ao se inscrever para um Certificado, você terá acesso a todos os vídeos, testes e tarefas de programação (se aplicável). Tarefas avaliadas pelos colegas apenas podem ser enviadas e avaliadas após o início da sessão. Caso escolha explorar o curso sem adquiri-lo, talvez você não consiga acessar certas tarefas.

  • Quando você se inscreve no curso, tem acesso a todos os cursos na Especialização e pode obter um certificado quando concluir o trabalho. Seu Certificado eletrônico será adicionado à sua página de Participações e você poderá imprimi-lo ou adicioná-lo ao seu perfil no LinkedIn. Se quiser apenas ler e assistir o conteúdo do curso, você poderá frequentá-lo como ouvinte sem custo.

Mais dúvidas? Visite o Central de Ajuda ao Aprendiz.