This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical schema.
About this Course
Skills you will gain
- 5 stars81.86%
- 4 stars14.68%
- 3 stars2.07%
- 2 stars0.86%
- 1 star0.51%
TOP REVIEWS FROM CYBER ATTACK COUNTERMEASURES
Great info, well-chosen readings, wish there were more practice problems. Assignments and quizzes are good for a Coursera course, but not great.
Great introduction to some common mechanisms, such as cryptography, which can be used to thwart cyber attacks.
I like how Dr. Amoroso made some complicated concept sounds easy. I also love when he told us about the history of cyber security in this course.
Very Beneficial Course and its documentations! Great service and education portal under the direction of Professor Edward.
About the Introduction to Cyber Security Specialization
Frequently Asked Questions
When will I have access to the lectures and assignments?
What will I get if I subscribe to this Specialization?
Is financial aid available?
More questions? Visit the Learner Help Center.