This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical schema.
Acerca de este Curso
Habilidades que obtendrás
- 5 stars81,66 %
- 4 stars15 %
- 3 stars2 %
- 2 stars0,83 %
- 1 star0,50 %
Principales reseñas sobre CYBER ATTACK COUNTERMEASURES
I like how Dr. Amoroso made some complicated concept sounds easy. I also love when he told us about the history of cyber security in this course.
Instructor makes it easy to understand and keeps it interesting. Especially enjoy the talks and due credits to the unsung hero's of the early cyber security scene.
This is an excellent course with enough historical context for those who are not familiar with cybersecurity and good videos and current developments in the field.
Fantastic job by Dr. Amoroso as always. SImple, lucid and succinct explanation of complex subject matter with a personal touch.
Acerca de Programa especializado: Introduction to Cyber Security
¿Cuándo podré acceder a las lecciones y tareas?
¿Qué recibiré si me suscribo a este Programa especializado?
¿Hay ayuda económica disponible?
¿Tienes más preguntas? Visita el Centro de Ayuda al Estudiante.