This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical schema.
Acerca de este Curso
Habilidades que obtendrás
- 5 stars82,04 %
- 4 stars14,96 %
- 3 stars1,76 %
- 2 stars0,70 %
- 1 star0,52 %
Principales reseñas sobre CYBER ATTACK COUNTERMEASURES
This course as improved my knowledge in cybersecurity. I wonderfully presented course that I really enjoyed doing.
Really good content especially in explaining public key cryptography. Not sure why there is peer review for the final (it's a short multiple choice quiz), but it worked out ok since I finished early.
Fantastic job by Dr. Amoroso as always. SImple, lucid and succinct explanation of complex subject matter with a personal touch.
Would like to see more current videos (within last 5 years!) though I do appreciate that the information shared is still relevant.
Acerca de Programa especializado: Introduction to Cyber Security
¿Cuándo podré acceder a las lecciones y tareas?
¿Qué recibiré si me suscribo a este Programa especializado?
¿Hay ayuda económica disponible?
¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.