課程信息

第 3 門課程(共 4 門)

100% 在線

立即開始,按照自己的計劃學習。

可靈活調整截止日期

根據您的日程表重置截止日期。

中級

完成時間大約為13 小時

建議:9 hours/week...

英語(English)

字幕:英語(English)

第 3 門課程(共 4 門)

100% 在線

立即開始,按照自己的計劃學習。

可靈活調整截止日期

根據您的日程表重置截止日期。

中級

完成時間大約為13 小時

建議:9 hours/week...

英語(English)

字幕:英語(English)

教學大綱 - 您將從這門課程中學到什麼

1
完成時間為 5 小時

The Onion Routing (TOR)

In this module, we learn the basic concepts of Tor network for protecting the privacy of Tor users and how to use the Tor browser features to access the web sites while preserving the anonimity, change the entry guard and exit node of the Tor circuit, learn how to setup Tor software package on a Linux machine and start its service, and use torify to run network commands, such as ssh or curl command, but use a Tor circuit as an outgoing connection...
4 個視頻 (總計 24 分鐘), 3 個閱讀材料, 4 個測驗
4 個視頻
TOR Basic Concepts6分鐘
Realize Anonymity in TOR4分鐘
Sniper Attack on TOR10分鐘
3 個閱讀材料
TEDTalk: The Tor Project, protecting online anonimity18分鐘
Basic TOR Concepts10分鐘
The Sniper Attacks: Anonymously deanonymizing and disabling the Tor network10分鐘
3 個練習
L1.1 Practice Quiz8分鐘
L1.2 Practice Quiz8分鐘
M1 Exam15分鐘
2
完成時間為 5 小時

Hidden Service on TOR and their Attacks

In this module, we learn how the hidden service architecture and protocol work, and how to set up the hidden server to provide network services on the Tor network without revealing the public IP address. We also learn the best practice of managing the hidden server anonymously and hide the version information of web server, OS, and installed software packages....
3 個視頻 (總計 20 分鐘), 1 個閱讀材料, 3 個測驗
3 個視頻
Defense Against Deanonymizing Attack5分鐘
Cloud Based TOR9分鐘
1 個閱讀材料
Setup procedures and Best Practices for Hosting Onion Services10分鐘
2 個練習
L2.1 Practice Quiz15分鐘
M2 Exam20分鐘
3
完成時間為 4 小時

Censorship Systems

In this module we learn the basic components of the censorship systems, the censor model and the related challenges. We learn to define the censor's sphere of influence and sphere of visibility, and their impact on the techniques that can be deployed by the censorship systems. We will be able to describe the basic components of the censor's attack model, explain different fingerprinting methods and evaluating their strength and weakness. We will study different direct censorship method and learn the limitations imposed upon the range of censorship actions. ...
5 個視頻 (總計 35 分鐘), 5 個閱讀材料, 6 個測驗
5 個視頻
L3-2 CS6910 Censor Attack Model and Apparatus10分鐘
L3-3 Fingerprinting6分鐘
L3-4. Direct Censorship4分鐘
L3.5. Range of Censorship Actions5分鐘
5 個閱讀材料
Read Section 1 of "SoK: Making Sense of Censorship Resistance Systems"10分鐘
Read censorship apparatus model and censor's attack model10分鐘
L3-3. Fingerprinting.10分鐘
L3.4. Direct Censorship10分鐘
L3.5. Range of Censorship Actions10分鐘
6 個練習
L1 Practice Quiz8分鐘
L3.2 Practice Quiz8分鐘
L3.3 Practice Quiz8分鐘
L3.4 Practice Quiz8分鐘
L3.5 Practice Quiz8分鐘
M3 Exam
4
完成時間為 4 小時

Censorship Resistance System (CRS)

In this module, we will learn the two main functional components of censorship resistance system (CRS) and explain the steps to establish the CRS communications. We will understand the operating requirements for establishing the CRS communications and learn the techniques for hiding information and avoid tracking using CRS channels. We will learn the basic CRS properties shared by CRS' and their purposes. We will comprehend different methods for obtaining CRS credentials and reduce faking/testing of them. We will be able to deploy different schemes for resisting active probing, identify different schemes to establish user trust. We will learn how to implement methods for evading censor detection and blocking. We will understand various methods for protecting publisher information and current open and active CRS research areas....
5 個視頻 (總計 28 分鐘), 5 個閱讀材料, 6 個測驗
5 個視頻
L4.2. CRS Properties11分鐘
L4.3. Techniques for CRS Communication Establishment Phase3分鐘
L4.4. Techniques for CRS Conversation Phase.4分鐘
L4.5. Open CRS Research Areas3分鐘
5 個閱讀材料
L4.1. Censorship Resistancde System Overview10分鐘
L4.2. CRS Properties.10分鐘
L4.3. Techniques for Communication Establishment Phase .10分鐘
L4.4. Techniques for Conversation Phase10分鐘
L4.5. Open Areas and Research Challenges.10分鐘
6 個練習
L4.1 Practice Quiz8分鐘
L4.2 Practice Quiz8分鐘
L4.3 Practice Quiz8分鐘
L4.4 Practice Quiz8分鐘
L4.5 Practice Quiz4分鐘
M4 Exam

講師

Avatar

Edward Chow

Professor
Computer Science
Avatar

Greg Williams

Lecturer
Department of Computer Science
Avatar

Richard White

Assistant Research Professor
Computer Science

關於 科罗拉多大学系统

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

關於 Advanced System Security Design 專項課程

This specialization is intended for intermediate level learners with basic programming skills and basic cybersecurity knowledge. Through this course learner will learn about advanced secure software techniques such as those for cloud computing, TOR, web-based cryptography, and geo-location/context based access control. With these techniques, learners will be better prepared to implement new security and privacy preserving data security features, to perform secure system design and implementation, vulnerability analysis, and Securely Provision (SP), Operate and Maintain (OM), Oversee and Govern (OV), Protect and Defend (PR), Analyze (AN), Collect and Operate (CO), and investigate (IN) tasks....
Advanced System Security Design

常見問題

  • 注册以便获得证书后,您将有权访问所有视频、测验和编程作业(如果适用)。只有在您的班次开课之后,才可以提交和审阅同学互评作业。如果您选择在不购买的情况下浏览课程,可能无法访问某些作业。

  • 您注册课程后,将有权访问专项课程中的所有课程,并且会在完成课程后获得证书。您的电子课程证书将添加到您的成就页中,您可以通过该页打印您的课程证书或将其添加到您的领英档案中。如果您只想阅读和查看课程内容,可以免费旁听课程。

還有其他問題嗎?請訪問 學生幫助中心