With the learner's cloned instance from my AWS image, our Project 1a-d integrate the security principles and knowledge covered in first MOOC and apply them in real world tasks using state of art tools, such as gpg for signing and verifying documents/open source software packages, misc/CA scripts for performing CA certificate signing tasks, generate server/client certificates, and setup on apache web server for secure web access with mutual authentication. Project2a-b cover the use of OpenSSL for encrypting/decrypting data, and Diffi-Hellman key exchange. The related lectures cover the development of secure programs using Crypto API. Projects 3a-b cover hacking and patching with command injections and SQL injections. Project 3c cover cracking Linux passwords with hashcat using AWS P2 GPU instance. Project 4a-b cover the construction of DMZ firewall system with iptables to provide DNAT, masquerade services, filtering packets to secure serves in two AWS virtual private clouds.
The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.
Can I just enroll in a single course?
Can I take the course for free?
此课程是 100% 在线学习吗？是否需要现场参加课程？
Know one high level programming language, basic Unix system commands, and discrete mathematics in particular the number theory.
Do I need to take the courses in a specific order?
Yes. MOOC1 covers security design principles and concepts. Learning it first will help understand basic security terms which are used in other MOOCs and how the principles and basic security services are applied in various situations. MOOC2 helps the learners understanding the basic cryptography and related crypto API to create secure web app. These knowledge help learners assess the hacking and patching skill/tools needed in MOOC3. MOOC4 should be done last since it integrates all cyber security knowledge to implement security policies and their enforcement procedures for hardening a networked systems.
Will I earn university credit for completing the Specialization?
At this time, this Specialization is not credit bearing. At a future time, this content may contribute in part towards university credit. Please note that additional costs and requirements may be entailed once credit is offered.