Fundamentals of Computer Network Security
Fundamentals of Computer Network Security
À propos de ce Spécialisation
This specialization in intended for IT professionals, computer programmers, managers, IT security
professionals who like to move up ladder, who are seeking to develop network system security skills.
Through four courses, we will cover the Design and Analyze Secure Networked Systems, Develop
Secure Programs with Basic Cryptography and Crypto API, Hacking and Patching Web Applications,
Perform Penetration Testing, and Secure Networked Systems with Firewall and IDS, which will
prepare you to perform tasks as Cyber Security Engineer, IT Security Analyst, and Cyber Security
Analyst.
you should be able to create public/private keys, certificate requests, install/sign/verify them
for web server and client authentication, secure emails, and code signing.
you should be able to write secure web apps with Crypto API to implement the confidentiality,
integrity, and availability basic security services.
you should be able to hack web applications with vulnerabilities and patch them.
you should be able to apply penetration testing tool to exploit vulnerable systems.
you should be able to crack passwords given the hashes in password file using AWS P2 GPU.
you should be able to configure firewall and IDS for secure network systems
you should be able to specify effective security policies and implement efficient enforcement
procedures by applying security design principles for securing network systems.
COURS1
COURS3
SEMAINE 1
Cybersecurity Concepts and Security Principles
In this module, we will introduce the basic cyber security concepts, enable you to identity root causes
of vulnerabilities in a network system and distinguish them from the threats from both inside and
outside. We will analyze the enabling factors of recent cyber attack incidences and discuss the basic
security services for their defense and triage. We will introduce the risk management framework for
analyzing the risks in a network system, and apply the basic security design principles to protect the
data and secure the computer systems. Trust is critical and in the center of any secure systems. We will
examine the source and authenticity of the programs and data installed in systems we used daily and
show the proper way to check their integrity, and verify their authenticity.
SEMAINE 2
Protect Data Access and Verify Source of Trust
In this module we apply principle of least privileges for controlling the proper access given to users
and system process. We will demonstrate such an access control by using an example of project
document access control using the Unix file access mechanism. We use OPM data breach example to
show the impact and the need for principle of adequate data protection. Trust is critical and in the
center of any secure systems. We will examine the source and authenticity of the programs and data
installed in systems we used daily and show the proper way to check their integrity, and verify their
authenticity.
3 vidéos , 3 lectures, 2 quiz
SEMAINE 3
Using GPG to Sign/Verify Software
In this module, we introduce GPG software tool for generating public key private key pair for
signing/verifying the documents and to encrypt documents, and publish our public key on our web
server and PGP key server for others to retrieve. We will use GnuPG software tool to verify the
common opensource software packages such as apache and putty. We will also learn how to sign
software and the proper way to list the software package, their pgp signature, and our signing public
key on a web site.
SEMAINE 4
Be a CA, Setup Secure Server and Client Certificate
In this module, we will learn the Public Key Infrastructure (PKI), how CA operates, and the
certificates signing and verification process. We will utilize the utility command in a Linux system to
serve as a CA for an organization, learn how to sign certificate request for clients or servers both
secure email or secure web access purpose. We will earn how to generate server certificate requests as
a webmaster, send them to CA for signing and install the signed certificates in Apache web server for
secure web access. We will also set up apache web server for requiring clients to present their client
certificates for mutual authentication. We will also guide you to set client certificate on browser for
mutual authentication and on a mail client for signing and encrypting emails.
6 vidéos , 5 lectures, 2 quiz