Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Design and Analyze Secure Networked Systems

Course Cover
compare button icon

Course Features

icon

Duration

17 hours

icon

Delivery Method

Online

icon

Available on

Limited Access

icon

Accessibility

Mobile, Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Self Paced

icon

Video Content

17 hours

Course Description

In this MOOC, we will learn the basic cyber security concepts, how to identify vulnerabilities/threat in a network system. In order to triage recent cyberattacks, such as OPM data breaches, we will use CIA basic security services. We will be able to analyze the risks within a network system and use the basic security design principles for protecting data and computer systems. We will assess the reliability of the programs and data that are installed within our systems, and demonstrate the correct way to verify their authenticity and integrity. For controlling shared access granted to different users and system processes, we will use the principle of least privileges. GnuPG software will be used to create a public/private key pair on Amazon Cloud instances. This is for signing/verifying documents, open-source software, and encryption. We will be able to publish software, including the release key and associated signatures, on a web server. Additionally, we can publish our public key to PGP key servers for others to retrieve. Public Key Infrastructure (PKI), Linux utility to act as a CA, and how to sign certificates for clients or servers using secure email and web applications.

Course Overview

projects-img

Hands-On Training,Instructor-Moderated Discussions

projects-img

Case Studies, Captstone Projects

Skills You Will Gain

What You Will Learn

Learn how to be a CA and set up Secure Server and Client Certificate

Learn how to protect data access and verify source of trust Learn how to use GPG to sign/verify software

Course Cover