Advanced System Security Design Specialization

Advanced Secure System Design and Analysis Skills. Apply state of art techniques and tools to design, analyze, and implement critical cyber systems

Instructors: Edward Chow +2 more

What you'll learn

  •   Understand basic cloud services and its application and how to work with AWS cloud computing resources.
  •   Understand, analyze and evaluate DDoS attacks, detection and prevention techniques.
  •   Understand and apply basic security and privacy in TOR network and blockchain systems.
  •   Understand geo-location/attribute based access security and learn how to apply XACML in ABAC systems.
  • Skills you'll gain

  •   Distributed Denial-Of-Service (DDoS) Attacks
  •   Firewall
  •   Threat Modeling
  •   Cloud Security
  •   Amazon Web Services
  •   Authorization (Computing)
  •   Cloud Computing
  •   Cybersecurity
  •   Amazon Elastic Compute Cloud
  •   Intrusion Detection and Prevention
  •   Role-Based Access Control (RBAC)
  •   AWS Identity and Access Management (IAM)
  • Specialization - 4 course series

    In this MOOC, we will learn Cloud Computing basics using AWS as an example, We will guide you to create AWS account, planning AWS resources for your cloud systems, create AWS EC2 instances, access them and configure the popular LAMP web services with MySQL database. We will guide you to create user accounts for your programmer or operators using AWS Identify and Access management GUI, Register your domain name and setup DNS entry for your servers using AWS Route 53 in 22 mintues! and show you how to use AWS Command Line interface to create and managing instances and services programmatically. We then introduce AWS Load balancing feature, create load balancing cluster for scalability and reliability. We also demonstrate how to diagnose the problem introduced by the health check and firewall restriction conflicts. By the end of this course, you should be able to create your own web cluster with mysql databases, setup your users with credentials to manage your AWS resources/virtual machines either through their management control interface or using AWS CLI API using scripts. You will also learn the best practice in cloud security and debugging service interaction issues may arise in the cloud systems.

    For the pre-requisites, we recommend the learners take the Design and Analyze Secure Networked Systems course to learn the basic security concepts and principles and take the Secure Networked System with Firewall and IDS courses to learn the basic firewall and IDS systems.

    By the end of this course, you should be able to utilize TOR browser to protect your privacy, set up hidden service on current interface that protect your servers and make it anonymous, you will choosing entry guards wisely since your adversary will try to attack them with DDoS traffic and force you to choose their relay as your entry and exit router. We will also learn the basic components of both censorship and censorship resistance systems, and the scheme deployed by these systems and their attacks.

    API can be integrated for encrypted document on web browser without download apps and associate them with geolocking area to restrict unauthorize and improper accesses.

    DDoS Attacks and Defenses

    Security and Privacy in TOR Network

    Advanced System Security Topics

    ©2025  ementorhub.com. All rights reserved