This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical schema.
About this Course
Skills you will gain
- 5 stars81.68%
- 4 stars15.01%
- 3 stars1.98%
- 2 stars0.82%
- 1 star0.49%
TOP REVIEWS FROM CYBER ATTACK COUNTERMEASURES
The course is called Cyber Attacks Countermeasures, but really only focuses on Authentication and Encryption. Great class on those topics for someone new to cyber security!
Excellent!! You are a great teacher, and I learned a lot. I have already applied the knowledge gained to my business. Grazie mille.
This course as improved my knowledge in cybersecurity. I wonderfully presented course that I really enjoyed doing.
Good course. Very well though out approach towards teaching the subject. Engaging and informative. And it made learning a pleasure.
About the Introduction to Cyber Security Specialization
Frequently Asked Questions
When will I have access to the lectures and assignments?
What will I get if I subscribe to this Specialization?
Is financial aid available?
More questions? Visit the Learner Help Center.