This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical schema.
This course is part of the Introduction to Cyber Security Specialization
Offered By
About this Course
Could your company benefit from training employees on in-demand skills?
Try Coursera for BusinessSkills you will gain
- Cybersecurity
- Cryptography
- Public-Key Cryptography
Could your company benefit from training employees on in-demand skills?
Try Coursera for BusinessOffered by
Syllabus - What you will learn from this course
Cyber Security Safeguards
Understanding Authentication Protocols
Introducing Conventional Cryptography
Overview of Public Key Cryptographic Methods
Reviews
- 5 stars81.84%
- 4 stars14.96%
- 3 stars1.91%
- 2 stars0.79%
- 1 star0.47%
TOP REVIEWS FROM CYBER ATTACK COUNTERMEASURES
I like how Dr. Amoroso made some complicated concept sounds easy. I also love when he told us about the history of cyber security in this course.
Instructor makes it easy to understand and keeps it interesting. Especially enjoy the talks and due credits to the unsung hero's of the early cyber security scene.
Great info, well-chosen readings, wish there were more practice problems. Assignments and quizzes are good for a Coursera course, but not great.
Excellent!! You are a great teacher, and I learned a lot. I have already applied the knowledge gained to my business. Grazie mille.
About the Introduction to Cyber Security Specialization

Frequently Asked Questions
When will I have access to the lectures and assignments?
What will I get if I subscribe to this Specialization?
Is financial aid available?
More questions? Visit the Learner Help Center.