Cybersecurity Fundamentals. Construction of Secure Systems
À propos de cette Spécialisation
The Cybersecurity Specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. These concepts are illustrated with examples drawn from modern practice, and augmented with hands-on exercises involving relevant tools and techniques. Successful participants will develop a way of thinking that is security-oriented, better understanding how to think about adversaries and how to build systems that defend against them.
Créé par :
Suivez l'ordre suggéré ou choisissez le vôtre.
Conçu pour vous aider à vous exercer et à appliquer les compétences que vous avez acquises.
Mettez en évidence vos nouvelles compétences sur votre CV ou sur LinkedIn.
- Intermediate Specialization.
- Some related experience required.
- 7 weeks of study, 5-8 hours/week
À propos du coursThis course focuses on how to design and build secure systems with a human-centric focus. We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security
- 6 weeks of study, 3-5 hours/week
- English, Korean
À propos du coursThis course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defen
- 7 weeks of study, 4-7 hours/week
À propos du coursThis course will introduce you to the foundations of modern cryptography, with an eye toward pra
À propos du coursIn this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will le
Cybersecurity Capstone ProjectSession en cours : Oct 1
À propos du Projet FinalThis course presents an intensive experience during which students build a software system they intend to be secure, and then attempt to show that other students' projects are insecure, by finding flaws in them. A Note on Capstone Frequency: Please n
Professor, University of Maryland, and Director, Maryland Cybersecurity Center
More questions? Visit the Learner Help Center.