This is a course which introduces you to the basic cyber defences in context of modelling and how you can arrange quality, precision and functionality in reducing cyber-attacks.
You will be introduced to different mathematical techniques to handle the situation when a cyber-attack takes place. This course is taught by the materials taken from different books, published papers and videos on counter measuring cyber-attacks.
Assessment
This course does not involve any written exams. Students need to answer 5 assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Each answer needs to be 200 words (1 Page). Once the answers are submitted, the tutor will check and assess the work.
Certification
Edukite courses are free to study. To successfully complete a course you must submit all the assignment of the course as part of the assessment. Upon successful completion of a course, you can choose to make your achievement formal by obtaining your Certificate at a cost of £49.
Having an Official Edukite Certification is a great way to celebrate and share your success. You can:
- Add the certificate to your CV or resume and brighten up your career
- Show it to prove your success
Course Credit: NYU
Course Curriculum
Module 01 | |||
module 1 Cyber Security Safeguards Reading | 00:03:00 | ||
Introduction What You Will Learn from This Course on Cyber Security | 00:03:00 | ||
Safeguards and Countermeasures | 00:05:00 | ||
Reference Model | 00:06:00 | ||
Orange Book Compliance | 00:11:00 | ||
Bell La Padula Model | 00:09:00 | ||
Biba Integrity Model | 00:06:00 | ||
Issues with Subject Object Actions Models | 00:06:00 | ||
Module 02 | |||
Covert Channels | 00:08:00 | ||
Information Flow Models and Hook Up Theorem Part 1 | 00:06:00 | ||
Information Flow Models and Hook Up Theorem Part 2 | 00:06:00 | ||
Cyber Attack Countermeasures – Reading | 00:03:00 | ||
Identification and Authentication | 00:07:00 | ||
Factors of Authentication including 2FA | 00:09:00 | ||
Authentication Protocol Schema and Zones | 00:06:00 | ||
Passwords and Analysis | 00:06:00 | ||
Hand Held Authentication Protocol Part 1 Implementation | 00:05:00 | ||
Hand Held Authentication Protocol Part 2 Analysis and Cryptanalysis | 00:07:00 | ||
Module 03 | |||
Welcome Lior Frenkel | 00:10:00 | ||
RSA SecureID Protocol Part 1 Implementation | 00:07:00 | ||
RSA SecureID Protocol Part 2 Analysis | 00:05:00 | ||
Assignments and Reading | 00:03:00 | ||
Lamport’s SKey Protocol Part 2 Analysis | 00:05:00 | ||
Kerberos Part 1 Implementation – TGT Issuance | 00:07:00 | ||
Kerberos Part 2 Implementation – TBOB Issuance | 00:06:00 | ||
Basic Cryptosystems and Properties | 00:08:00 | ||
Cryptographic Algorithm Design | 00:07:00 | ||
DES Design | 00:06:00 | ||
Triple DES | 00:07:00 | ||
Module 04 | |||
Public Key Cryptographic Methods – Reading | 00:03:00 | ||
CBC Mode Block Cryptography | 00:05:00 | ||
Conventional Cryptography Scaling Issues | 00:05:00 | ||
Public Key Crypto Basics | 00:05:00 | ||
Public Key – Secrecy | 00:05:00 | ||
Public Key – Digital Signature | 00:04:00 | ||
Cryptographic Message Exchange | 00:06:00 | ||
Diffie Hellman Key Exchange | 00:08:00 | ||
Key Distribution and Certification Authority | 00:10:00 | ||
Secure Sockets Layer | 00:07:00 | ||
The Story of James Ellis and Clifford Cox | 00:10:00 | ||
Assessment | |||
Submit Your Assignment | 00:00:00 | ||
Certification | 00:00:00 |
Course Reviews
No Reviews found for this course.