• LOGIN
  • No products in the cart.

You must be logged in to take this course  →   LOGIN | REGISTER NOW

This is a course which introduces you to the basic cyber defences in context of modelling and how you can arrange quality, precision and functionality in reducing cyber-attacks.

You will be introduced to different mathematical techniques to handle the situation when a cyber-attack takes place. This course is taught by the materials taken from different books, published papers and videos on counter measuring cyber-attacks.

Assessment

This course does not involve any written exams. Students need to answer 5 assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Each answer needs to be 200 words (1 Page). Once the answers are submitted, the tutor will check and assess the work.

Certification

Edukite courses are free to study. To successfully complete a course you must submit all the assignment of the course as part of the assessment. Upon successful completion of a course, you can choose to make your achievement formal by obtaining your Certificate at a cost of £49.

Having an Official Edukite Certification is a great way to celebrate and share your success. You can:

  • Add the certificate to your CV or resume and brighten up your career
  • Show it to prove your success

 

Course Credit: NYU

Course Curriculum

Module 01
module 1 Cyber Security Safeguards Reading 00:03:00
Introduction What You Will Learn from This Course on Cyber Security 00:03:00
Safeguards and Countermeasures 00:05:00
Reference Model 00:06:00
Orange Book Compliance 00:11:00
Bell La Padula Model 00:09:00
Biba Integrity Model 00:06:00
Issues with Subject Object Actions Models 00:06:00
Module 02
Covert Channels 00:08:00
Information Flow Models and Hook Up Theorem Part 1 00:06:00
Information Flow Models and Hook Up Theorem Part 2 00:06:00
Cyber Attack Countermeasures – Reading 00:03:00
Identification and Authentication 00:07:00
Factors of Authentication including 2FA 00:09:00
Authentication Protocol Schema and Zones 00:06:00
Passwords and Analysis 00:06:00
Hand Held Authentication Protocol Part 1 Implementation 00:05:00
Hand Held Authentication Protocol Part 2 Analysis and Cryptanalysis 00:07:00
Module 03
Welcome Lior Frenkel 00:10:00
RSA SecureID Protocol Part 1 Implementation 00:07:00
RSA SecureID Protocol Part 2 Analysis 00:05:00
Assignments and Reading 00:03:00
Lamport’s SKey Protocol Part 2 Analysis 00:05:00
Kerberos Part 1 Implementation – TGT Issuance 00:07:00
Kerberos Part 2 Implementation – TBOB Issuance 00:06:00
Basic Cryptosystems and Properties 00:08:00
Cryptographic Algorithm Design 00:07:00
DES Design 00:06:00
Triple DES 00:07:00
Module 04
Public Key Cryptographic Methods – Reading 00:03:00
CBC Mode Block Cryptography 00:05:00
Conventional Cryptography Scaling Issues 00:05:00
Public Key Crypto Basics 00:05:00
Public Key – Secrecy 00:05:00
Public Key – Digital Signature 00:04:00
Cryptographic Message Exchange 00:06:00
Diffie Hellman Key Exchange 00:08:00
Key Distribution and Certification Authority 00:10:00
Secure Sockets Layer 00:07:00
The Story of James Ellis and Clifford Cox 00:10:00
Assessment
Submit Your Assignment 00:00:00
Certification 00:00:00

Course Reviews

4.7

4.7
9 ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

8 STUDENTS ENROLLED
©2021 Edukite. All Rights Resereved
Edukite is A Part Of Ebrahim College, Charity Commission
Reg No 110841