Coder Social home page Coder Social logo

batermj / cybersecurity-university.of.maryland Goto Github PK

View Code? Open in Web Editor NEW

This project forked from extwiii/cybersecurity-university.of.maryland

0.0 3.0 0.0 116 KB

Cybersecurity Specialization - Cybersecurity Fundamentals. Construction of Secure Systems - Coursera

License: Apache License 2.0

cybersecurity-university.of.maryland's Introduction

Cybersecurity-University.of.Maryland โœ…

Cybersecurity Specialization - Cybersecurity Fundamentals. Construction of Secure Systems - Coursera

Course 1 - Usable Security

Course 2 - Software Security

Course 3 - Cryptography

  • Introduction and Classical Cryptography

    • Private-key encryption
    • Classical encryption schemes
    • Notion of perfect secrecy, and present a scheme that provably achieves this notion of security
  • Computational Secrecy and Principles of Modern Cryptography

    • Computational security, central concept of modern cryptography
    • Pseudorandom generator, also known as a stream cipher in practice
    • Roof by reduction, a powerful technique for proving schemes secure
  • Private-Key Encryption

    • Private-key encryption by looking at stronger security notions and efficient schemes achieving them
    • Pseudorandom functions (aka, block ciphers)
    • Security against chosen-ciphertext attacks
    • Padding-oracle attack
  • Message Authentication Codes

    • Message integrity
    • Message authentication codes
    • Secrecy and integrity in authenticated encryption
    • Secure communication sessions
  • Number Theory

    • Public-key cryptography in group theory and number theory
    • Number-theoretic assumptions
    • Hardness of factoring, and the related RSA problem
    • Discrete logarithms in certain groups, and Diffie-Hellman problems
  • Key Exchange and Public-Key Encryption

    • Public-key cryptography (in general) and public-key encryption (in particular)
    • Diffie-Hellman key-exchange protocol
    • Public-key encryption schemes based on both the discrete-logarithm (technically, decisional Diffie-Hellman) problem, and the RSA problem
  • Digital Signatures

    • Digital signatures, which can be used to provide integrity in the public-key setting
    • Signature constructions based on the RSA and discrete-logarithm problems
    • Important application of digital signatures to public-key distribution in today's Internet
    • SSL/TLS protocol, which you are using right now as you view this page

Course 4 - Hardware Security

  • Digital System Design: Basics and Vulnerabilities

    • Understand how digital system is specified, implemented, and optimized
    • Learn what are sequential systems and how they are designed
    • Identify the don't care conditions introduced during the design process
    • Know that there exist security and trust vulnerabilities in hardware
  • Design Intellectual Property (IP) Protection

    • Learn self-protection techniques for design IPs: watermarking, fingerprinting, metering
    • Assess the trade-off among security, cost and performance
  • Physical Attacks and Modular Exponentiation

    • Understand the vulnerability to a system from hardware (physical attacks)
    • Learn the available countermeasures to physical attacks
    • Perform security evaluation for the hardware implementation of security modules
    • Modular exponentiation, various ways to evaluate it and the security vulnerability
    • Physical Attacks and Tamper Resistance
  • Side Channel Attacks

    • Learn the vulnerabilities of information leak from side channels
    • Understand how attacks can be launched from various side channels
    • Consider the potential side channel information leak when you design a secure system
    • Get better understanding on how to implement security primitives such as RSA securely
  • Hardware Trojan and Physical Unclonable Functions

    • Understand various kind of hardware Trojan and how they work
    • Know the popular hardware Trojan detection approaches
    • Study several practical methods for hardware Torjan prevention
    • Expose the concept of trusted integrated circuits and how to build trust in ICs
  • Emerging Hardware Security Topics

    • Know the basics of TPM
    • Understand what is PUF and how it can help to build more secure system
    • Learn the vulnerabilities and countermeasures in FPGA design and FPGA-based systems

Taught by:

Jennifer Golbeck, Director, Human-Computer Interaction Lab

Michael Hicks, Professor, Department of Computer Science

Jonathan Katz, Director, Maryland Cybersecurity Center

Gang Qu, Associate Professor, Electrical and Computer Engineering

Rating ๐ŸŒ•๐ŸŒ•๐ŸŒ•๐ŸŒ•๐ŸŒ•๐ŸŒ•๐ŸŒ•๐ŸŒ‘๐ŸŒ‘๐ŸŒ‘

Difficulty ๐ŸŒ•๐ŸŒ•๐ŸŒ•๐ŸŒ•๐ŸŒ•๐ŸŒ•๐ŸŒ•๐ŸŒ‘๐ŸŒ‘๐ŸŒ‘

Created By Bilal Cagiran | E-Mail | Github | LinkedIn | CodePen | Blog/Site | FreeCodeCamp

cybersecurity-university.of.maryland's People

Contributors

extwiii avatar

Watchers

 avatar  avatar  avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.