Information Security - Authentication and Access Control

Aspen Olmsted, NYUx

Learn more fundamentals of information security, including Introduction to Cryptography, Authentication, Access Control and Containerization.

This is a self-paced course that provides a continuation of information security and cybersecurity topics. Among the topics covered are Introduction to Cryptography, Authentication, Access Control, and Containerization. Students learn about both symmetric and asymmetric encryption and their uses. We also take a look at one-way hashing and how it differs from encryption. We drill into ways that encryption is used in PKI and Digital Certificates. Next, we tackle authentication. Authentication is relevant to multiple fields. In art, antiques, and anthropology, a common problem verifies that a given artifact was produced by a particular person or a specific place or period of history. In computer science, verifying a user's identity is often required to allow access to confidential data or systems. Next, we move on to different access control mechanisms. We then drill into the implementation details of access control in several other operating systems. We follow up with a deep dive into compatibility based access control mechanisms. Finally, we look at access control in virtual machines (VM), virtualization, and containerization. We look into how the operating system achieves access control, and whether these methods are sufficient.

What will you learn

  1. Describe Strengths and Weaknesses of Data Encryption Standard (DES)
  2. Describe Strengths and Weaknesses of Advanced Encryption Standard (AES)
  3. Describe Public Key Cryptography
  4. Describe Asymmetric Key Algorithms
  5. Define Hash Functions
  6. Describe Public Key Signatures
  7. Describe the Benefits of the Different Types of Authentication
  8. Define access control
  9. Apply four types of access control (Discretionary, Mandatory, Role Based, and Unix/Linux File Access Control)
  10. Describe the use of the SetUID permission in Unix/Linux
  11. Analyze an access control scenario using an Access Control Matrix
  12. Differentiate between ACL and Capabilities
  13. Describe the use of a Reference Monitor
  14. Describe the Security Mechanisms built into Chromium OS
  15. Give Examples of Covert Channels including both Timing Channels and Storage Channels
  16. Describe the Purpose of an Operating System (OS)
  17. Differentiate between Type 1 and Type 2 Hypervisors
  18. Describe Containers and their Purpose
  19. Describe Sandbox Computation

Dates:
  • 16 October 2020
Course properties:
  • Free:
  • Paid:
  • Certificate:
  • MOOC:
  • Video:
  • Audio:
  • Email-course:
  • Language: English Gb

Reviews

No reviews yet. Want to be the first?

Register to leave a review

Show?id=n3eliycplgk&bids=695438
NVIDIA
More on this topic:
Coursera_course_logo Programming Cloud Services for Android Handheld Systems
In this course----the third in a trans-institution sequence of MOOCs on Mobile...
430878_189e_4 Apache Tomcat 8 - Udemy
Learning how to install Apache Tomcat 8 web server and its configuration. This...
App_security Web Application Development: Security
One of the primary concerns for both the developers and users of web applications...
Isc2-course5-icon Networks and Communications Security
Welcome to Networks and Communications Security Course! In the Networks and...
More from 'Computer Science':
16d67a7c-cb05-413e-aa3a-5f4a135d65b8-cdd45870e21d.small Cloud Computing Security
Learn how to identify security issues in the cloud and industry-standard techniques...
Bcf46af9-f9f7-45e8-b189-7e3b8f09d7b5-10ce595986e0.small Statistical Analysis in Bioinformatics
Learn basic R programming to analyze biological big data to locate genes, perform...
0594d6e9-dba9-40a3-8170-d9b07bb85a3c-1a66fc3ab423.small Formal Software Verification
Learn software quality techniques beyond just running test cases. Want to gain...
A3d65c5b-4de8-4533-b771-85ccf8c91fd7-4480487bc1f7.small Network Security - Protocols
Learn more fundamentals of network security, including cryptographic algorithms...
F2ea5d78-eed2-43f6-a44f-f2a9fa01b433-fc46cde64429.small Network Security - Advanced Topics
Learn advanced topics in network security, including Security Monitoring, Perimeter...
More from 'edX':
04bf344f-d72d-46cf-8b0b-979052e71588-cb00fe2de29a.small Instructional Design Course Evaluation & Capstone Project
Develop your Instructional Design & Technology MicroMasters capstone project...
16d67a7c-cb05-413e-aa3a-5f4a135d65b8-cdd45870e21d.small Cloud Computing Security
Learn how to identify security issues in the cloud and industry-standard techniques...
717db568-6f7d-4a41-bf1a-e3b498a5b511-b4215dec39a8.small Long-term Financial Management
Learn what it takes to hold a company’s financial future in your hands, as you...
60847f40-a3b7-4ecb-a1aa-d95ebb7cdb9e-d6bdf08ca344.small Instructional Design Models
Explore traditional and current instructional design models as you develop your...
Bcf46af9-f9f7-45e8-b189-7e3b8f09d7b5-10ce595986e0.small Statistical Analysis in Bioinformatics
Learn basic R programming to analyze biological big data to locate genes, perform...

© 2013-2019