Overview
Class Central Tips
The Cybersecurity Specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. These concepts are illustrated with examples drawn from modern practice, and augmented with hands-on exercises involving relevant tools and techniques. Successful participants will develop a way of thinking that is security-oriented, better understanding how to think about adversaries and how to build systems that defend against them.
Syllabus
Course 1: Usable Security
- Offered by University of Maryland, College Park. This course focuses on how to design and build secure systems with a human-centric focus. ... Enroll for free.
Course 2: Cryptography
- Offered by University of Maryland, College Park. This course will introduce you to the foundations of modern cryptography, with an eye ... Enroll for free.
Course 3: Hardware Security
- Offered by University of Maryland, College Park. In this course, we will study security and trust from the hardware perspective. Upon ... Enroll for free.
Course 4: Cybersecurity Capstone Project
- Offered by University of Maryland, College Park. This course presents an intensive experience during which students build a software system ... Enroll for free.
- Offered by University of Maryland, College Park. This course focuses on how to design and build secure systems with a human-centric focus. ... Enroll for free.
Course 2: Cryptography
- Offered by University of Maryland, College Park. This course will introduce you to the foundations of modern cryptography, with an eye ... Enroll for free.
Course 3: Hardware Security
- Offered by University of Maryland, College Park. In this course, we will study security and trust from the hardware perspective. Upon ... Enroll for free.
Course 4: Cybersecurity Capstone Project
- Offered by University of Maryland, College Park. This course presents an intensive experience during which students build a software system ... Enroll for free.
Courses
-
This course focuses on how to design and build secure systems with a human-centric focus. We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system.
-
This course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. Importantly, we take a "build security in" mentality, considering techniques at each phase of the development cycle that can be used to strengthen the security of software systems. Successful learners in this course typically have completed sophomore/junior-level undergraduate work in a technical field, have some familiarity with programming, ideally in C/C++ and one other "managed" program language (like ML or Java), and have prior exposure to algorithms. Students not familiar with these languages but with others can improve their skills through online web tutorials.
-
In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware.
-
This course presents an intensive experience during which students build a software system they intend to be secure, and then attempt to show that other students' projects are insecure, by finding flaws in them. A Note on Capstone Frequency: Please note that sessions of this Cybersecurity Capstone Project only run 3-4 times a year, depending on course team availability and learner interest. Please keep this in mind as you enroll into the Capstone program. While you will still be able to access certain elements of the course between sessions, you will not be able to submit assignments or be grouped into teams unless you are in an actively running session.
Taught by
Gang Qu, Jennifer Golbeck, Jonathan Katz and Michael Hicks
Tags
Reviews
4.5 rating, based on 2 Class Central reviews
Showing Class Central Sort
-
I recently had the privilege of taking the "Cybersecurity Fundamentals" course with Professor John Smith, and I must say it was an eye-opening and invaluable experience. In today's increasingly digital world, where data breaches and cyber threats are becoming more prevalent, this course provides essential knowledge and skills to navigate the complex realm of cybersecurity.
-