Skip to content

extwiii/Cybersecurity-University.of.Maryland

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

37 Commits
 
 
 
 
 
 

Repository files navigation

Cybersecurity-University.of.Maryland ✅

Cybersecurity Specialization - Cybersecurity Fundamentals. Construction of Secure Systems - Coursera

Course 1 - Usable Security

Course 2 - Software Security

Course 3 - Cryptography

  • Introduction and Classical Cryptography

    • Private-key encryption
    • Classical encryption schemes
    • Notion of perfect secrecy, and present a scheme that provably achieves this notion of security
  • Computational Secrecy and Principles of Modern Cryptography

    • Computational security, central concept of modern cryptography
    • Pseudorandom generator, also known as a stream cipher in practice
    • Roof by reduction, a powerful technique for proving schemes secure
  • Private-Key Encryption

    • Private-key encryption by looking at stronger security notions and efficient schemes achieving them
    • Pseudorandom functions (aka, block ciphers)
    • Security against chosen-ciphertext attacks
    • Padding-oracle attack
  • Message Authentication Codes

    • Message integrity
    • Message authentication codes
    • Secrecy and integrity in authenticated encryption
    • Secure communication sessions
  • Number Theory

    • Public-key cryptography in group theory and number theory
    • Number-theoretic assumptions
    • Hardness of factoring, and the related RSA problem
    • Discrete logarithms in certain groups, and Diffie-Hellman problems
  • Key Exchange and Public-Key Encryption

    • Public-key cryptography (in general) and public-key encryption (in particular)
    • Diffie-Hellman key-exchange protocol
    • Public-key encryption schemes based on both the discrete-logarithm (technically, decisional Diffie-Hellman) problem, and the RSA problem
  • Digital Signatures

    • Digital signatures, which can be used to provide integrity in the public-key setting
    • Signature constructions based on the RSA and discrete-logarithm problems
    • Important application of digital signatures to public-key distribution in today's Internet
    • SSL/TLS protocol, which you are using right now as you view this page

Course 4 - Hardware Security

  • Digital System Design: Basics and Vulnerabilities

    • Understand how digital system is specified, implemented, and optimized
    • Learn what are sequential systems and how they are designed
    • Identify the don't care conditions introduced during the design process
    • Know that there exist security and trust vulnerabilities in hardware
  • Design Intellectual Property (IP) Protection

    • Learn self-protection techniques for design IPs: watermarking, fingerprinting, metering
    • Assess the trade-off among security, cost and performance
  • Physical Attacks and Modular Exponentiation

    • Understand the vulnerability to a system from hardware (physical attacks)
    • Learn the available countermeasures to physical attacks
    • Perform security evaluation for the hardware implementation of security modules
    • Modular exponentiation, various ways to evaluate it and the security vulnerability
    • Physical Attacks and Tamper Resistance
  • Side Channel Attacks

    • Learn the vulnerabilities of information leak from side channels
    • Understand how attacks can be launched from various side channels
    • Consider the potential side channel information leak when you design a secure system
    • Get better understanding on how to implement security primitives such as RSA securely
  • Hardware Trojan and Physical Unclonable Functions

    • Understand various kind of hardware Trojan and how they work
    • Know the popular hardware Trojan detection approaches
    • Study several practical methods for hardware Torjan prevention
    • Expose the concept of trusted integrated circuits and how to build trust in ICs
  • Emerging Hardware Security Topics

    • Know the basics of TPM
    • Understand what is PUF and how it can help to build more secure system
    • Learn the vulnerabilities and countermeasures in FPGA design and FPGA-based systems

Taught by:

Jennifer Golbeck, Director, Human-Computer Interaction Lab

Michael Hicks, Professor, Department of Computer Science

Jonathan Katz, Director, Maryland Cybersecurity Center

Gang Qu, Associate Professor, Electrical and Computer Engineering

Rating 🌕🌕🌕🌕🌕🌕🌕🌑🌑🌑

Difficulty 🌕🌕🌕🌕🌕🌕🌕🌑🌑🌑

Created By Bilal Cagiran | E-Mail | Github | LinkedIn | CodePen | Blog/Site | FreeCodeCamp

About

Cybersecurity Specialization - Cybersecurity Fundamentals. Construction of Secure Systems - Coursera

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published