This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical schema.
- 5 stars81.72%
- 4 stars14.82%
- 3 stars2.06%
- 2 stars0.86%
- 1 star0.51%
来自CYBER ATTACK COUNTERMEASURES的热门评论
Really great content and love the way Dr. Edward Amoroso explains all the concepts! Makes it fun and interesting! Love the history references also!
I like how Dr. Amoroso made some complicated concept sounds easy. I also love when he told us about the history of cyber security in this course.
This course as improved my knowledge in cybersecurity. I wonderfully presented course that I really enjoyed doing.
Dr. Amoroso structured a very efficient course that illustrates key principles with historical context. He was there at the beginning (Bell Labs, the epicenter)!