Об этом курсе
100% онлайн

100% онлайн

Начните сейчас и учитесь по собственному графику.
Гибкие сроки

Гибкие сроки

Назначьте сроки сдачи в соответствии со своим графиком.
Промежуточный уровень

Промежуточный уровень

Часов на завершение

Прибл. 13 часа на выполнение

Предполагаемая нагрузка: 9 hours/week...
Доступные языки

Английский

Субтитры: Английский
100% онлайн

100% онлайн

Начните сейчас и учитесь по собственному графику.
Гибкие сроки

Гибкие сроки

Назначьте сроки сдачи в соответствии со своим графиком.
Промежуточный уровень

Промежуточный уровень

Часов на завершение

Прибл. 13 часа на выполнение

Предполагаемая нагрузка: 9 hours/week...
Доступные языки

Английский

Субтитры: Английский

Программа курса: что вы изучите

Неделя
1
Часов на завершение
5 ч. на завершение

The Onion Routing (TOR)

In this module, we learn the basic concepts of Tor network for protecting the privacy of Tor users and how to use the Tor browser features to access the web sites while preserving the anonimity, change the entry guard and exit node of the Tor circuit, learn how to setup Tor software package on a Linux machine and start its service, and use torify to run network commands, such as ssh or curl command, but use a Tor circuit as an outgoing connection...
Reading
4 видео ((всего 24 мин.)), 3 материалов для самостоятельного изучения, 4 тестов
Video4 видео
TOR Basic Concepts6мин
Realize Anonymity in TOR4мин
Sniper Attack on TOR10мин
Reading3 материала для самостоятельного изучения
TEDTalk: The Tor Project, protecting online anonimity18мин
Basic TOR Concepts10мин
The Sniper Attacks: Anonymously deanonymizing and disabling the Tor network10мин
Quiz3 практического упражнения
L1.1 Practice Quiz8мин
L1.2 Practice Quiz8мин
M1 Exam15мин
Неделя
2
Часов на завершение
5 ч. на завершение

Hidden Service on TOR and their Attacks

In this module, we learn how the hidden service architecture and protocol work, and how to set up the hidden server to provide network services on the Tor network without revealing the public IP address. We also learn the best practice of managing the hidden server anonymously and hide the version information of web server, OS, and installed software packages....
Reading
3 видео ((всего 20 мин.)), 1 материал для самостоятельного изучения, 3 тестов
Video3 видео
Defense Against Deanonymizing Attack5мин
Cloud Based TOR9мин
Reading1 материал для самостоятельного изучения
Setup procedures and Best Practices for Hosting Onion Services10мин
Quiz2 практического упражнения
L2.1 Practice Quiz15мин
M2 Exam20мин
Неделя
3
Часов на завершение
4 ч. на завершение

Censorship Systems

In this module we learn the basic components of the censorship systems, the censor model and the related challenges. We learn to define the censor's sphere of influence and sphere of visibility, and their impact on the techniques that can be deployed by the censorship systems. We will be able to describe the basic components of the censor's attack model, explain different fingerprinting methods and evaluating their strength and weakness. We will study different direct censorship method and learn the limitations imposed upon the range of censorship actions. ...
Reading
5 видео ((всего 35 мин.)), 5 материалов для самостоятельного изучения, 6 тестов
Video5 видео
L3-2 CS6910 Censor Attack Model and Apparatus10мин
L3-3 Fingerprinting6мин
L3-4. Direct Censorship4мин
L3.5. Range of Censorship Actions5мин
Reading5 материала для самостоятельного изучения
Read Section 1 of "SoK: Making Sense of Censorship Resistance Systems"10мин
Read censorship apparatus model and censor's attack model10мин
L3-3. Fingerprinting.10мин
L3.4. Direct Censorship10мин
L3.5. Range of Censorship Actions10мин
Quiz6 практического упражнения
L1 Practice Quiz8мин
L3.2 Practice Quiz8мин
L3.3 Practice Quiz8мин
L3.4 Practice Quiz8мин
L3.5 Practice Quiz8мин
M3 Exam
Неделя
4
Часов на завершение
4 ч. на завершение

Censorship Resistance System (CRS)

In this module, we will learn the two main functional components of censorship resistance system (CRS) and explain the steps to establish the CRS communications. We will understand the operating requirements for establishing the CRS communications and learn the techniques for hiding information and avoid tracking using CRS channels. We will learn the basic CRS properties shared by CRS' and their purposes. We will comprehend different methods for obtaining CRS credentials and reduce faking/testing of them. We will be able to deploy different schemes for resisting active probing, identify different schemes to establish user trust. We will learn how to implement methods for evading censor detection and blocking. We will understand various methods for protecting publisher information and current open and active CRS research areas....
Reading
5 видео ((всего 28 мин.)), 5 материалов для самостоятельного изучения, 6 тестов
Video5 видео
L4.2. CRS Properties11мин
L4.3. Techniques for CRS Communication Establishment Phase3мин
L4.4. Techniques for CRS Conversation Phase.4мин
L4.5. Open CRS Research Areas3мин
Reading5 материала для самостоятельного изучения
L4.1. Censorship Resistancde System Overview10мин
L4.2. CRS Properties.10мин
L4.3. Techniques for Communication Establishment Phase .10мин
L4.4. Techniques for Conversation Phase10мин
L4.5. Open Areas and Research Challenges.10мин
Quiz6 практического упражнения
L4.1 Practice Quiz8мин
L4.2 Practice Quiz8мин
L4.3 Practice Quiz8мин
L4.4 Practice Quiz8мин
L4.5 Practice Quiz4мин
M4 Exam

Преподавателя

Avatar

Edward Chow

Professor
Computer Science
Avatar

Greg Williams

Lecturer
Department of Computer Science
Avatar

Richard White

Assistant Research Professor
Computer Science

О University of Colorado System

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

Часто задаваемые вопросы

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

Остались вопросы? Посетите Центр поддержки учащихся.