Back to Courses

Security Courses - Page 18

Showing results 171-173 of 173
Networks and Communications Security
Welcome to Networks and Communications Security Course! In the Networks and Communications Security Course, you will learn about the network structure, data transmission methods, transport formats, and the security measures used to maintain integrity, availability, authentication, and confidentiality of the information being transmitted. Concepts for both public and private communication networks will be discussed. Course Objectives 1. Describe network-related security issues 2. Identify protective measures for telecommunication technologies 3. Define processes for controlling network access 4. Identify processes for managing LAN-based security 5. Describe procedures for operating and configuring networked-based security devices 6. Define procedures to implement and operate wireless technologies
Security and Privacy in TOR Network
In this MOOC, we will learn about TOR basic concept and see how they protect the security and privacy of users and resist censorship. We will examine how TOR realize the anonymity and utilize its service by downloading and using Tor browser software. A recent attack on TOR’s application flow control called sniper attacks is analyzed. We introduce the hidden service provided by TOR and show how it can be denonymized. We will learn how to setup a hidden server to provide web service on AWS instance. We will also learn the best practices and operational security in providing the hidden services. We will learn how to manage the hidden server using Tor circuit and configure the web server not to reveal the software version information. We also show how it can be defended. To improve TOR’s performance, we discuss the cloud based TOR and their implementation. By the end of this course, you should be able to utilize TOR browser to protect your privacy, set up hidden service on current interface that protect your servers and make it anonymous, you will choosing entry guards wisely since your adversary will try to attack them with DDoS traffic and force you to choose their relay as your entry and exit router. We will also learn the basic components of both censorship and censorship resistance systems, and the scheme deployed by these systems and their attacks.
Introduction to Enterprise Resiliency
Resiliency is the ability to provide the required capability in the face of adversity, without significant impact. This is not something that just happens, but rather must be thoroughly planned for and tested, including: 1. Keeping hardware, the operating system, middleware, and applications up and running throughout planned and unplanned outages 2. Recovering a site from an unplanned event without data loss This course is intended for IT managers, IT architects, system programmers, and system operations professionals. It is a high-level course that uses IBM Z architecture to demonstrate these concepts. Learners will be able to earn their badge on successful completion of this course. More details on this link: https://www.youracclaim.com/org/ibm/badge/introduction-to-enterprise-resiliency