About this Specialization
14,962 recent views

100% online courses

Start instantly and learn at your own schedule.

Flexible Schedule

Set and maintain flexible deadlines.

Intermediate Level

Approx. 4 months to complete

Suggested 4 hours/week

English

Subtitles: English

100% online courses

Start instantly and learn at your own schedule.

Flexible Schedule

Set and maintain flexible deadlines.

Intermediate Level

Approx. 4 months to complete

Suggested 4 hours/week

English

Subtitles: English

How the Specialization Works

Take Courses

A Coursera Specialization is a series of courses that helps you master a skill. To begin, enroll in the Specialization directly, or review its courses and choose the one you'd like to start with. When you subscribe to a course that is part of a Specialization, you’re automatically subscribed to the full Specialization. It’s okay to complete just one course — you can pause your learning or end your subscription at any time. Visit your learner dashboard to track your course enrollments and your progress.

Hands-on Project

Every Specialization includes a hands-on project. You'll need to successfully finish the project(s) to complete the Specialization and earn your certificate. If the Specialization includes a separate course for the hands-on project, you'll need to finish each of the other courses before you can start it.

Earn a Certificate

When you finish every course and complete the hands-on project, you'll earn a Certificate that you can share with prospective employers and your professional network.

how it works

There are 4 Courses in this Specialization

Course1

Design and Analyze Secure Networked Systems

4.0
62 ratings
15 reviews
Course2

Basic Cryptography and Programming with Crypto API

4.1
12 ratings
3 reviews
Course3

Hacking and Patching

4.1
54 ratings
12 reviews
Course4

Secure Networked System with Firewall and IDS

3.2
11 ratings
3 reviews

Instructor

Avatar

Edward Chow

Professor
Computer Science

About University of Colorado System

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

Frequently Asked Questions

  • Yes! To get started, click the course card that interests you and enroll. You can enroll and complete the course to earn a shareable certificate, or you can audit it to view the course materials for free. When you subscribe to a course that is part of a Specialization, you’re automatically subscribed to the full Specialization. Visit your learner dashboard to track your progress.

  • This course is completely online, so there’s no need to show up to a classroom in person. You can access your lectures, readings and assignments anytime and anywhere via the web or your mobile device.

  • 16 weeks.

  • Know one high level programming language, basic Unix system commands, and discrete mathematics in particular the number theory.

  • Yes. MOOC1 covers security design principles and concepts. Learning it first will help understand basic security terms which are used in other MOOCs and how the principles and basic security services are applied in various situations. MOOC2 helps the learners understanding the basic cryptography and related crypto API to create secure web app. These knowledge help learners assess the hacking and patching skill/tools needed in MOOC3. MOOC4 should be done last since it integrates all cyber security knowledge to implement security policies and their enforcement procedures for hardening a networked systems.

  • At this time, this Specialization is not credit bearing. At a future time, this content may contribute in part towards university credit. Please note that additional costs and requirements may be entailed once credit is offered.

  • You should be able to create public/private keys, certificate requests, install/sign/verify them for web server and client authentication, secure emails, and code signing.

    You should be able to write secure web apps with Crypto API to implement the confidentiality, integrity, and availability basic security services.

    You should be able to hack web applications with Command Injection and SQL Injection vulnerabilities and patch them.

    You should be able to apply penetration testing tool to exploit vulnerable systems.

    You should be able to use hashcat softare and AWS P3 GPU to crack passwords using dictionary attacks and mask patterns.

    You should be able to configure firewall and IDS for secure network systems using AWS VPCs.

    You should be able to specify effective security policies and implement efficient enforcement procedures by applying security design principles for securing network systems.

More questions? Visit the Learner Help Center.