Master advanced security concepts including RBAC, ABAC, and geolocation-based security. Learn access control and authentication systems.
Master advanced security concepts including RBAC, ABAC, and geolocation-based security. Learn access control and authentication systems.
This course cannot be purchased separately - to access the complete learning experience, graded assignments, and earn certificates, you'll need to enroll in the full Advanced System Security Design Specialization program. You can audit this specific course for free to explore the content, which includes access to course materials and lectures. This allows you to learn at your own pace without any financial commitment.
4.5
(142 ratings)
16,771 already enrolled
Instructors:
English
Tiếng Việt
What you'll learn
Master Role-Based Access Control (RBAC) implementation
Understand Attribute-Based Access Control (ABAC) systems
Implement geolocation-based security features
Configure authentication and authorization systems
Develop secure access control policies using XACML
Skills you'll gain
This course includes:
1.3 Hours PreRecorded video
16 assignments
Access on Mobile, Tablet, Desktop
FullTime access
Shareable certificate
Closed caption
Get a Completion Certificate
Share your certificate with prospective employers and your professional network on LinkedIn.
Created by
Provided by

Top companies offer this course to their employees
Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.





There are 4 modules in this course
This comprehensive course explores advanced system security topics with a focus on modern access control mechanisms. Students learn about Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), and geolocation-based security features. The curriculum covers implementation of security systems using tools like Docker UCP, AWS IAM, and XACML. Through practical examples and hands-on assignments, learners master techniques for enhancing data security with geoencryption and secure enhanced geolocking.
Enhance Security with Geolocation
Module 1 · 4 Hours to complete
Enhance Security with Network and Context Information
Module 2 · 2 Hours to complete
Authentication and Role Based Access Control
Module 3 · 4 Hours to complete
Authorization and Attribute Based Access Control
Module 4 · 3 Hours to complete
Fee Structure
Instructors
Distinguished Expert in Cybersecurity and Network Systems
Edward Chow serves as Professor of Computer Science at the University of Colorado Colorado Springs, bringing over three decades of expertise in network security and system design. After earning his Ph.D. from the University of Texas at Austin in 1985, he worked at Bell Communications Research before joining UCCS in 1991. His research focuses on improving security, reliability, and performance of network systems, leading to two US patents in distributed network restoration and survivable architecture. On Coursera, he leads the Advanced System Security Design Specialization, which has attracted over 9,207 students, teaching courses in cloud computing security, TOR networks, and DDoS defense. His recent innovations include developing efficient Internet Security protocols for online storage systems and creating secure information sharing systems using attribute certificates. His current work involves Software Defined Networks for defending against DDoS attacks and enhancing data security through right path right place data delivery (R2D2). His contributions extend to assistive technologies, combining Laban dance notation with wireless sensor-based human motion tracking systems for rehabilitation care.
Expert in Cybersecurity and Information Technology Leadership
Greg Williams serves as a Lecturer in the Department of Computer Science at the University of Colorado Colorado Springs, bringing extensive practical experience in cybersecurity and IT operations to his teaching role. While maintaining his academic position, he serves as Director of Operations in the Office of Information Technology, where he oversees critical network infrastructure, telecommunications, and IT operations for the university. His background includes significant experience as the university's Information Security Officer and HIPAA Security Officer, giving him unique insights into healthcare data security and compliance. With over five years of teaching experience focused on cybersecurity, he combines theoretical knowledge with real-world applications in his courses. His dual role as both educator and IT director allows him to bring current industry practices and challenges directly into the classroom, providing students with practical, relevant knowledge in cybersecurity and information technology management. His expertise spans network security, infrastructure management, and telecommunications, making him a valuable resource for both academic and operational aspects of IT security
Testimonials
Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.
4.5 course rating
142 ratings
Frequently asked questions
Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.