TrueschoTruescho
All Courses
Security and Privacy in TOR Network
Coursera
Course
Unknown

Security and Privacy in TOR Network

University of Colorado System

Learn TOR network basics, user privacy protection, censorship resistance, setup of hidden services, and operational security best practices.

Unknown4 weeksEnglish6,619 enrolled

About this Course

In this MOOC, we will learn about TOR basic concept and see how they protect the security and privacy of users and resist censorship. We will examine how TOR realize the anonymity and utilize its service by downloading and using Tor browser software. A recent attack on TOR’s application flow control called sniper attacks is analyzed. We introduce the hidden service provided by TOR and show how it can be denonymized. We will learn how to setup a hidden server to provide web service on AWS instance. We will also learn the best practices and operational security in providing the hidden services. We will learn how to manage the hidden server using Tor circuit and configure the web server not to reveal the software version information. We also show how it can be defended. To improve TOR’s performance, we discuss the cloud based TOR and their implementation. By the end of this course, you should be able to utilize TOR browser to protect your privacy, set up hidden service on current interface that protect your servers and make it anonymous, you will choosing entry guards wisely since your adversary will try to attack them with DDoS traffic and force you to choose their relay as your entry and exit router. We will also learn the basic components of both censorship and censorship resistance systems, and the scheme deployed by these systems and their attacks

What You'll Learn

  • Understand basic TOR network concepts
  • Protect user security and privacy
  • Comprehend censorship resistance mechanisms
  • Set up a hidden server for web service on AWS
  • Apply operational security best practices

Prerequisites

  • Basic familiarity with the topic and its common terminology
  • Readiness to practice through applied exercises or case-based work

Instructors

E

Edward Chow

Professor

G

Greg Williams

Lecturer

R

Richard White

Assistant Research Professor

Topics

Computer Security and Networks
Computer Science
Security
Information Technology
Information Systems Security
Servers
Network Security
Web Servers
Network Routing
Distributed Denial-Of-Service (DDoS) Attacks

Course Info

PlatformCoursera
LevelUnknown
PacingUnknown
PriceFree

Skills

أمن الشبكات والحواسيب
علوم الحاسوب
الأمان
تكنولوجيا المعلومات
أمن نظم المعلومات
الخوادم
أمن الشبكات
خوادم الويب
Network Routing
Distributed Denial-Of-Service (DDoS) Attacks

Start Learning Now