Loading...

Course Description

If an attacker can masquerade as an authorized user of a system, then many other defenses become irrelevant. This course addresses how a computing system can authenticate a human user, discussing implementations of mechanisms as well as their privacy implications. You will explore the protocols of passwords, biometrics, and tokens, along with their combination as multifactor authentication.

The following course is required to be completed before taking this course:

  • Systems Security

Additionally, you are required to have completed the following course or have equivalent experience:

  • Authenticating Machines

Faculty Author

Fred Schneider

Benefits to the Learner

  • Explain the goals of a system for authenticating humans
  • Devise a multifactor authentication scheme for an existing system
  • Design a password authentication system that defends against online and offline guessing attacks
  • Compare different protocols for one-time passwords
  • Formulate a token-based authentication scheme
  • Evaluate the quality and feasibility of a proposed biometric for authentication

Target Audience

  • IT professionals
  • Developers
  • Programmers
  • Analysts
  • Software engineers
  • Cybersecurity professionals

Accrediting Associations

Applies Towards the Following Certificates

Loading...
Cornell Computing and Information Science
Thank you for your interest in this course. Unfortunately, the course you have selected is currently not open for enrollment. Please complete a Course Inquiry so that we may promptly notify you when enrollment opens.
Required fields are indicated by .