This course is designed to give you a solid foundation in how information is protected in the digital age. Step into the world of cryptography—the science behind secure communication. This course aims to prepare you for an exciting and in-depth journey into the world of modern cryptography. Designed for undergraduate students, it introduces the core principles, mathematical foundations, and practical applications that make secure digital communication possible today. You will start by learning the basics of cryptographic systems, including classical ciphers (block and stream), modular arithmetic, and finite fields—tools that form the backbone of encryption.

Cryptography
Erweitern Sie Ihre Kenntnisse mit Coursera Plus für 239 $/Jahr (normalerweise 399 $). Jetzt sparen.
kurs ist nicht verfügbar in Deutsch (Deutschland)

Empfohlene Erfahrung
Empfohlene Erfahrung
Stufe „Mittel“
Learners should have an understanding of the basics of computer networks and fundamental networking concepts.
Empfohlene Erfahrung
Empfohlene Erfahrung
Stufe „Mittel“
Learners should have an understanding of the basics of computer networks and fundamental networking concepts.
Was Sie lernen werden
Understand various cryptographic and network security services and mechanisms
Apply various cryptographic techniques and system-level network security applications
Analyse various cryptographic techniques and system-level network security applications
Evaluate the cryptographic algorithms, hash algorithms and network application security schemes
Kompetenzen, die Sie erwerben
- Kategorie: Email SecurityEmail Security
- Kategorie: Identity and Access ManagementIdentity and Access Management
- Kategorie: Application SecurityApplication Security
- Kategorie: CybersecurityCybersecurity
Werkzeuge, die Sie lernen werden
- Kategorie: FirewallFirewall
Wichtige Details

Zu Ihrem LinkedIn-Profil hinzufügen
Februar 2026
103 Aufgaben
Erfahren Sie, wie Mitarbeiter führender Unternehmen gefragte Kompetenzen erwerben.

In diesem Kurs gibt es 12 Module
In this module, the learners will be introduced to the course and its syllabus, setting the foundation for their learning journey. The course's introductory video will provide them with insights into the valuable skills and knowledge they can expect to gain throughout the duration of this course. Additionally, the syllabus reading will comprehensively outline essential course components, including course values, assessment criteria, grading system, schedule, details of live sessions, and a recommended reading list that will enhance the learner’s understanding of the course concepts. Moreover, this module offers the learners the opportunity to connect with fellow learners as they participate in a discussion prompt designed to facilitate introductions and exchanges within the course community.
Das ist alles enthalten
3 Videos1 Lektüre1 Diskussionsthema
3 Videos•Insgesamt 6 Minuten
- Course Introduction•3 Minuten
- Meet Your Instructor: Prof. Pradnya Kashikar•2 Minuten
- Meet Your Instructor: Prof. Rajesh Kumar•1 Minute
1 Lektüre•Insgesamt 20 Minuten
- Course Overview•20 Minuten
1 Diskussionsthema•Insgesamt 10 Minuten
- Meet Your Peers•10 Minuten
Cryptographic principles are the fundamental concepts and techniques that are used in the field of cryptography to secure communication and protect data. These principles include confidentiality, integrity, authentication, non-repudiation, and key management. Students will grasp how cryptography protects our digital world. We will start with its purpose — turning sensitive data into unreadable formats to keep it safe. Then, we will break down the key principles: confidentiality, integrity, and authentication. We will uncover the essential security services — like access control and non-repudiation. You will learn what they do and why they are crucial for any secure system. We will also explore the mechanisms that make it all work: encryption, hashing, and more.
Das ist alles enthalten
10 Videos10 Lektüren10 Aufgaben1 Diskussionsthema
10 Videos•Insgesamt 83 Minuten
- Basics of Information Security•8 Minuten
- Basic Terminology•9 Minuten
- CIA Triad - 1 •13 Minuten
- CIA Triad - 2•8 Minuten
- CIA Triad - 3•8 Minuten
- Services and Mechanisms•4 Minuten
- Security Policy•8 Minuten
- Security Mechanisms•8 Minuten
- Security Models•12 Minuten
- Module Wrap Up Video•3 Minuten
10 Lektüren•Insgesamt 145 Minuten
- Recommended Reading: Basics of Information Security•15 Minuten
- Recommended Reading: Basic Terminology •15 Minuten
- Recommended Reading: CIA Triad - 1 •15 Minuten
- Recommended Reading: CIA Triad - 2•15 Minuten
- Recommended Reading: CIA Triad - 3•15 Minuten
- Recommended Reading: Service and Mechanisms•15 Minuten
- Recommended Reading: Security Policy •15 Minuten
- Recommended Reading: Security Mechanisms•15 Minuten
- Recommended Reading: Security Models•15 Minuten
- Recommended Reading: Module Wrap Up•10 Minuten
10 Aufgaben•Insgesamt 57 Minuten
- Basics of Information Security•3 Minuten
- Basic Terminology•6 Minuten
- CIA Triad - 1•6 Minuten
- CIA Triad - 2•6 Minuten
- CIA Triad - 3•6 Minuten
- Services and Mechanisms•6 Minuten
- Security Policy•6 Minuten
- Security Mechanisms•6 Minuten
- Security Models•6 Minuten
- Module Wrap Up Video•6 Minuten
1 Diskussionsthema•Insgesamt 30 Minuten
- Conceptual Foundations of Information Security•30 Minuten
This module introduces students to the foundational techniques of classical cryptography, focusing on how information is transformed to ensure secure communication. Learners will begin by understanding the basic concepts of plain text (readable data) and cipher text (encrypted data), establishing the groundwork for how cryptographic systems operate. The module then explores substitution techniques, where symbols in the plaintext are replaced with other symbols to obscure meaning. Examples such as the Caesar cipher, monoalphabetic cipher, and Vigenère cipher will be studied to illustrate how substitution alters data while maintaining structure. Next, students will examine transposition techniques, which rearrange the positions of characters without changing the symbols themselves. Methods like the Rail Fence cipher and Columnar transposition will demonstrate how order manipulation enhances security.
Das ist alles enthalten
13 Videos13 Lektüren14 Aufgaben1 Diskussionsthema
13 Videos•Insgesamt 76 Minuten
- Basic Terminology•5 Minuten
- Cryptoterms•3 Minuten
- Cryptography Mechanisms•5 Minuten
- Substitution Techniques•4 Minuten
- Substitution Techniques - 1•7 Minuten
- Substitution Techniques - 2•5 Minuten
- Substitution Techniques - 3•4 Minuten
- Transposition Techniques•6 Minuten
- Transposition Techniques - 1•7 Minuten
- Transposition Techniques - 2•8 Minuten
- Encryption and Decryption•8 Minuten
- Key Distribution and MIMT•12 Minuten
- Module Wrap-Up Video•2 Minuten
13 Lektüren•Insgesamt 175 Minuten
- Recommended Reading: Basic Terminology•15 Minuten
- Recommended Reading: Cryptoterms•15 Minuten
- Recommended Reading: Cryptography Mechanisms•15 Minuten
- Recommended Reading: Substitution Techniques•15 Minuten
- Recommended Reading: Substitution Techniques - 1•15 Minuten
- Recommended Reading: Substitution Techniques - 2•15 Minuten
- Recommended Reading: Substitution Techniques - 3•10 Minuten
- Recommended Reading: Transposition Techniques•10 Minuten
- Recommended Reading: Transposition Techniques - 1•10 Minuten
- Recommended Reading: Transposition Techniques - 2•15 Minuten
- Recommended Reading: Encryption and Decryption•15 Minuten
- Recommended Reading: Key Distribution and MIMT•15 Minuten
- Recommended Reading: Module Wrap Up•10 Minuten
14 Aufgaben•Insgesamt 174 Minuten
- Basic Terminology•9 Minuten
- Cryptoterms•9 Minuten
- Cryptography Mechanisms•6 Minuten
- Substitution Techniques•9 Minuten
- Substitution Techniques - 1•9 Minuten
- Substitution Techniques - 2•9 Minuten
- Substitution Techniques - 3•9 Minuten
- Transposition Techniques•9 Minuten
- Transposition Techniques - 1•9 Minuten
- Transposition Techniques - 2•9 Minuten
- Encryption and Decryption•9 Minuten
- Key Distribution and MIMT•9 Minuten
- Module Wrap-Up Video•9 Minuten
- Graded Quiz - Modules 1 and 2•60 Minuten
1 Diskussionsthema•Insgesamt 30 Minuten
- Introduction to Cryptography Techniques•30 Minuten
This module introduces symmetric key cryptography and its role in securing data. Learners will explore commonly used symmetric encryption algorithms such as AES, DES, 3DES, and Blowfish, and examine block cipher modes of operation including ECB, CBC, CFB, OFB, and CTR. The module also focuses on the practical application of encryption and decryption using different modes, along with an analysis of security vulnerabilities, key management challenges, and real-world use cases of symmetric cryptographic systems.
Das ist alles enthalten
5 Videos5 Lektüren5 Aufgaben1 Diskussionsthema
5 Videos•Insgesamt 31 Minuten
- Introduction•4 Minuten
- Algorithm Modes-1•9 Minuten
- Algorithm Modes-2•7 Minuten
- Algorithm Modes-3•7 Minuten
- Module Wrap Up Video•3 Minuten
5 Lektüren•Insgesamt 65 Minuten
- Recommended Reading: Introduction •10 Minuten
- Recommended Reading: Algorithm Modes-1•15 Minuten
- Recommended Reading: Algorithm Modes-2•15 Minuten
- Recommended Reading: Algorithm Modes-3•15 Minuten
- Recommended Reading: Module Wrap Up•10 Minuten
5 Aufgaben•Insgesamt 45 Minuten
- Introduction•9 Minuten
- Algorithm Modes-1•9 Minuten
- Algorithm Modes-2•9 Minuten
- Algorithm Modes-3•9 Minuten
- Module Wrap Up Video•9 Minuten
1 Diskussionsthema•Insgesamt 30 Minuten
- Symmetric Key Cryptography•30 Minuten
This module introduces symmetric key cryptography and the concept of shared secret keys. Learners will study classical encryption algorithms such as DES, Double DES, and Triple DES, and explore symmetric key encryption algorithms including IDEA, RC5, and modern standards such as AES and Blowfish. The module also compares block ciphers and stream ciphers through practical examples, and analyses the strengths, limitations, and real-world applications of symmetric encryption algorithms in secure systems.
Das ist alles enthalten
6 Videos6 Lektüren7 Aufgaben1 Diskussionsthema
6 Videos•Insgesamt 58 Minuten
- Introduction•5 Minuten
- DES - 1•10 Minuten
- DES - 2•16 Minuten
- DES - 3•12 Minuten
- IDEA, RC5, BLOWFISH and AES•14 Minuten
- Module Wrap Up Video•2 Minuten
6 Lektüren•Insgesamt 75 Minuten
- Recommended Reading: Introduction•5 Minuten
- Recommended Reading: DES - 1•15 Minuten
- Recommended Reading: DES - 2•15 Minuten
- Recommended Reading: DES - 3•15 Minuten
- Recommended Reading: IDEA_RC5_AES_BLOWFISH•15 Minuten
- Recommended Reading: Module Wrap Up•10 Minuten
7 Aufgaben•Insgesamt 114 Minuten
- Introduction•9 Minuten
- DES - 1•9 Minuten
- DES - 2•9 Minuten
- DES - 3•9 Minuten
- IDEA, RC5, BLOWFISH and AES•9 Minuten
- Module Wrap Up Video•9 Minuten
- Graded Quiz - Modules 3 and 4•60 Minuten
1 Diskussionsthema•Insgesamt 30 Minuten
- Symmetric Key Cryptography•30 Minuten
Asymmetric Key Cryptography, also known as Public Key Cryptography, is a cryptographic system that uses a pair of mathematically related keys — a public key for encryption and a private key for decryption. This module explores the underlying mathematical concepts, key generation, encryption and decryption processes, digital signatures, and the role of asymmetric cryptography in securing modern communication systems such as SSL/TLS and email encryption.
Das ist alles enthalten
10 Videos4 Lektüren11 Aufgaben1 Diskussionsthema
10 Videos•Insgesamt 107 Minuten
- Symmetric vs. Asymmetric Systems•7 Minuten
- Definition and Characteristics of Asymmetric Cryptography•8 Minuten
- Real-World Applications•7 Minuten
- Euler’s Theorem and Totient Function•10 Minuten
- Prime Numbers and GCD•16 Minuten
- Primality Testing Methods•7 Minuten
- The Chinese Remainder Theorem•27 Minuten
- Definition and Relevance•6 Minuten
- Computational Complexity in Cryptography•10 Minuten
- One-Way and Trapdoor Functions•8 Minuten
4 Lektüren•Insgesamt 205 Minuten
- Recommended Reading: Fundamentals of Asymmetric Cryptography•60 Minuten
- Recommended Reading: Number Theory in Cryptography•75 Minuten
- Recommended Reading: Primality Testing and Modular Arithmetic•60 Minuten
- Recommended Reading: Discrete Logarithms and Security Foundations•10 Minuten
11 Aufgaben•Insgesamt 288 Minuten
- Symmetric vs. Asymmetric Systems•9 Minuten
- Definition and Characteristics of Asymmetric Cryptography•9 Minuten
- Real-World Applications•9 Minuten
- Euler’s Theorem and Totient Function•12 Minuten
- Prime Numbers and GCD•12 Minuten
- Primality Testing Methods•12 Minuten
- The Chinese Remainder Theorem•12 Minuten
- Definition and Relevance•9 Minuten
- Computational Complexity in Cryptography•12 Minuten
- One-Way and Trapdoor Functions•12 Minuten
- SGA-1: Cryptography Techniques and Their Implementation•180 Minuten
1 Diskussionsthema•Insgesamt 30 Minuten
- Foundations and Applications of Asymmetric Key Cryptography•30 Minuten
The Asymmetric Key Cryptography Algorithms module focuses on the study and implementation of major public key algorithms used to secure data and communications. It covers key algorithms such as RSA, Diffie-Hellman, ElGamal, and Elliptic Curve Cryptography (ECC), exploring their mathematical foundations, key generation processes, encryption and decryption mechanisms, and real-world applications in digital security. The module also examines the strengths, weaknesses, and performance considerations of each algorithm in various cryptographic contexts.
Das ist alles enthalten
10 Videos3 Lektüren11 Aufgaben1 Diskussionsthema
10 Videos•Insgesamt 99 Minuten
- RSA Overview and Historical Background •7 Minuten
- RSA Key Generation Process•12 Minuten
- RSA Encryption and Decryption•9 Minuten
- Diffie-Hellman Key Exchange – Protocol and Security•18 Minuten
- ElGamal Encryption System – Steps and Usage•14 Minuten
- Introduction to Elliptic Curve Arithmetic•7 Minuten
- ECC-Based Key Exchange•9 Minuten
- Advantages of ECC Compared to RSA•5 Minuten
- Pseudorandom Number Generation in Asymmetric Cryptography•9 Minuten
- Comparison of RSA, DH, ElGamal, and ECC•8 Minuten
3 Lektüren•Insgesamt 210 Minuten
- Recommended Reading: RSA Algorithm •60 Minuten
- Recommended Reading: Diffie-Hellman and ElGamal Systems•75 Minuten
- Recommended Reading: Elliptic Curve Cryptography (ECC) •75 Minuten
11 Aufgaben•Insgesamt 177 Minuten
- RSA Overview and Historical Background•12 Minuten
- RSA Key Generation Process •12 Minuten
- RSA Encryption and Decryption•12 Minuten
- Diffie-Hellman Key Exchange – Protocol and Security•12 Minuten
- ElGamal Encryption System – Steps and Usage•12 Minuten
- Introduction to Elliptic Curve Arithmetic•12 Minuten
- ECC-Based Key Exchange•12 Minuten
- Advantages of ECC Compared to RSA•9 Minuten
- Pseudorandom Number Generation in Asymmetric Cryptography•12 Minuten
- Comparison of RSA, DH, ElGamal, and ECC•12 Minuten
- Graded Quiz - Modules 5 and 6•60 Minuten
1 Diskussionsthema•Insgesamt 30 Minuten
- Advanced Asymmetric Algorithms: Diffie-Hellman, ElGamal, and Elliptic Curve Cryptography•30 Minuten
The Public Key Infrastructure (PKI) module provides an in-depth understanding of the framework that enables secure electronic communication through the management of public-key encryption and digital certificates. This module explores the core components of PKI, including Certificate Authorities (CAs), Registration Authorities (RAs), digital certificates, certificate revocation, and trust models. It also discusses how PKI supports secure email, web authentication (SSL/TLS), code signing, and identity verification in modern networked environments.
Das ist alles enthalten
12 Videos4 Lektüren12 Aufgaben1 Diskussionsthema
12 Videos•Insgesamt 97 Minuten
- Definition and Purpose of PKI•6 Minuten
- Components of PKI•7 Minuten
- How PKI Works: High-Level Process•8 Minuten
- PKI Trust Models•10 Minuten
- Certificate Life Cycle Management•6 Minuten
- Certificate Revocation Mechanisms•8 Minuten
- Types of Certificates•7 Minuten
- X.509 Certificate Format•7 Minuten
- Certificate Chains and Path Validation•10 Minuten
- Common PKI Challenges•10 Minuten
- PKI Applications•8 Minuten
- PKI in Emerging Technologies•9 Minuten
4 Lektüren•Insgesamt 270 Minuten
- Recommended Reading: PKI Fundamentals•60 Minuten
- Recommended Reading: PKI Trust Models and Life Cycles•75 Minuten
- Recommended Reading: Types and Formats of Digital Certificates•75 Minuten
- Recommended Reading: PKI Challenges and Emerging Applications•60 Minuten
12 Aufgaben•Insgesamt 165 Minuten
- Definition and Purpose of PKI•12 Minuten
- Components of PKI•12 Minuten
- How PKI Works: High-Level Process•12 Minuten
- PKI Trust Models•12 Minuten
- Certificate Life Cycle Management•12 Minuten
- Certificate Revocation Mechanisms•12 Minuten
- Types of Certificates•12 Minuten
- X.509 Certificate Format•12 Minuten
- Certificate Chains and Path Validation•12 Minuten
- Common PKI Challenges•21 Minuten
- PKI Applications•15 Minuten
- PKI in Emerging Technologies•21 Minuten
1 Diskussionsthema•Insgesamt 30 Minuten
- Understanding Public Key Infrastructure: Trust, Certificates, and Operational Challenges•30 Minuten
This module introduces authentication and its role in securing digital systems. Learners will study password-based authentication methods and their limitations, and explore biometric techniques such as fingerprint, facial recognition, and iris-based authentication. The module also examines two-factor and multi-factor authentication, token-based approaches, single sign-on, certificate-based authentication, and Kerberos. Finally, learners will analyse the strengths, weaknesses, vulnerabilities, and real-world applications of different authentication techniques.
Das ist alles enthalten
12 Videos12 Lektüren14 Aufgaben1 Diskussionsthema
12 Videos•Insgesamt 119 Minuten
- Introduction•15 Minuten
- Password Based Authentication Techniques•12 Minuten
- Password Based Authentication Techniques - 2•12 Minuten
- Two-Factor Authentication•12 Minuten
- Multi-Factor Authentication•11 Minuten
- Biometric Authentication Techniques•10 Minuten
- Biometric Authentication Techniques - 2•14 Minuten
- Authentication Tokens•9 Minuten
- Single-Sign-On•7 Minuten
- Certificate Based Authentication•6 Minuten
- Kerberos•10 Minuten
- Module Wrap Up Video•3 Minuten
12 Lektüren•Insgesamt 175 Minuten
- Recommended Reading: Introduction•15 Minuten
- Recommended Reading: Password-Based Authentication Techniques-1•15 Minuten
- Recommended Reading: Password Based Authentication Techniques - 2•15 Minuten
- Recommended Reading: Two-Factor Authentication•15 Minuten
- Recommended Reading: Multi-Factor Authentication•15 Minuten
- Recommended Reading: Biometric Authentication Techniques•15 Minuten
- Recommended Reading: Biometric Authentication Techniques -2•15 Minuten
- Recommended Reading: Authentication Tokens•15 Minuten
- Recommended Reading: Single-Sign-On•15 Minuten
- Recommended Reading: Certificate Based Authentication•15 Minuten
- Recommended Reading: Kerberos•15 Minuten
- Recommended Reading: Module Wrap Up•10 Minuten
14 Aufgaben•Insgesamt 288 Minuten
- Introduction•9 Minuten
- Password Based Authentication Techniques•9 Minuten
- Password Based Authentication Techniques - 2•9 Minuten
- Two-Factor Authentication•9 Minuten
- Multi-Factor Authentication•9 Minuten
- Biometric Authentication Techniques•9 Minuten
- Biometric Authentication Techniques - 2•9 Minuten
- Authentication Tokens•9 Minuten
- Single-Sign-On•9 Minuten
- Certificate Based Authentication•9 Minuten
- Kerberos•9 Minuten
- Wrap Up Video•9 Minuten
- Graded Quiz - Modules 7 and 8•60 Minuten
- SGA-2: Asymmetric Cryptography and Digital Trust•120 Minuten
1 Diskussionsthema•Insgesamt 30 Minuten
- The Case of SecureAccess Corp•30 Minuten
This module introduces the fundamentals of Internet security and cryptography. Learners will examine common Internet security protocols, including HTTPS, SSL/TLS, IPsec, SSH, SFTP, Kerberos, and OAuth 2.0/OpenID Connect. The module further explores advanced topics such as email security using PGP and S/MIME, core elements of web security, common web security threats, best practices, and emerging trends. Additionally, learners will study network security mechanisms including firewalls, intrusion detection and prevention systems (IDS/IPS), and virtual private networks (VPNs), and evaluate their role in securing modern Internet-based systems.
Das ist alles enthalten
9 Videos9 Lektüren9 Aufgaben1 Diskussionsthema
9 Videos•Insgesamt 95 Minuten
- Introduction•7 Minuten
- Internet Security Protocols - 1•17 Minuten
- SSH, SFTP, Kerberos, OAuth•17 Minuten
- Email Security•15 Minuten
- Web Security•14 Minuten
- Firewalls•9 Minuten
- IDS/IPS•8 Minuten
- VPN•6 Minuten
- Module Wrap Up Video•2 Minuten
9 Lektüren•Insgesamt 125 Minuten
- Recommended Reading: Introduction•15 Minuten
- Recommended Reading: Internet Security Protocols - 1•15 Minuten
- Recommended Reading: SSH, SFTP, Kerberos, OAuth•15 Minuten
- Recommended Reading: Email Security•15 Minuten
- Recommended Reading: Web Security•15 Minuten
- Recommended Reading: Firewalls•15 Minuten
- Recommended Reading: IDS and IPS•15 Minuten
- Recommended Reading: VPN•10 Minuten
- Recommended Reading: Module Wrap Up•10 Minuten
9 Aufgaben•Insgesamt 141 Minuten
- Introduction•9 Minuten
- Internet Security Protocols - 1•9 Minuten
- SSH, SFTP, Kerberos, OAuth•18 Minuten
- Email Security•18 Minuten
- Web Security•18 Minuten
- Firewalls•21 Minuten
- IDS/IPS•24 Minuten
- VPN (Virtual Private Network)•21 Minuten
- Module Wrap Up Video•3 Minuten
1 Diskussionsthema•Insgesamt 30 Minuten
- The GlobalTech Security Breach•30 Minuten
This module introduces modern cryptography and focuses on advanced cryptographic techniques designed to enable privacy, security, and trust in contemporary digital systems. Learners will explore secure multi-party computation, zero-knowledge proofs, fully homomorphic encryption, and oblivious RAM, along with functional encryption and private information retrieval. The module also examines symmetric searchable encryption and leakage-resilient cryptography, and concludes with applications of modern cryptography in secure voting and secure election systems.
Das ist alles enthalten
8 Videos8 Lektüren9 Aufgaben1 Diskussionsthema
8 Videos•Insgesamt 67 Minuten
- Introduction•15 Minuten
- Secure Multi-Party Computation (MPC)•8 Minuten
- Zero-Knowledge Proofs (ZKPs)•10 Minuten
- FHE and ORAM•6 Minuten
- Function Encryption and PIR•6 Minuten
- Symmetric Searchable Encryption and Leakage-Resilient Cryptogarphy•7 Minuten
- Secure Voting & Secure Elections•13 Minuten
- Module Wrap Up Video•3 Minuten
8 Lektüren•Insgesamt 100 Minuten
- Recommended Reading: Introduction•15 Minuten
- Recommended Reading: Secure Multi-Party Computation (MPC)•15 Minuten
- Recommended Reading: Zero-Knowledge Proofs (ZKPs)•15 Minuten
- Recommended Reading: FHE and ORAM•10 Minuten
- Recommended Reading: Function Encryption and PIR•10 Minuten
- Recommended Reading: Symmetric Searchable Encryption and Leakage-Resilient Cryptogarphy•10 Minuten
- Recommended Reading: Secure Voting & Secure Elections•15 Minuten
- Recommended Reading: Module Wrap Up•10 Minuten
9 Aufgaben•Insgesamt 216 Minuten
- Introduction•15 Minuten
- Secure Multi-Party Computation (MPC)•15 Minuten
- Zero-Knowledge Proofs (ZKPs)•18 Minuten
- FHE and ORAM•18 Minuten
- Function Encryption and PIR•18 Minuten
- Symmetric Searchable Encryption and Leakage-Resilient Cryptogarphy•18 Minuten
- Secure Voting & Secure Elections•24 Minuten
- Module Wrap Up Video•30 Minuten
- Graded Quiz - Modules 9 and 10•60 Minuten
1 Diskussionsthema•Insgesamt 30 Minuten
- Scenario: The Rise of SecureNet•30 Minuten
End-Term Examination
Das ist alles enthalten
1 Aufgabe
1 Aufgabe•Insgesamt 30 Minuten
- End-Term Examination•30 Minuten
Dozent

von

von

Birla Institute of Technology & Science, Pilani (BITS Pilani) is one of only ten private universities in India to be recognised as an Institute of Eminence by the Ministry of Human Resource Development, Government of India. It has been consistently ranked high by both governmental and private ranking agencies for its innovative processes and capabilities that have enabled it to impart quality education and emerge as the best private science and engineering institute in India. BITS Pilani has four international campuses in Pilani, Goa, Hyderabad, and Dubai, and has been offering bachelor's, master’s, and certificate programmes for over 58 years, helping to launch the careers for over 1,00,000 professionals.
Warum entscheiden sich Menschen für Coursera für ihre Karriere?

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.

Neue Karrieremöglichkeiten mit Coursera Plus
Unbegrenzter Zugang zu 10,000+ Weltklasse-Kursen, praktischen Projekten und berufsqualifizierenden Zertifikatsprogrammen - alles in Ihrem Abonnement enthalten
Bringen Sie Ihre Karriere mit einem Online-Abschluss voran.
Erwerben Sie einen Abschluss von erstklassigen Universitäten – 100 % online
Schließen Sie sich mehr als 3.400 Unternehmen in aller Welt an, die sich für Coursera for Business entschieden haben.
Schulen Sie Ihre Mitarbeiter*innen, um sich in der digitalen Wirtschaft zu behaupten.
Häufig gestellte Fragen
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
Weitere Fragen
Finanzielle Unterstützung verfügbar,