E.g., 2016-10-25
E.g., 2016-10-25
E.g., 2016-10-25
Oct 17th 2016

This course focuses on how to design and build secure systems with a human-centric focus. We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system.

Average: 5.9 (7 votes)
Oct 10th 2016

This course is designed to introduce students, working professionals and the community to the exciting field of cybersecurity. Throughout the MOOC, participants will engage in community discourse and online interaction. Participants will gain knowledge and understanding of cybersecurity and its domains.

Average: 6.4 (5 votes)
Oct 3rd 2016

Our lives depend on online services. Gain essential cyber security knowledge and skills, to help protect your digital life. We shop online. We work online. We play online. We live online. As our lives increasingly depend on digital services, the need to protect our information from being maliciously disrupted or misused is really important.

Average: 6.4 (21 votes)
Oct 3rd 2016

This course will introduce you to the foundations of modern cryptography, with an eye toward practical applications.

Average: 5.4 (8 votes)
Oct 3rd 2016

Cryptography is an indispensable tool for protecting information in computer systems. In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. The course begins with a detailed discussion of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with traffic.

Average: 4.9 (11 votes)
Jun 13th 2016

Learn about the inner workings of cryptographic primitives and protocols and how to apply this knowledge in real-world applications.

Average: 3.1 (15 votes)
May 23rd 2016

Code-Based Cryptography is an interesting candidate for post-quantum cryptography. This course intends to cover the essentials about this topic: security-reduction proofs, possible attacks, proposals to reduce the key-size…

Average: 7 (2 votes)
Mar 9th 2015

Vous voulez comprendre l'arithmétique ? Vous souhaitez découvrir une application des mathématiques à la vie quotidienne ? Ce cours est fait pour vous ! De niveau première année d'université, vous apprendrez les bases de l'arithmétique (division euclidienne, théorème de Bézout, nombres premiers, congruence).
Vous vous êtes déjà demandé comment sont sécurisées les transactions sur Internet ? Vous découvrirez les bases de la cryptographie, en commençant par les codes les plus simples pour aboutir au code RSA. Le code RSA est le code utilisé pour crypter les communications sur internet. Il est basé sur de l'arithmétique assez simple que l'on comprendra en détails. Vous pourrez en plus mettre en pratique vos connaissances par l'apprentissage de notions sur le langage de programmation Python.

No votes yet
Self Paced

What is Cryptography and how does it work? In this course, you will examine how cryptography is the cornerstone of security technologies, and how through its use of different encryption methods, such as ciphers, and public or private keys, you can protect private or sensitive information from unauthorized access.

Average: 5.9 (10 votes)
Oct 7th 2013

Vous voulez comprendre l'arithmétique ? Vous souhaitez découvrir une application des mathématiques à la vie quotidienne ? Ce cours est fait pour vous !

No votes yet
Self Paced Course - Start anytime

Cryptography is essentially the science of writing in secret code. In data and telecommunications, cryptography has specific security requirements, such as authentication, privacy or confidentiality, integrity, and non-repudiation. To meet these security requirements, we employ secret key (or symmetric) cryptography, public-key (or asymmetric) cryptography, and hash functions.

No votes yet
Self Paced Course - Start anytime

Science of Secrets.

No votes yet
Apr 15th 2013

In this research-oriented graduate course, we will study algorithms for graph partitioning and clustering, constructions of expander graphs, and analysis of random walks.

No votes yet