About this Course
4.5
488 ratings
92 reviews
Specialization

Course 3 of 5 in the

100% online

100% online

Start instantly and learn at your own schedule.
Flexible deadlines

Flexible deadlines

Reset deadlines in accordance to your schedule.
Hours to complete

Approx. 19 hours to complete

Suggested: 7 weeks of study, 4-7 hours/week...
Available languages

English

Subtitles: English

Skills you will gain

Number TheoryCryptographyPublic-Key Cryptography
Specialization

Course 3 of 5 in the

100% online

100% online

Start instantly and learn at your own schedule.
Flexible deadlines

Flexible deadlines

Reset deadlines in accordance to your schedule.
Hours to complete

Approx. 19 hours to complete

Suggested: 7 weeks of study, 4-7 hours/week...
Available languages

English

Subtitles: English

Syllabus - What you will learn from this course

Week
1
Hours to complete
4 hours to complete

Week 1

Introduction to Classical Cryptography...
Reading
10 videos (Total 142 min), 5 readings, 1 quiz
Video10 videos
Introduction10m
Introduction Continued8m
Hex and ASCII10m
Breaking the Vigenere Cipher23m
Principles of Modern Cryptography10m
Perfect Secrecy8m
Perfect Secrecy Part II31m
The One-Time Pad12m
Implementing the One-Time Pad18m
Reading5 readings
Syllabus10m
Programming Assignments10m
About Me10m
Week 110m
Programming Assignment 110m
Quiz1 practice exercise
Week 1 Quiz20m
Week
2
Hours to complete
2 hours to complete

Week 2

Computational Secrecy and Principles of Modern Cryptography...
Reading
7 videos (Total 109 min), 2 readings, 1 quiz
Video7 videos
Computational Secrecy14m
Computational Secrecy Part II21m
Pseudorandomness14m
Pseudorandom Generators11m
The Pseudo One-Time Pad6m
Proofs of Security24m
Reading2 readings
Week 210m
Programming Assignment 210m
Quiz1 practice exercise
Week 2 Quiz20m
Week
3
Hours to complete
2 hours to complete

Week 3

Private-Key Encryption...
Reading
6 videos (Total 100 min), 2 readings, 1 quiz
Video6 videos
Pseudorandom Functions and Block Ciphers19m
CPA-Secure Encryption from PRFs/Block Ciphers17m
Modes of Encryption14m
Security Against Chosen-Ciphertext Attacks16m
Padding-Oracle Attacks17m
Reading2 readings
Week 310m
Programming Assignment 310m
Quiz1 practice exercise
Week 3 Quiz20m
Week
4
Hours to complete
2 hours to complete

Week 4

Message Authentication Codes...
Reading
7 videos (Total 72 min), 2 readings, 1 quiz
Video7 videos
A Fixed-Length MAC8m
CBC-MAC7m
Hash Functions13m
HMAC11m
Authenticated Encryption7m
Secure Communication Sessions7m
Reading2 readings
Week 410m
Programming Assignment 410m
Quiz1 practice exercise
Week 4 Quiz20m
4.5
92 ReviewsChevron Right
Career direction

40%

started a new career after completing these courses
Career Benefit

29%

got a tangible career benefit from this course

Top Reviews

By CEJan 4th 2017

Excellent course. The proofs that are laid out in a way that made it easy for me to follow along, and it gave me a good overview of the areas of cryptography that are most relevant to me.

By LYNov 4th 2016

Wonderful and well organized course, it is really recommended to take it for those who are interested, which will definitely provide you with really understanding of cryptography!

Instructor

Avatar

Jonathan Katz

Professor, University of Maryland, and Director, Maryland Cybersecurity Center
Maryland Cybersecurity Center

About University of Maryland, College Park

The University of Maryland is the state's flagship university and one of the nation's preeminent public research universities. A global leader in research, entrepreneurship and innovation, the university is home to more than 37,000 students, 9,000 faculty and staff, and 250 academic programs. Its faculty includes three Nobel laureates, three Pulitzer Prize winners, 47 members of the national academies and scores of Fulbright scholars. The institution has a $1.8 billion operating budget, secures $500 million annually in external research funding and recently completed a $1 billion fundraising campaign. ...

About the Cybersecurity Specialization

The Cybersecurity Specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. These concepts are illustrated with examples drawn from modern practice, and augmented with hands-on exercises involving relevant tools and techniques. Successful participants will develop a way of thinking that is security-oriented, better understanding how to think about adversaries and how to build systems that defend against them....
Cybersecurity

Frequently Asked Questions

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

More questions? Visit the Learner Help Center.