Learn about the security risks and potential of electronic and internet voting in this comprehensive course on digital democracy.
Learn about the security risks and potential of electronic and internet voting in this comprehensive course on digital democracy.
Explore the critical intersection of technology and democracy in this comprehensive course on securing digital voting systems. Gain essential knowledge about the security risks and future potential of electronic and Internet voting. The course covers the evolution of election technologies, from early paper ballots to modern electronic systems, and examines the complex challenges in ensuring secure, accessible, and verifiable elections. You'll learn about voter registration, authentication methods, and strategies to guard against tampering. The curriculum also addresses human factors in voting system design, the controversies surrounding Internet voting, and the latest developments in end-to-end verifiable voting systems. By the end of the course, you'll have a well-rounded understanding of the technical, policy, and societal issues surrounding digital democracy.
4.8
(166 ratings)
15,054 already enrolled
Instructors:
English
21 languages available
What you'll learn
Understand the security challenges in electronic and internet voting systems
Analyze the evolution of voting technologies and their impact on election integrity
Explore vulnerabilities in various voting systems and strategies to mitigate risks
Evaluate the trade-offs between security, accessibility, and usability in voting technology
Gain insights into voter registration, authentication, and anti-tampering measures
Examine case studies of voting systems from around the world
Skills you'll gain
This course includes:
7.1 Hours PreRecorded video
5 assignments,1 peer review
Access on Mobile, Tablet, Desktop
FullTime access
Shareable certificate
Closed caption
Get a Completion Certificate
Share your certificate with prospective employers and your professional network on LinkedIn.
Created by
Provided by

Top companies offer this course to their employees
Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.





There are 5 modules in this course
This course provides a comprehensive exploration of the security challenges and technological advancements in modern voting systems. Students will gain insights into the evolution of election technologies, from paper ballots to electronic voting machines and internet voting platforms. The curriculum covers critical aspects such as security requirements for voting, vulnerabilities in electronic systems, and methods for ensuring election integrity. Key topics include voter registration and authentication, tamper-resistant designs, usability considerations, and the controversies surrounding internet voting. The course also delves into international case studies, post-election auditing techniques, and emerging technologies like end-to-end verifiable voting. By examining both technical and policy perspectives, students will develop a nuanced understanding of the complexities involved in securing digital democracy.
Voting as a Security Problem
Module 1 · 3 Hours to complete
Computers at the Polls
Module 2 · 2 Hours to complete
Security Procedures and Voting Around the World
Module 3 · 2 Hours to complete
Human Factors and Internet Voting
Module 4 · 2 Hours to complete
New Technology and Policy
Module 5 · 3 Hours to complete
Fee Structure
Payment options
Financial Aid
Instructor
Leading Authority on Electronic Voting Security
J. Alex Halderman is an Associate Professor of Computer Science and Engineering at the University of Michigan, where he focuses on computer security and technology-related public policy. His research encompasses critical issues such as software security, data privacy, electronic voting, and cybercrime, along with the technological aspects of intellectual property law and government regulation. A recognized expert in electronic voting security, Halderman has made significant contributions, including demonstrating the first voting machine virus and exposing election security vulnerabilities in both California and India. In a notable project, he led a team that successfully hacked into Washington D.C.'s Internet voting system, showcasing his commitment to enhancing electoral integrity.
Testimonials
Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.
4.8 course rating
166 ratings
Frequently asked questions
Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.