Summer 2021 - Course is  Fully Remote

COMPSCI 563 Internet Law & Policy

This course is meant for those looking for legal knowledge for use in computing- and Internet-related endeavors. The course will include topics related to security, policy, and the use of machine learning and related technologies. Course material provides practical information for use by computer professionals. Some of the topics covered include: infrastructure of the Internet, basic legal principles, contract law, substantive laws, intellectual property law, ethics, dealing with third parties, policy issues, and implications of applying machine learning technology.  Course is fully remote.  

 

Fall 2021 Security Course - Courses are in-person, blended or multi-modal.  

COMPSCI 461/661 Secure Distributed Systems

A course devoted to the study of securing distributed systems, with blockchain-based cryptocurrencies serving as our real platform of interest. Topics such as elliptic curve cryptography, fundamental results of distributed systems, cryptoeconomics and finance, network efficiency, and network attacks such as double spends, selfish mining, and denial of service attacks.  


COMPSCI 563 Internet Law & Policy

This course is meant for those looking for legal knowledge for use in computing- and Internet-related endeavors. The course will include topics related to security, policy, and the use of machine learning and related technologies. Course material provides practical information for use by computer professionals. Some of the topics covered include: infrastructure of the Internet, basic legal principles, contract law, substantive laws, intellectual property law, ethics, dealing with third parties, policy issues, and implications of applying machine learning technology. 
 

COMPSCI 597N Introduction to Computer & Network Security

This course provides an introduction to the principles and practice of computer and network security with a focus on both fundamentals and practical information. The three topics of this course are cryptography, privacy, and network security.  Subtopics include cipers, hashes, key exchange, security services (integrity, availability, confidentiality, etc.), security attacks, vulnerabilities, anonymous communications, and countermeasures.