Quantum Communication

This course will provide an introduction to fundamental principles underlying quantum communication, including quantum repeaters, entanglement, and other tools needed for the implementation of distributed quantum protocols. Topics include: basics of quantum computation and information; modeling and coping with noise in quantum systems; entanglement generation schemes; quantum Internet and its applications. Meets with and is similar to COMPSCI 690QC, with the exception that the final project requires students to read a research paper and compose a detailed summary of it.

Reverse Engin & Exploit Dev

Software is everywhere and many developers aren't aware of how to properly write secure code. We will cover practical skills in reverse engineering and binary exploitation and delve into the techniques used by adversaries for some of the largest security incidents of the century. With a strong understanding of attack patterns, students will be able to implement more secure coding practices into their own code and defend against these attacks.

Reverse Engin & Exploit Dev

Software is everywhere and many developers aren't aware of how to properly write secure code. We will cover practical skills in reverse engineering and binary exploitation and delve into the techniques used by adversaries for some of the largest security incidents of the century. With a strong understanding of attack patterns, students will be able to implement more secure coding practices into their own code and defend against these attacks.

Mobile and Wireless Networks

This course covers both the principles and the practice of mobile and wireless networks. Topics will include application use cases, the unique aspects of the wireless (as opposed to wireline) links, and approaches for handling mobility, authentication, security and privacy, energy management, user localization, and virtualization in mobile and wireless networks. The focus of 'practice' will cover the overall architectures (both control plane and data plane) of 802.11 (WiFi) networks and 4G/5G cellular systems; Bluetooth, satellite, and IoT networks will also be briefly covered.

Mobile and Wireless Networks

This course covers both the principles and the practice of mobile and wireless networks. Topics will include application use cases, the unique aspects of the wireless (as opposed to wireline) links, and approaches for handling mobility, authentication, security and privacy, energy management, user localization, and virtualization in mobile and wireless networks. The focus of 'practice' will cover the overall architectures (both control plane and data plane) of 802.11 (WiFi) networks and 4G/5G cellular systems; Bluetooth, satellite, and IoT networks will also be briefly covered.

Quantum Cryptography

The ability to transmit quantum information over long distances will enable implementation of many fascinating quantum communication tasks and provide us with novel capabilities that reach beyond what we can do over classical Internet alone. Examples of such tasks include blind quantum computing, clock synchronization or distributed quantum computing. Quantum cryptography is one family of such tasks with the most famous one being quantum key distribution.

Quantum Cryptography

The ability to transmit quantum information over long distances will enable implementation of many fascinating quantum communication tasks and provide us with novel capabilities that reach beyond what we can do over classical Internet alone. Examples of such tasks include blind quantum computing, clock synchronization or distributed quantum computing. Quantum cryptography is one family of such tasks with the most famous one being quantum key distribution.

Machine Learning

Introduction to core machine learning models and algorithms for classification, regression, dimensionality reduction and clustering. The course will cover the mathematical foundations behind the most common machine learning algorithms, and their effective use in solving real-world applications. Requires a strong background in mathematics and programming.

Machine Learning

Introduction to core machine learning models and algorithms for classification, regression, dimensionality reduction and clustering. The course will cover the mathematical foundations behind the most common machine learning algorithms, and their effective use in solving real-world applications. Requires a strong background in mathematics and programming.

Cyber Effects

This course covers a range of topics related to cyber security and operations. As each topic could be its own course, they will be presented broadly. The focus is on real-world studies of reverse engineering, exploit analysis, and capability development within the context of computer network operations and attack. The course has a strong emphasis on hands-on exercises and projects. Industry-standard tools such as Ghidra and CVE will be leveraged.
Subscribe to