Cyber Effects

This course covers a range of topics related to cyber security and operations. As each topic could be its own course, they will be presented broadly. The focus is on real-world studies of reverse engineering, exploit analysis, and capability development within the context of computer network operations and attack. The course has a strong emphasis on hands-on exercises and projects. Industry-standard tools such as Ghidra and CVE will be leveraged.

System Defense and Test

This class trains students to detect and analyze weaknesses and vulnerabilities in target systems as a method of assessing the security of a system. Such techniques have various names, including penetration testing and ethical hacking. We focus on tools and techniques that an attacker would employ but from the perspective of an ethical system administrator. Broad topics include: tools and techniques for penetration testing and attacks, information gathering, social engineering, and defenses.

System Defense and Test

This class trains students to detect and analyze weaknesses and vulnerabilities in target systems as a method of assessing the security of a system. Such techniques have various names, including penetration testing and ethical hacking. We focus on tools and techniques that an attacker would employ but from the perspective of an ethical system administrator. Broad topics include: tools and techniques for penetration testing and attacks, information gathering, social engineering, and defenses.

Applied Information Retrieval

This course is intended to cover information retrieval and other information processing activities, from an applied perspective. There will be numerous programming projects and quizzes. Topics will include: search engine construction (document acquisition, processing, indexing, and querying); learning to rank; information retrieval system performance evaluation; classification and clustering; other machine learning information processing tasks; and many more.

Applied Information Retrieval

This course is intended to cover information retrieval and other information processing activities, from an applied perspective. There will be numerous programming projects and quizzes. Topics will include: search engine construction (document acquisition, processing, indexing, and querying); learning to rank; information retrieval system performance evaluation; classification and clustering; other machine learning information processing tasks; and many more.

Computer Architecture

The structure of digital computers from the logic level to the system level. Topics include: the design of components such as arithmetic units; the organization of sub-systems such as the memory; the interplay between hardware and software; the von Neumann architecture and its performance enhancements such as cache memory, instruction and data pipelines, coprocessors, and parallelism.

Computer Architecture

The structure of digital computers from the logic level to the system level. Topics include: the design of components such as arithmetic units; the organization of sub-systems such as the memory; the interplay between hardware and software; the von Neumann architecture and its performance enhancements such as cache memory, instruction and data pipelines, coprocessors, and parallelism.

Mobile and Ubiquit. Computing

This course will introduce students to the field of mobile sensing and ubiquitous computing (Ubicomp) - an emerging CS research area that aims to design and develop disruptive technologies with hardware and software systems for real-world messy, noisy and mobile scenarios. The students will learn how to build mobile sensing systems, how to implement it with ubiquitous computing tools, how to make sense of the sensor data and model the target variables.

Mobile and Ubiquit. Computing

This course will introduce students to the field of mobile sensing and ubiquitous computing (Ubicomp) - an emerging CS research area that aims to design and develop disruptive technologies with hardware and software systems for real-world messy, noisy and mobile scenarios. The students will learn how to build mobile sensing systems, how to implement it with ubiquitous computing tools, how to make sense of the sensor data and model the target variables.
Subscribe to