top of page

GRADUATE COURSES

01

Internet Security.

A graduate seminar covering: - the architecture of the Internet (AS, CDN). Attacks on TLS, DNS and BGP. - overlay networks (structured and unstructured, P2P, Tor etc.) - cloud, edge and fog computing security

03

Research Methods and Proposal Development.

A graduate course to introduce students to research. - Deep reading (Keshav), Literature survey - Choosing Problem, Approach and Scope - Basic Statistics - Proposal Writing

05

Network Protocols and Security.

A three-part course. - actual protocols and their security (routing, TCP/IP, TLS, ARP/DNS) - web security (authentication, XSS/CSRF, clickjacking, tracking) - formal protocol analysis (key exchange, voting, anonymity)

02

Authentication and Security Models.

A graduate seminar on topics in identity and authorization: - information flow, lattices, and covert channels - OM-AM / PEI and access control (MAC, DAC, RBAC). - traditional security (e.g. cyber banking) - IoT security (tags, sensors) - cloud security (NIST, AWS) - blockchain

04

Distributed Systems.

The graduate version of this course is more theory oriented. - Mutual exclusion, Termination detection and Global snapshot. - Vector clocks, Types of consistency. - CAP and FLP. - Leader Election and Consensus: 2PC, 3PC, Paxos, Raft. - Byzantine Generals, BAR systems, and self stabilization.

UNDERGRADUATE COURSES

01

Network Security and Forensics.

Upper-level course covering: - packet capture, Spoofing - switch security, DHCP, ARP - firewalls and proxies - TLS, DNS, VPN, Tor - Flow security, Snort / Zeek - Logs, SIEM, Threat Hunting

03

Introduction to Programming.
(Python, Java, C++)

First-year service course, in different languages. - variables, assignment, input/output, operators - main, functions, parameters, return - conditionals, iteration, recursion - stacks, queues, trees, lists, arrays, hash-maps - file handling, libraries - object oriented programming

02

Distributed Systems.

Upper-level course. Starts with mixu.net, then dives into: - old architectures (CORBA, SOAP, now REST) - NoSQL and BASE - DHT and Key-value (Chord, Dynamo) - Map-Reduce, Hadoop/Hive - Dryad/Spark, Tensorflow

COURSES DEVELOPED

01

Introduction to Cybersecurity.

02

Operating Systems.

bottom of page