A graduate seminar covering: - the architecture of the Internet (AS, CDN). Attacks on TLS, DNS and BGP. - overlay networks (structured and unstructured, P2P, Tor etc.) - cloud, edge and fog computing security
Research Methods and Proposal Development.
A graduate course to introduce students to research. - Deep reading (Keshav), Literature survey - Choosing Problem, Approach and Scope - Basic Statistics - Proposal Writing
Network Protocols and Security.
A three-part course. - actual protocols and their security (routing, TCP/IP, TLS, ARP/DNS) - web security (authentication, XSS/CSRF, clickjacking, tracking) - formal protocol analysis (key exchange, voting, anonymity)
Authentication and Security Models.
A graduate seminar on topics in identity and authorization: - information flow, lattices, and covert channels - OM-AM / PEI and access control (MAC, DAC, RBAC). - traditional security (e.g. cyber banking) - IoT security (tags, sensors) - cloud security (NIST, AWS) - blockchain
The graduate version of this course is more theory oriented. - Mutual exclusion, Termination detection and Global snapshot. - Vector clocks, Types of consistency. - CAP and FLP. - Leader Election and Consensus: 2PC, 3PC, Paxos, Raft. - Byzantine Generals, BAR systems, and self stabilization.
Network Security and Forensics.
Upper-level course covering: - packet capture, Spoofing - switch security, DHCP, ARP - firewalls and proxies - TLS, DNS, VPN, Tor - Flow security, Snort / Zeek - Logs, SIEM, Threat Hunting
Introduction to Programming.
(Python, Java, C++)
First-year service course, in different languages. - variables, assignment, input/output, operators - main, functions, parameters, return - conditionals, iteration, recursion - stacks, queues, trees, lists, arrays, hash-maps - file handling, libraries - object oriented programming
Upper-level course. Starts with mixu.net, then dives into: - old architectures (CORBA, SOAP, now REST) - NoSQL and BASE - DHT and Key-value (Chord, Dynamo) - Map-Reduce, Hadoop/Hive - Dryad/Spark, Tensorflow
Introduction to Cybersecurity.