Institute for Cyber Law, Policy, and Security

Courses

Typing on a laptop computer

Pitt offers a range of cyber-related courses across disciplines throughout the University.

Featured Courses

Here are a few highlighted courses in Fall 2019 from Pitt Cyber Affiliate Scholars:

Instructor: Balaji Palanisamy

This course provides an overview of information security. Principles of security including confidentiality, integrity, and availability. Operating systems and database security concepts. Basic cryptography and network security concepts. Secure software design and application security. Evaluation standards, security management. Social, legal and ethical issues. Human factors in security.

Instructor: Lisa Nelson

This course will consider the impact of emerging technologies within existing constitutional, statutory, and international guidelines and will then explore a range of policy solutions for managing the use of personal information in our public and private sectors.

Instructor: James Joshi

This course covers fundamental issues and first principles of security and information assurance. Security policies, models and mechanisms related to confidentiality, integrity, authentication, identification, and availability issues related to information and information systems. Basics of cryptography such as key management and digital signatures, etc. And network security such as PKI, IPsec, intrusion detection and prevention. Risk management, security assurance and secure design principles. Issues such as organizational security policy, legal and ethical issues in security, standards and methodologies for security evaluation and certification.

Instructor: Kevin D. Ashley

This course examines some of the ramifications of recent technological developments on intellectual property law and some of the problems of international protection of intellectual property.

Instructor: Julia Santucci

This course will focus on how the U.S. intelligence community collects and analyzes information to support U.S. national security and foreign policy objectives.  Students will examine the historical foundations of the intelligence community and consider how the role of intelligence has changed over time, particularly after the attacks of September 11, 2001.  Students will also consider the legal, moral, and ethical factors that influence the roles and conduct of the U.S. intelligence community.  Finally, this course will take a closer look at selected current intelligence topics, such as Russia, China, terrorism, weapons of mass destruction, and cybersecurity.

Instructor: John R. Lange

This course covers topics related to the interface of hardware and software.  It covers device interface and hardware synchronization at the loWest level of the operating system, the linkage of operating system services to application software, and the fundamental mechanisms for computer communications.

Instructor: Lindsey French

This course investigates the intersections and paradoxes of nature, art and technology. Working between the digital fabrication studio and Pittsburgh's surrounding landscape, we will consider how technologies can augment, interrupt and expand our understanding of the natural environment.

 

See something missing? Email cyber@pitt.edu