Pitt offers a range of cyber-related courses across disciplines throughout the University.
Here are a few highlighted courses in Spring 2020 from Pitt Cyber Affiliate Scholars:
+ Cyber Law and Policy Seminar (LAW 5685)
Instructor: David Hickton
This course will explore theoretical and practical aspects of nation-state legal issues concerning cyberspace, including computer-related crime, espionage, war, and international governance. The seminar will review key legal cases, policy, and legislation. In tandem with a series of expert guest speakers from the field, the course will reflect on the roles of national and international governments, the legal and ethical dimensions of cybersecurity, the relationship between the public and private sectors, and the increasing tensions between privacy and security.
+ Hacking for Defense (ENGR 2811/TELECOM 2811)
Instructor: William Clark or Daniel Cole
This course will teach students how to build products and services using lean methods. This will be done by solving real-world military and intelligence community problems. The course uses the lean launchpad platform for entrepreneurship. This is a highly customer-centered hypothesis-test approach to developing a mission modes, and is particularly well-suited for technology startups. It incorporates customer needs and user testing to build a minimum viable prototype. At the conclusion of the course, students will be able to understand the problems/needs of searching for product-market fit; understand all the stakeholders, deployment issues, costs, resources, and ultimate mission value; deliver minimum viable products that match customer needs in an extremely short time; produce a repeatable model that can be used to launch other potential technology solutions.
+ Cryptography (INFSCI 2170/TELECOM 2820)
Instructor: Prashant Krishnamurthy
Principles of number theory, cryptographic algorithms and cryptanalysis. Steganography, block and stream ciphers, secret key encryption (DES, res, re-n), primes, random numbers, factoring, and discrete logarithms. Public key encryption (RSA, Diffie-Helman, elliptical curve cryptography, n'tru); key management, hash functions (md5, sha-1, ripemd-160, HMAC), digital signatures, certificates and authentication protocols. Cryptanalytic methods (known, chosen plaintext etc.) For secret and public key schemes (linear and differential cryptanalysis, pollard's rho method, number field sieve, etc.).
+ Ethics and Policy in Cyber Space (PIA 2156)
Instructor: Lisa Nelson
Information technology and the information that it generates has increasingly become part of our daily lives shaping our practices, discourses, and institutions in fundamental ways. Personal information is used by consumers, professionals, and organizations to a variety of ends and in a number of different settings. The growing reliance on personal information not only challenges long standing demarcations between public and private institution in terms of responsibilities, obligations, and limits, but also calls for a reconsideration of how to ensure the protection of long standing civil liberties and civil rights. This course will consider the impact of emerging technologies within existing constitutional, statutory, and international guidelines and will then explore a range of policy solutions for managing the use of personal information in our public and private sectors.
+ Domestic Politics and International Conflict in the Information Age (PS 2515)
Instructor: Michael Colaresi
This class will explore the interaction between domestic and international conflict. While these domains have traditionally been treated separately, the processes of domestic mobilization for international initiatives (including minds, money, material and martyrs) and maintaining resilience to the domestic consequence of international interaction (including analog and cyber cooperation and conflict) are increasingly important in today's globalized and digitally connected world. We will read both canonical research as well as more recent works that attempt to integrate contemporary changes in technology and cyber-capabilities into our understanding of the connections between these nested spheres of politics.
See something missing? Email firstname.lastname@example.org