This course provides an overview of the field of cybersecurity with emphasis on fundamental concepts, e.g., private-key encryption, public-key encryption and security protocols, as well as hot topics, e.g., secure computations, digital currencies, and blockchain. Students will learn the basics of security and applied cryptography. They will be exposed to various applications of security protocols in different domains, such as privacy in auctions and blockchain in supply chain. The course will broaden the participants view of the field of cybersecurity, allowing a better understanding of its foundations, applications, and implications, and motivating students to learn more about the topic.
The course will expose students with concepts, tools and applications in a rapidly expanding field. Students who know cybersecurity have been proven to be in high demand in various sectors of the economy.
Session Length: Monday, May 10th - Friday, May 14th | 1:00 p.m. to 3:00 p.m.
Please note that each class will be recorded. The recordings will be available online for 30 days to ensure that participants can access them if they miss a class or want to review any of the sessions.
Length: One week of online sessions (Monday-Friday, 2 hours/day)
Instructor: Mehrdad Nojoumian, PhD
Tools and Resources
- Lectures and group discussions will take place live (synchronously) online (using WebEx, Zoom, or equivalent) on specified days and times.
- Slides and supporting materials will be posted online.
Students should have Internet access.
Outline and tentative schedule
The course will consist of 5 modules (of 2 hours each). Each module will have a combination of lecture, demos, and discussions, with ample opportunity for questions.
- Preliminaries for Security.
- Preliminaries for Cryptography.
- Classical Cryptography.
- Modern Cryptography.
- Secret Sharing and Secure Multiparty Computation.
- Privacy-Preserving Auctions.
- Hash Function and Digital Signature.
- Blockchain and Digital Currency.
- Automotive Attack Surfaces.
- Modern Cybersecurity Attacks.