This course provides an overview of the field of cybersecurity with emphasis on fundamental concepts, e.g., private-key encryption, public-key encryption and security protocols, as well as hot topics, e.g., secure computations, digital currencies, and blockchain. Students will learn the basics of security and applied cryptography. They will be exposed to various applications of security protocols in different domains, such as privacy in auctions and blockchain in supply chain. The course will broaden the participants view of the field of cybersecurity, allowing a better understanding of its foundations, applications, and implications, and motivating students to learn more about the topic.
The course will expose students with concepts, tools and applications in a rapidly expanding field. Students who know cybersecurity have been proven to be in high demand in various sectors of the economy.
Session Length: August 15 - 19th, 2022, 1:00 - 4:00 PM
***If you have FAU Email, please REGISTER USING YOUR FAU EMAIL (The course is accessed through Canvas). For those with no FAU email, a user account will be created.
Please note that each class will be recorded. The recordings will be available online for 30 days to ensure that participants can access them if they miss a class or want to review any of the sessions.
Length: One week of online sessions (Monday-Friday, 3 hours/day)
Cost: $250 Non-FAU Participants -
Available to FAU Student/Faculty/Staff Only
*Please contact firstname.lastname@example.org to receive your discount code prior to registering.
Instructor: Mehrdad Nojoumian, PhD
Tools and Resources
- Lectures and group discussions will take place live (synchronously) online (using WebEx, Zoom, or equivalent) on specified days and times.
- Slides and supporting materials will be posted online.
Students should have Internet access.
Outline and tentative schedule
The course will consist of 5 modules (of 3 hours each). Each module will have a combination of lecture, demos, and discussions, with ample opportunity for questions.
- Preliminaries for Security.
- Preliminaries for Cryptography.
- Classical Cryptography.
- Modern Cryptography.
- Secret Sharing and Secure Multiparty Computation.
- Privacy-Preserving Auctions.
- Hash Function and Digital Signature.
- Blockchain and Digital Currency.
- Automotive Attack Surfaces.
- Modern Cybersecurity Attacks.