Cookie Settings

We use third-party cookies in order to personalize your site experience. See our Privacy Policy.

Cyber security

Cybersecurity provides a practical introduction to securing information in an increasingly connected world. Over four weeks, participants explore the principles and tools for protecting communication, systems, and data—from the foundations of cryptography and network security to real-world threats, vulnerabilities, and defenses. The course balances theory with applied practice, giving students the knowledge and skills to evaluate risks, implement safeguards, and understand the broader implications of digital security.

Outcomes

  • Explain key principles of modern cryptography and secure communications
  • Apply tools and practices for secure authentication, encryption, and key management
  • Evaluate and design systems with security in mind (threat modeling, defense in depth)
  • Understand the ethical and societal implications of cybersecurity decisions

Prerequisites

  • General computer literacy and comfort with command-line tools
  • Basic understanding of networks and the internet (IP, routing, protocols)
  • Some programming experience (Python or similar) recommended but not required
  • Interest in digital systems, security, or data protection

Site requirements

Global

Tue, Thu, Mid-February to Mid-March 2026 — 9:00–10:30A EDT

Local

Mon, Wed, Fri (local)

Local nodes set times

Faculty

Radia Perlman

Radia Perlman

published

Radia designed the spanning tree algorithm that transformed Ethernet from the original limited-scalability, single-wire CSMA/CD, into a protocol that can handle large clouds. Later, she improved on spanning tree-based Ethernet by designing TRILL (TRansparent Interconnection of Lots of Links), which allows Ethernet to make optimal use of bandwidth. Her textbook Interconnections made a science out of the murky field of network protocols.

Ben Laurie

Ben Laurie

published

Systems researcher at Google

Ben Laurie is an English software engineer. Laurie wrote Apache-SSL, the basis of most SSL-enabled versions of the Apache HTTP Server. He developed the MUD Gods, which was innovative in including online creation in its endgame.

Laurie also has written several articles, papers and books and is interested in ideal knots and their applications.

Jean-Jacques Quisquater

Jean-Jacques Quisquater

published

Louvain University

Jean-Jacques Quisquater is a Belgian cryptographer and a professor at the University of Louvain (UCLouvain). He received, with Claus P. Schnorr, the RSA Award for Excellence in Mathematics and the ESORICS Outstanding Research Award in 2013.[1]

Francois-Xavier Standaert

Francois-Xavier Standaert

published

Louvain University

Francois-Xavier Standaert was born in Brussels, Belgium in 1978. He received the Electrical Engineering degree and PhD degree from the Universite catholique de Louvain, respectively in 2001 and 2004. In 2004-2005, he was a Fulbright visiting researcher at Columbia University, Department of Computer Science, Crypto Lab (hosted by Tal G. Malkin and Moti Yung) and at the MIT Medialab, Center for Bits and Atoms (hosted by Neil Gershenfeld). In 2006, he was a founding member of IntoPix s.a. From 2005 to 2008, he was a post-doctoral researcher of the Belgian Fund for Scientific Research (FNRS-F.R.S.) at the UCL Crypto Group and a regular visitor of the two aforementioned laboratories. Since 2008 (resp. 2017, 2024), he is associate researcher (resp. senior associate researcher, research director) of the Belgian Fund for Scientific Research (FNRS-F.R.S). Since 2013 (resp. 2018), he is associate professor (resp. professor) at the UCL Institute of Information and Communication Technologies, Electronics and Applied Mathematics (ICTEAM).

Charlie Kaufman

Charlie Kaufman

published

Dell / EMC

Charlie Kaufman, a security architect for the Midrange Storage Business Unit at Dell/EMC, works on securing the current and future generations of midrange storage arrays. He has been involved with computer networking, cryptography, and security for over 25 years, and holds over 50 patents in those fields. He has contributed to a number of IETF standards efforts including IPsec, S/MIME, and DNSsec and served as a member of the Internet Architecture Board. He is co-author of the popular textbook Network Security: Private Communication in a Public World. It was in the course of working on the third edition that he learned about quantum computing.