Hide Advanced Options
Courses - Spring 2025
HACS
ACES-Cybersecurity
Open Seats as of
11/16/2024 at 10:30 PM
HACS208Z
Methods for Solving (And not Solving) Puzzles
Credits: 3
Grad Meth: Reg
Restriction: Must be a student in the ACES (Advanced Cybersecurity Experience for Students) Living-Learning Program.
Surveys modern problems from different domains in computer science and cybersecurity to train our minds to appropriately approach puzzles we encounter in the future. This course covers graph theory, including what a graph is and the kinds of objects it can model, connectivity types, and vertex/edge covers algorithms. This course covers computer networks, including the models used for network stacks and what algorithms are used to solve difficult problems present in our current networks. This course covers algorithm analysis, including greedy algorithms, big O complexity, and how to analyze the capabilities and limitations of an algorithm. This course introduces cryptography, including the difference between public-key and symmetric-key cryptography, how RSA works, and the cryptanalysis of well-known cryptosystems.
Restriction: Must be a student in the ACES (Advanced Cybersecurity Experience for Students) Living-Learning Program