Security and privacy courses at CMU
Below is a list of security and privacy courses offered at Carnegie Mellon. Some courses are cross-listed in multiple departments and may appear in the list multiple times with different course numbers.
Below is a list of security and privacy courses offered at Carnegie Mellon. Some courses are cross-listed in multiple departments and may appear in the list multiple times with different course numbers.
Use the headers to sort the list below to more easily find courses of interest.
| Course | Course Name | Department | Units | Semester Offered |
|---|---|---|---|---|
| 15-356 | Introduction to Cryptography | Computer Science Department | 9 | Fall |
| 15-856 | Introduction to Cryptography | Computer Science Department | 12 | Fall |
| 15-819 | Resource Aware Programming Languages | Computer Science Department | 12 | Fall |
| 18-755 | Networks in the Real World | Electrical and Computer Engineering | 12 | Fall |
| 46-912 | Blockchain and SQL Fundamentals | Heinz College | 6 | Fall |
| 95-827 | Blockchain and SQL Fundamentals | Heinz College | 6 | Fall |
| 70-337 | Business of Blockchain | Tepper School of Business | 6 | Fall |
| 73-337 | Business of Blockchain | Tepper School of Business | 6 | Fall |
| 11-860 | Quantum Computing, Cryptography and Machine Learning Lab | Language Technologies Institute | 12 | Spring |
| 15-316 | Software Foundations of Security and Privacy | Computer Science Department | 9 | Fall |
| 14-642 | Introduction to Embedded Systems | Information Networking Institute | 12 | Fall |
| 17-801 | AI Enabled Network Science | Software and Societal Systems Department | 12 | Fall, Spring |
| 17-685 | AI Enabled Network Science | Software and Societal Systems Department | 12 | Fall, Spring |
| 19-640 | AI Enabled Network Science | Engineering and Public Policy | 12 | Fall, Spring |
| 17-334 | Usable Privacy and Security | Software and Societal Systems Department | 9 | Spring |
| 17-734 | Usable Privacy and Security | Software and Societal Systems Department | 12 | Spring |
| 05-436 | Usable Privacy and Security | Human Computer Interaction Institute | 9 | Spring |
| 05-836 | Usable Privacy and Security | Human Computer Interaction Institute | 12 | Spring |
| 19-534 | Usable Privacy and Security | Engineering and Public Policy | 9 | Spring |
| 19-734 | Usable Privacy and Security | Engineering and Public Policy | 12 | Spring |
| 18-733 | Applied Cryptography | Electrical and Computer Engineering | 12 | Spring |
| 14-828 | Browser Security | Information Networking Institute | 12 | Spring |
| 18-636 | Browser Security | Electrical and Computer Engineering | 12 | Spring |
| 18-734 | Foundations of Privacy | Electrical and Computer Engineering | 12 | Fall |
| 17-731 | Foundations of Privacy | Software and Societal Systems Department | 12 | Fall |
| 18-632 | Introduction to Hardware Security | Electrical and Computer Engineering | 12 | Spring |
| 18-631-RW | Introduction to Information Security | Electrical and Computer Engineering | 12 | Spring |
| 18-631 | Introduction to Information Security | Electrical and Computer Engineering | 12 | Spring |
| 14-741 | Introduction to Information Security | Information Networking Institute | 12 | Spring |
| 14-829 | Mobile and IoT Security | Information Networking Institute | 12 | Fall |
| 18-334 | Network Security | Electrical and Computer Engineering | 12 | Spring |
| 18-731 | Network Security | Electrical and Computer Engineering | 12 | Spring |
| 18-650 | Policies of Wireless Systems | Electrical and Computer Engineering | 12 | Fall |
| 19-403 | Policies of Wireless Systems | Engineering and Public Policy | 12 | Fall |
| 19-713 | Policies of Wireless Systems | Engineering and Public Policy | 12 | Fall |
| 95-824 | Policies of Wireless Systems | Heinz College | 12 | Fall |
| 17-333 | Privacy Policy, Law, and Technology | Software and Societal Systems Department | 9 | Fall |
| 17-733 | Privacy Policy, Law, and Technology | Software and Societal Systems Department | 12 | Fall |
| 19-608 | Privacy Policy, Law, and Technology | Engineering and Public Policy | 12 | Fall |
| 17-331 | Information Security, Privacy, and Policy | Software and Societal Systems Department | 12 | Fall |
| 17-631 | Information Security, Privacy, and Policy | Software and Societal Systems Department | 12 | Fall |
| 14-735 | Secure Coding | Information Networking Institute | 12 | Fall |
| 14-823 | Network Forensics | Information Networking Institute | 12 | Fall |
| 95-806 | Privacy in the Digital Age | Heinz College | 6 | Fall, Spring |
| 95-743 | Cybersecurity Policy and Governance II | Heinz College | 6 | Fall, Spring |
| 95-410 | Blockchain Fundamentals | Heinz College | 6 | Fall, Summer |
| 95-810 | Blockchain Fundamentals | Heinz College | 6 | Fall, Summer |
| 67-346 | Blockchain Fundamentals | Dietrich College | 6 | Fall, Summer |
| 95-483 | Ethical Penetration Testing | Heinz College | 6 | Fall, Spring |
| 95-833 | Ethical Penetration Testing | Heinz College | 6 | Fall, Spring |
| 95-884 | Network Defenses | Heinz College | 6 | Fall, Spring, Summer |
| 17-303 | Cryptocurrencies, Blockchains, and Applications | Software and Societal Systems Department | 9 | Fall, Spring |
| 17-703 | Cryptocurrencies, Blockchains, and Applications | Software and Societal Systems Department | 12 | Fall, Spring |
| 19-303 | Cryptocurrencies, Blockchains, and Applications | Engineering and Public Policy | 9 | Fall, Spring |
| 19-733 | Cryptocurrencies, Blockchains, and Applications | Engineering and Public Policy | 12 | Fall, Spring |
| 95-878 | Engineering Privacy in Software | Heinz College | 12 | Spring |
| 19-605 | Engineering Privacy in Software | Engineering and Public Policy | 12 | Spring |
| 17-702 | Current Topics in Privacy Seminar | Software and Societal Systems Department | 3 | Fall, Spring |
| 19-602 | Current Topics in Privacy Seminar | Engineering and Public Policy | 3 | Fall, Spring |
| 95-862 | Current Topics in Privacy Seminar | Heinz College | 3 | Fall, Spring |
| 14-761 | Applied Information Assurance | Information Networking Institute | 12 | Fall, Spring |
| 14-819 | Introduction to Software Reverse-Engineering | Information Networking Institute | 12 | Spring |
| 14-684 | Cyber Law & Ethics | Information Networking Institute | 6 | Spring |
| 14-822 | Host-Based Forensics | Information Networking Institute | 12 | Spring |
| 14-832 | Cyber Forensics Capstone | Information Networking Institute | 12 | Fall |
| 95-444 | Cybersecurity Policy and Governance I | Heinz College | 6 | Fall, Spring |
| 95-744 | Cybersecurity Policy and Governance I | Heinz College | 6 | Fall, Spring |
| 95-748 | Software and Security | Heinz College | 6 | Fall, Spring |
| 95-752 | Introduction to Information Security Management | Heinz College | 12 | Fall, Spring, Summer |
| 18-631 | Introduction to Information Security Management | Software and Societal Systems Department | 12 | Fall, Spring, Summer |
| 95-565 | Introduction to Information Security Management | Heinz College | 9 | Fall, Spring, Summer |
| 14-788 | Information Security Policy and Management | Information Networking Institute | 6 | Spring |
| 95-758 | Network and Internet Security | Heinz College | 12 | Fall, Spring |
| 95-788 | Developing Blockchain Use Cases | Heinz College | 6 | Spring |
| 15-621 | Developing Blockchain Use Cases | Computer Science Department | 6 | Spring |
| 70-258 | Developing Blockchain Use Cases | Tepper School of Business | 6 | Spring |
| 73-258 | Developing Blockchain Use Cases | Tepper School of Business | 6 | Spring |
| 95-749 | Cryptography | Heinz College | 6 | Spring |
| 95-759 | Malicious Code Analysis | Heinz College | 6 | Spring, Summer |
| 95-889 | Applied Threat Analysis | Heinz College | 6 | Spring |
| 18-330 | Introduction to Computer Security | Electrical and Computer Engineering | 12 | Fall, Spring |
| 15-330 | Introduction to Computer Security | Computer Science Department | 12 | Fall, Spring |
| 67-309 | Special Topics: Information Assurance | Dietrich College | 12 | Fall, Spring |
| 17-712 | Fantastic Bugs and How to Find Them | Software and Societal Systems Department | 12 | Spring |
| 17-715 | Advanced Topics in Hardware Security | Software and Societal Systems Department | 12 | Fall |
| 14-795 | AI Applications in Information Security | Information Networking Institute | 12 | Fall, Spring |
| 14-742 | Security in Networked Systems | Information Networking Institute | 12 | Spring |
| 14-817 | Cyber Risk Modeling | Information Networking Institute | 12 | Fall, Spring |
| 95-746 | Cloud Security | Heinz College | 6 | Spring |
| 95-410 | Blockchain Fundamentals | Heinz College | 6 | Fall, Summer |
| 95-810 | Blockchain Fundamentals | Heinz College | 6 | Fall, Summer |
| 67-346 | Blockchain Fundamentals | Dietrich College | 6 | Fall, Summer |
| 95-748 | Software and Security | Heinz College | 6 | Fall, Spring |
| 15-435 | Foundations of Blockchains | Computer Science Department | 12 | Fall |
| 15-635 | Foundations of Blockchains | Computer Science Department | 12 | Fall |
| 15-735 | Foundations of Blockchains | Computer Science Department | 12 | Fall |
| 18-435 | Foundations of Blockchains | Electrical and Computer Engineering | 12 | Fall |
| 18-635 | Foundations of Blockchains | Electrical and Computer Engineering | 12 | Fall |
| 17-607 | Privacy by Design Practicum | Software and Societal Systems Department | Variable | Fall, Spring |
| 17-606 | Privacy by Design Project Workshop | Software and Societal Systems Department | 6 | Fall, Spring |
| 14-642 | Introduction to Embedded Systems | Information Networking Institute | 12 | Fall |
| 17-435 | Microarchitectural Security | Software and Societal Systems Department | 9 | Fall |
| 17-715 A | Microarchitectural Security | Software and Societal Systems Department | 9 | Fall |
| 17-715 | Microarchitectural Security | Software and Societal Systems Department | 12 | Fall |
| 14-710 | Special Topics: The Technology Behind Information Control | Information Networking Institute | 12 | Spring |
| 14-713 | Special Topics: Secure and Responsible AI | Information Networking Institute | 12 | Spring |
| 14-817 | Cybersecurity in our Daily Applications | Information Networking Institute | 3 | Spring |
| 84-343 | Offensive Cyber: Law & Policy | Electrical and Computer Engineering | 6 | Spring |
| 17-636 | DevOps: Engineering for Secure Development and Deployment | Software and Societal Systems Department | 12 | Fall, Summer |
| 95-559 | Cybersecurity for AI and ML | Heinz College | 9 | Summer |
| 67-365 | Human-Centered Security and Privacy: A Psychological and Usable Approach | Information Networking Institute | 9 | Fall, Summer |
| 14-817 | Cybersecurity in our Daily Applications | Information Networking Institute | 3 | Spring |
| 17-801 | AI Enabled Network Science | Software and Societal Systems Department | 12 | Fall, Spring |
| 17-685 | AI Enabled Network Science | Software and Societal Systems Department | 12 | Fall, Spring |
| 19-640 | AI Enabled Network Science | Engineering and Public Policy | 12 | Fall, Spring |
| 17-416 | Responsible AI and AI Governance: Identifying and Mitigating Risks in the Design and Development of AI Solutions | Software and Societal Systems Department | 6 | Spring |
| 17-716 | Responsible AI and AI Governance: Identifying and Mitigating Risks in the Design and Development of AI Solutions | Software and Societal Systems Department | 9 | Spring |
| 17-716 | Responsible AI and AI Governance: Identifying and Mitigating Risks in the Design and Development of AI Solutions | Software and Societal Systems Department | 12 | Spring |
| 19-416 | Responsible AI and AI Governance: Identifying and Mitigating Risks in the Design and Development of AI Solutions | Engineering and Public Policy | 6 | Spring |
| 19-716 | Responsible AI and AI Governance: Identifying and Mitigating Risks in the Design and Development of AI Solutions | Engineering and Public Policy | 9 | Spring |
| 19-716 | Responsible AI and AI Governance: Identifying and Mitigating Risks in the Design and Development of AI Solutions | Engineering and Public Policy | 12 | Spring |
| 18-739D | Hacking and Offensive Security | Electrical and Computer Engineering | 12 | Fall |
| 46-912 | Cryptocurrency and Blockchain: Theory to Practice | Tepper School of Business | 6 | Fall |