Security and privacy courses at CMU
Below is a list of security and privacy courses offered at Carnegie Mellon. Some courses are cross-listed in multiple departments and may appear in the list multiple times with different course numbers.
Below is a list of security and privacy courses offered at Carnegie Mellon. Some courses are cross-listed in multiple departments and may appear in the list multiple times with different course numbers.
Use the headers to sort the list below to more easily find courses of interest.
Course | Course Name | Department | Units | Semester Offered |
---|---|---|---|---|
15-356 | Introduction to Cryptography | Computer Science Department | 9 | Fall |
15-856 | Introduction to Cryptography | Computer Science Department | 12 | Fall |
15-316 | Software Foundations of Security and Privacy | Computer Science Department | 9 | Fall |
17-334 | Usable Privacy and Security | Institute for Software Research | 9 | Spring |
17-734 | Usable Privacy and Security | Institute for Software Research | 12 | Spring |
05-436 | Usable Privacy and Security | Human Computer Interaction Institute | 9 | Spring |
05-836 | Usable Privacy and Security | Human Computer Interaction Institute | 12 | Spring |
19-534 | Usable Privacy and Security | Engineering and Public Policy | 9 | Spring |
19-734 | Usable Privacy and Security | Engineering and Public Policy | 12 | Spring |
18-733 | Applied Cryptography | Electrical and Computer Engineering | 12 | Spring |
14-828 | Browser Security | Information Networking Institute | 12 | Spring |
18-734 | Foundations of Privacy | Electrical and Computer Engineering | 12 | Fall |
17-731 | Foundations of Privacy | Institute for Software Research | 12 | Fall |
18-632 | Introduction to Hardware Security | Electrical and Computer Engineering | 12 | Spring |
18-631-RW | Introduction to Information Security | Electrical and Computer Engineering | 12 | Fall |
18-631 | Introduction to Information Security | Electrical and Computer Engineering | 12 | Fall |
14-741 | Introduction to Information Security | Information Networking Institute | 12 | Fall |
14-829 | Mobile and IoT Security | Information Networking Institute | 12 | Fall |
18-334 | Network Security | Electrical and Computer Engineering | 12 | Spring |
18-731 | Network Security | Electrical and Computer Engineering | 12 | Spring |
18-650 | Policies of Wireless Systems | Electrical and Computer Engineering | 12 | Spring |
19-403 | Policies of Wireless Systems | Engineering and Public Policy | 12 | Spring |
19-713 | Policies of Wireless Systems | Engineering and Public Policy | 12 | Spring |
95-824 | Policies of Wireless Systems | Heinz College | 12 | Spring |
18-335 | Secure Software Systems | Electrical and Computer Engineering | 12 | Spring |
18-732 | Secure Software Systems | Electrical and Computer Engineering | 12 | Spring |
14-814 | Wireless Security | Information Networking Institute | 12 | Spring |
17-333 | Privacy Policy, Law, and Technology | Institute for Software Research | 9 | Fall |
17-733 | Privacy Policy, Law, and Technology | Institute for Software Research | 12 | Fall |
19-608 | Privacy Policy, Law, and Technology | Engineering and Public Policy | 12 | Fall |
95-818 | Privacy Policy, Law, and Technology | Heinz College | 12 | Fall |
17-331 | Information Security, Privacy, and Policy | Institute for Software Research | 12 | Fall |
17-631 | Information Security, Privacy, and Policy | Institute for Software Research | 12 | Fall |
14-735 | Secure Coding | Information Networking Institute | 12 | Fall |
14-809 | Introduction to Cyber Intelligence | Information Networking Institute | 12 | Fall |
14-823 | Network Forensics | Information Networking Institute | 12 | Fall |
14-850 | INSuRE Cybersecurity Research | Information Networking Institute | 12 | Fall |
95-806 | Privacy in the Digital Age | Heinz College | 6 | Fall |
95-743 | Cybersecurity Policy and Governance II | Heinz College | 6 | Fall |
95-410 | Blockchain Fundamentals | Heinz College | 6 | Fall, Summer |
95-810 | Blockchain Fundamentals | Heinz College | 6 | Fall, Summer |
95-855 | Network Traffic Analysis | Heinz College | 6 | Fall |
95-483 | Ethical Penetration Testing | Heinz College | 6 | Fall |
95-833 | Ethical Penetration Testing | Heinz College | 6 | Fall |
95-884 | Network Defenses | Heinz College | 6 | Fall |
18-744-SV | Connected Embedded Systems Architecture | Electrical and Computer Engineering | 12 | Spring |
17-303 | Cryptocurrencies, Blockchains, and Applications | Institute for Software Research | 9 | Fall, Spring |
17-703 | Cryptocurrencies, Blockchains, and Applications | Institute for Software Research | 12 | Fall, Spring |
19-303 | Cryptocurrencies, Blockchains, and Applications | Engineering and Public Policy | 9 | Fall, Spring |
19-733 | Cryptocurrencies, Blockchains, and Applications | Engineering and Public Policy | 12 | Fall, Spring |
95-878 | Engineering Privacy in Software | Heinz College | 12 | Spring |
17-702 | Current Topics in Privacy Seminar | Institute for Software Research | 3 | Fall, Spring |
19-602 | Current Topics in Privacy Seminar | Engineering and Public Policy | 3 | Fall, Spring |
95-862 | Current Topics in Privacy Seminar | Heinz College | 3 | Fall, Spring |
14-761 | Applied Information Assurance | Information Networking Institute | 12 | Fall, Spring |
14-812 | Research Seminar in Privacy and Security | Information Networking Institute | 12 | Spring |
14-813 | Projects in Privacy Enhancing Technologies | Information Networking Institute | 12 | Spring |
14-819 | Introduction to Software Reverse-Engineering | Information Networking Institute | 12 | Spring |
14-684 | Cyber Law & Ethics | Information Networking Institute | 12 | Spring |
14-822 | Host-Based Forensics | Information Networking Institute | 12 | Spring |
14-832 | Cyber Forensics Capstone | Information Networking Institute | 12 | Fall |
95-444 | Cybersecurity Policy and Governance I | Heinz College | 6 | Spring |
95-744 | Cybersecurity Policy and Governance I | Heinz College | 6 | Spring |
95-748 | Software and Security | Heinz College | 6 | Spring |
95-752 | Introduction to Information Security Management | Heinz College | 12 | Fall, Summer |
95-757 | Information Security Policy and Management | Heinz College | 6 | Spring |
14-788 | Information Security Policy and Management | Information Networking Institute | 6 | Spring |
95-758 | Network and Internet Security | Heinz College | 12 | Fall, Spring |
95-788 | Developing Blockchain Use Cases | Heinz College | 6 | Spring |
15-621 | Developing Blockchain Use Cases | Computer Science Department | 6 | Spring |
70-258 | Developing Blockchain Use Cases | Tepper School of Business | 6 | Spring |
73-258 | Developing Blockchain Use Cases | Tepper School of Business | 6 | Spring |
95-749 | Cryptography | Heinz College | 6 | Summer |
95-759 | Malicious Code Analysis | Heinz College | 6 | Spring |
95-889 | Applied Threat Analysis | Heinz College | 6 | Summer |
95-568 | Data Management and Security | Heinz College | 9 | Summer |
18-330 | Introduction to Computer Security | Electrical and Computer Engineering | 12 | Fall, Spring |
18-730 | Introduction to Computer Security | Electrical and Computer Engineering | 12 | Fall, Spring |
15-330 | Introduction to Computer Security | Computer Science Department | 12 | Fall, Spring |
17-781 | Mobile and IoT Computing Services | Institute for Software Research | 12 | Spring |
67-309 | Special Topics: Information Assurance | Dietrich College | 12 | Fall |
18-639 | Policies of the Internet | Electrical and Computer Engineering | 12 | Fall, Spring |
19-639 | Policies of the Internet | Engineering and Public Policy | 12 | Fall, Spring |
11-488 | Computational Forensics and AI | Language Technologies Institute | 12 | Spring |
11-688 | Computational Forensics and AI | Language Technologies Institute | 12 | Spring |
94-876 | Computational Forensics and AI | Heinz College | 12 | Spring |
If you're a student eager to research security and privacy with CyLab, it's important to know that you cannot apply to CyLab directly.