Security and privacy courses at CMU
Below is a list of security and privacy courses offered at Carnegie Mellon. Some courses are cross-listed in multiple departments and may appear in the list multiple times with different course numbers.
Below is a list of security and privacy courses offered at Carnegie Mellon. Some courses are cross-listed in multiple departments and may appear in the list multiple times with different course numbers.
Use the headers to sort the list below to more easily find courses of interest.
Course | Course Name | Department | Units | Semester Offered |
---|---|---|---|---|
15-356 | Introduction to Cryptography | Computer Science Department | 9 | Fall |
15-856 | Introduction to Cryptography | Computer Science Department | 12 | Fall |
49-775 | Information Security for Product Managers | Information Networking Institute | 6 | Spring |
11-860 | Quantum Computing, Cryptography and Machine Learning Lab | Language Technologies Institute | 12 | Spring |
15-316 | Software Foundations of Security and Privacy | Computer Science Department | 9 | Fall |
14-722 | Special Topics: Competitive Embedded System Design and Exploitation | Information Networking Institute | 12 | Spring |
15-859 | Special Topics in Theory: Cryptography | Computer Science Department | 12 | Spring |
17-801 | Dynamic Network Analysis | Software and Societal Systems Department | 12 | Spring |
17-685 | Dynamic Network Analysis | Software and Societal Systems Department | 12 | Spring |
19-640 | Dynamic Network Analysis | Engineering and Public Policy | 12 | Spring |
17-334 | Usable Privacy and Security | Software and Societal Systems Department | 9 | Spring |
17-734 | Usable Privacy and Security | Software and Societal Systems Department | 12 | Spring |
05-436 | Usable Privacy and Security | Human Computer Interaction Institute | 9 | Spring |
05-836 | Usable Privacy and Security | Human Computer Interaction Institute | 12 | Spring |
19-534 | Usable Privacy and Security | Engineering and Public Policy | 9 | Spring |
19-734 | Usable Privacy and Security | Engineering and Public Policy | 12 | Spring |
18-733 | Applied Cryptography | Electrical and Computer Engineering | 12 | Spring |
14-828 | Browser Security | Information Networking Institute | 12 | Spring |
18-636 | Browser Security | Electrical and Computer Engineering | 12 | Spring |
18-734 | Foundations of Privacy | Electrical and Computer Engineering | 12 | Fall |
17-731 | Foundations of Privacy | Software and Societal Systems Department | 12 | Fall |
18-632 | Introduction to Hardware Security | Electrical and Computer Engineering | 12 | Spring |
18-631-RW | Introduction to Information Security | Electrical and Computer Engineering | 12 | Spring |
18-631 | Introduction to Information Security | Electrical and Computer Engineering | 12 | Spring |
14-741 | Introduction to Information Security | Information Networking Institute | 12 | Spring |
14-829 | Mobile and IoT Security | Information Networking Institute | 12 | Fall |
18-334 | Network Security | Electrical and Computer Engineering | 12 | Spring |
18-731 | Network Security | Electrical and Computer Engineering | 12 | Spring |
18-730 | Introduction to Computer Security | Electrical and Computer Engineering | 12 | Fall, Spring |
18-650 | Policies of Wireless Systems | Electrical and Computer Engineering | 12 | Fall |
19-403 | Policies of Wireless Systems | Engineering and Public Policy | 12 | Fall |
19-713 | Policies of Wireless Systems | Engineering and Public Policy | 12 | Fall |
95-824 | Policies of Wireless Systems | Heinz College | 12 | Fall |
17-333 | Privacy Policy, Law, and Technology | Software and Societal Systems Department | 9 | Fall |
17-733 | Privacy Policy, Law, and Technology | Software and Societal Systems Department | 12 | Fall |
19-608 | Privacy Policy, Law, and Technology | Engineering and Public Policy | 12 | Fall |
17-331 | Information Security, Privacy, and Policy | Software and Societal Systems Department | 12 | Fall |
17-631 | Information Security, Privacy, and Policy | Software and Societal Systems Department | 12 | Fall |
14-735 | Secure Coding | Information Networking Institute | 12 | Fall |
14-823 | Network Forensics | Information Networking Institute | 12 | Fall |
95-806 | Privacy in the Digital Age | Heinz College | 6 | Fall, Spring |
95-743 | Cybersecurity Policy and Governance II | Heinz College | 6 | Fall, Spring |
95-410 | Blockchain Fundamentals | Heinz College | 6 | Fall, Summer |
95-810 | Blockchain Fundamentals | Heinz College | 6 | Fall, Summer |
67-346 | Blockchain Fundamentals | Dietrich College | 6 | Fall, Summer |
95-855 | Network Traffic Analysis | Heinz College | 6 | Fall |
95-483 | Ethical Penetration Testing | Heinz College | 6 | Fall, Spring |
95-833 | Ethical Penetration Testing | Heinz College | 6 | Fall, Spring |
95-884 | Network Defenses | Heinz College | 6 | Fall, Spring, Summer |
18-744-SV | Connected Embedded Systems Architecture | Electrical and Computer Engineering | 12 | Spring |
17-303 | Cryptocurrencies, Blockchains, and Applications | Software and Societal Systems Department | 9 | Fall, Spring |
17-703 | Cryptocurrencies, Blockchains, and Applications | Software and Societal Systems Department | 12 | Fall, Spring |
19-303 | Cryptocurrencies, Blockchains, and Applications | Engineering and Public Policy | 9 | Fall, Spring |
19-733 | Cryptocurrencies, Blockchains, and Applications | Engineering and Public Policy | 12 | Fall, Spring |
95-878 | Engineering Privacy in Software | Heinz College | 12 | Spring |
19-605 | Engineering Privacy in Software | Engineering and Public Policy | 12 | Spring |
17-702 | Current Topics in Privacy Seminar | Software and Societal Systems Department | 3 | Fall, Spring |
19-602 | Current Topics in Privacy Seminar | Engineering and Public Policy | 3 | Fall, Spring |
95-862 | Current Topics in Privacy Seminar | Heinz College | 3 | Fall, Spring |
14-761 | Applied Information Assurance | Information Networking Institute | 12 | Fall, Spring |
14-819 | Introduction to Software Reverse-Engineering | Information Networking Institute | 12 | Spring |
14-684 | Cyber Law & Ethics | Information Networking Institute | 6 | Spring |
14-822 | Host-Based Forensics | Information Networking Institute | 12 | Spring |
14-832 | Cyber Forensics Capstone | Information Networking Institute | 12 | Fall |
95-444 | Cybersecurity Policy and Governance I | Heinz College | 6 | Fall, Spring |
95-744 | Cybersecurity Policy and Governance I | Heinz College | 6 | Fall, Spring |
95-748 | Software and Security | Heinz College | 6 | Fall, Spring |
95-752 | Introduction to Information Security Management | Heinz College | 12 | Fall, Spring, Summer |
18-631 | Introduction to Information Security Management | Software and Societal Systems Department | 12 | Fall, Spring, Summer |
95-565 | Introduction to Information Security Management | Heinz College | 9 | Fall, Spring, Summer |
14-788 | Information Security Policy and Management | Information Networking Institute | 6 | Spring |
95-758 | Network and Internet Security | Heinz College | 12 | Fall, Spring |
95-788 | Developing Blockchain Use Cases | Heinz College | 6 | Spring |
15-621 | Developing Blockchain Use Cases | Computer Science Department | 6 | Spring |
70-258 | Developing Blockchain Use Cases | Tepper School of Business | 6 | Spring |
73-258 | Developing Blockchain Use Cases | Tepper School of Business | 6 | Spring |
95-749 | Cryptography | Heinz College | 6 | Spring |
95-759 | Malicious Code Analysis | Heinz College | 6 | Spring, Summer |
95-889 | Applied Threat Analysis | Heinz College | 6 | Spring |
95-568 | Data Management and Security | Heinz College | 9 | Summer |
18-330 | Introduction to Computer Security | Electrical and Computer Engineering | 12 | Fall, Spring |
15-330 | Introduction to Computer Security | Computer Science Department | 12 | Fall, Spring |
17-781 | Mobile and IoT Computing Services | Software and Societal Systems Department | 12 | Spring |
67-309 | Special Topics: Information Assurance | Dietrich College | 12 | Fall |
18-639 | Policies of the Internet | Electrical and Computer Engineering | 12 | Fall, Spring |
19-639 | Policies of the Internet | Engineering and Public Policy | 12 | Fall, Spring |
11-488 | Computational Forensics and AI | Language Technologies Institute | 12 | Spring |
11-688 | Computational Forensics and AI | Language Technologies Institute | 12 | Spring |
94-876 | Computational Forensics and AI | Heinz College | 12 | Spring |
17-712 | Fantastic Bugs and How to Find Them | Software and Societal Systems Department | 12 | Spring |
15-799 | Security for Software and Hardware Systems | Computer Science Department | 12 | Spring |
15-793 | Secure Computer Systems | Computer Science Department | 12 | Spring |
17-715 | Advanced Topics in Hardware Security | Software and Societal Systems Department | 12 | Fall |
14-795 | AI Applications in Information Security | Information Networking Institute | 12 | Fall, Spring |
14-742 | Security in Networked Systems | Information Networking Institute | 12 | Spring |
14-817 | Cyber Risk Modeling | Information Networking Institute | 12 | Fall, Spring |
95-746 | Cloud Security | Heinz College | 6 | Spring |
95-410 | Blockchain Fundamentals | Heinz College | 6 | Fall, Summer |
95-810 | Blockchain Fundamentals | Heinz College | 6 | Fall, Summer |
67-346 | Blockchain Fundamentals | Dietrich College | 6 | Fall, Summer |
15-893 | Special Topics: Cryptology Meets Algorithms | Computer Science Department | 12 | Spring |
95-748 | Software and Security | Heinz College | 6 | Fall, Spring |
17-416 | AI Governance: Identifying and Mitigating Risks in the Design and Development of AI Solutions | Software and Societal Systems Department | 6 | Spring |
17-716 | AI Governance: Identifying and Mitigating Risks in the Design and Development of AI Solutions | Software and Societal Systems Department | 9 | Spring |
19-416 | AI Governance: Identifying and Mitigating Risks in the Design and Development of AI Solutions | Engineering and Public Policy | 6 | Spring |
19-716 | AI Governance: Identifying and Mitigating Risks in the Design and Development of AI Solutions | Engineering and Public Policy | 9 | Spring |
15-435 | Foundations of Blockchains | Computer Science Department | 12 | Fall |
15-635 | Foundations of Blockchains | Computer Science Department | 12 | Fall |
15-735 | Foundations of Blockchains | Computer Science Department | 12 | Fall |
18-435 | Foundations of Blockchains | Electrical and Computer Engineering | 12 | Fall |
18-635 | Foundations of Blockchains | Electrical and Computer Engineering | 12 | Fall |
17-607 | Privacy by Design Practicum | Software and Societal Systems Department | Variable | Fall, Spring |
17-606 | Privacy by Design Project Workshop | Software and Societal Systems Department | 6 | Fall, Spring |
If you're a student eager to research security and privacy with CyLab, it's important to know that you cannot apply to CyLab directly.