diff --git a/docs/computer-science/ethics-security/computer-security/index.md b/docs/computer-science/ethics-security/computer-security/index.md new file mode 100644 index 0000000..3395715 --- /dev/null +++ b/docs/computer-science/ethics-security/computer-security/index.md @@ -0,0 +1,23 @@ +--- +sidebar_position: 3 +--- + +# Computer Security + +*Timeline: 52 hours* + +*Prerequisites: [Program Design](../../program-design/index.md), [Systems](../../systems/index.md)* + +This course provides a brief survey over common topics in computer security including memory safety, cryptography, web security, and network security. + +- [Course website](https://fa25.cs161.org/) +- [Textbook](https://textbook.cs161.org/) +- [Past exams](https://fa25.cs161.org/resources/) + +This course covers + +- How to think adversarially about computer systems +- How to assess threats for their significance +- How to build computer systems with robust security properties +- How to gauge the protections and limitations provided by today's technology +- How attacks work in practice diff --git a/docs/computer-science/ethics-security/ethics/index.md b/docs/computer-science/ethics-security/ethics/index.md index b3be6ad..7ab2a7e 100644 --- a/docs/computer-science/ethics-security/ethics/index.md +++ b/docs/computer-science/ethics-security/ethics/index.md @@ -5,11 +5,6 @@ sidebar_position: 1 # Ethics *Timeline: 35 hours* -This course provides an introduction to ethics in engineering and technology. -- [Ethics, Technology & Engineering](https://www.coursera.org/learn/ethics-technology-engineering), 18 hrs +Ethics in Technology is an open textbook that introduces students to the ethical challenges posed by modern digital tools and innovations. It covers topics such as privacy, cybersecurity, artificial intelligence, and social responsibility, encouraging learners to think critically about the role of technology in society. -This course will introduce the various types of U.S. intellectual property: patents, which cover inventions and process innovations; copyright, which protects original works of authorship; and trademarks, which protect a business’ commercial identity as the source of valuable goods and services. You will then explore case studies of how global businesses have used intellectual property law to generate enormous value from these intangible assets. -- [Introduction to Intelectual Property](https://www.coursera.org/learn/introduction-intellectual-property), 8 hrs - -This course is designed to introduce data privacy to a wide audience and help each participant see how data privacy has evolved as a compelling concern to public and private organizations as well as individuals. In this course, you will hear from legal and technical experts and practitioners who encounter data privacy issues daily. This course will review theories of data privacy as well as data privacy in the context of social media and artificial intelligence. It will also explore data privacy issues in journalism, surveillance, new technologies like facial recognition and biometrics. -- [Data Privacy Fundamentals](https://www.coursera.org/learn/northeastern-data-privacy), 9 hrs \ No newline at end of file +- Textbook: [Ethics in Technology](https://open.umn.edu/opentextbooks/textbooks/ethics-in-technology) diff --git a/docs/computer-science/ethics-security/secure-coding-practices/index.md b/docs/computer-science/ethics-security/secure-coding-practices/index.md deleted file mode 100644 index ffc217d..0000000 --- a/docs/computer-science/ethics-security/secure-coding-practices/index.md +++ /dev/null @@ -1,15 +0,0 @@ ---- -sidebar_position: 3 ---- - -# Secure Coding Practices -*Timeline: 52 hours* - -Through these courses, you will cover the principles of secure coding, concepts of threat modeling, cryptography, and exploit vulnerabilities in C/C++ or Java languages, all of which will prepare you to think like a hacker and protect your organizations information. The courses provide ample practice activities including exploiting WebGoat, an OWASP project designed to teach penetration testing. - -- [Principles of Secure Coding](https://www.coursera.org/learn/secure-coding-principles), 16 hrs -- [Identifying Security Vulnerabilities](https://www.coursera.org/learn/identifying-security-vulnerabilities), 16 hrs - -Now pick **one** of the following courses to apply your knowledge: -- [Identifying Security Vulnerabilities in C/C++](https://www.coursera.org/learn/identifying-security-vulnerabilities-c-programming), 20 hrs -- [Identifying Security Vulnerabilities in Java](https://www.coursera.org/learn/exploiting-securing-vulnerabilities-java-applications), 20 hrs \ No newline at end of file diff --git a/docs/computer-science/index.md b/docs/computer-science/index.md index 50391e0..17f932a 100644 --- a/docs/computer-science/index.md +++ b/docs/computer-science/index.md @@ -154,7 +154,7 @@ Learn how to think critically about the social impact of technology and protect - [Ethics](./ethics-security/ethics/index.md) - [Cybersecurity Fundamentals](./ethics-security/cyber-fundamentals/index.md) -- [Secure Coding Practices](./ethics-security/secure-coding-practices/index.md) +- [UC Berkeley CS 161: Computer Security](./ethics-security/computer-security/index.md) ### Applications