Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
23 changes: 23 additions & 0 deletions docs/computer-science/ethics-security/computer-security/index.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,23 @@
---
sidebar_position: 3
---

# Computer Security

*Timeline: 52 hours*

*Prerequisites: [Program Design](../../program-design/index.md), [Systems](../../systems/index.md)*

This course provides a brief survey over common topics in computer security including memory safety, cryptography, web security, and network security.

- [Course website](https://fa25.cs161.org/)
- [Textbook](https://textbook.cs161.org/)
- [Past exams](https://fa25.cs161.org/resources/)

This course covers

- How to think adversarially about computer systems
- How to assess threats for their significance
- How to build computer systems with robust security properties
- How to gauge the protections and limitations provided by today's technology
- How attacks work in practice
9 changes: 2 additions & 7 deletions docs/computer-science/ethics-security/ethics/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,11 +5,6 @@ sidebar_position: 1
# Ethics
*Timeline: 35 hours*

This course provides an introduction to ethics in engineering and technology.
- [Ethics, Technology & Engineering](https://www.coursera.org/learn/ethics-technology-engineering), 18 hrs
Ethics in Technology is an open textbook that introduces students to the ethical challenges posed by modern digital tools and innovations. It covers topics such as privacy, cybersecurity, artificial intelligence, and social responsibility, encouraging learners to think critically about the role of technology in society.

This course will introduce the various types of U.S. intellectual property: patents, which cover inventions and process innovations; copyright, which protects original works of authorship; and trademarks, which protect a business’ commercial identity as the source of valuable goods and services. You will then explore case studies of how global businesses have used intellectual property law to generate enormous value from these intangible assets.
- [Introduction to Intelectual Property](https://www.coursera.org/learn/introduction-intellectual-property), 8 hrs

This course is designed to introduce data privacy to a wide audience and help each participant see how data privacy has evolved as a compelling concern to public and private organizations as well as individuals. In this course, you will hear from legal and technical experts and practitioners who encounter data privacy issues daily. This course will review theories of data privacy as well as data privacy in the context of social media and artificial intelligence. It will also explore data privacy issues in journalism, surveillance, new technologies like facial recognition and biometrics.
- [Data Privacy Fundamentals](https://www.coursera.org/learn/northeastern-data-privacy), 9 hrs
- Textbook: [Ethics in Technology](https://open.umn.edu/opentextbooks/textbooks/ethics-in-technology)

This file was deleted.

2 changes: 1 addition & 1 deletion docs/computer-science/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -154,7 +154,7 @@ Learn how to think critically about the social impact of technology and protect

- [Ethics](./ethics-security/ethics/index.md)
- [Cybersecurity Fundamentals](./ethics-security/cyber-fundamentals/index.md)
- [Secure Coding Practices](./ethics-security/secure-coding-practices/index.md)
- [UC Berkeley CS 161: Computer Security](./ethics-security/computer-security/index.md)

### Applications

Expand Down