14-740 is a graduate-level, first-course in computer and telecommunication networks. There is no prerequisite of an undergraduate equivalent, but basic computer, programming and probability theory background is required.
The primary objective of this course is for you to learn the fundamental principles underlying computer and telecommunication networks. Using a top-down approach, we will cover topics in the application, transport, network and link layers of the protocol stack. We will also go over advanced topics, including network management, traffic engineering and router internals. Besides learning about the nuts and bolts, you will gain an understanding in engineering tradeoffs made and design principles used in computer and telecommunication networks. Another objective is for you to apply some of this knowledge in the context of systems projects. We will follow an aggressive pace in this course.
The growing importance of information systems, and their use to support safety-critical applications, has made information security a central issue for modern systems. The course introduces the technical and policy foundations of information security. The main objective of the course is to enable students to reason about information systems from a security engineering perspective. Topics covered in the course include elementary cryptography; access control; common software vulnerabilities; common network vulnerabilities; digital rights management; policy and export control law; privacy; management and assurance; and special topics in information security. Prerequisites: The course assumes a basic working knowledge of computers, networks, C and UNIX programming, as well as an elementary mathematics background, but does not assume any prior exposure to topics in computer or communications security.
This course will help students understand the technical, business and industry fundamentals necessary for the effective management of organizations that develop, operate and/or use telecommunications. These issues will be explored in the context of the decisions they influence in areas of strategic telecommunications planning, developing and deploying business applications, procuring and delivering services, and managing technical personnel and processes. Topics will include the underlying technical fundamentals of voice and data networks, the protocols and services built from those fundamentals, industry and regulatory structures and practices, and practical questions that arise from these issues.
The goals are for students to understand the telecommunications technology and industry well enough to make intelligent short-term and long-term business and technical decisions and to manage technical people wisely and effectively.
Modern cryptography is based on computational complexity theory. Further, the algorithms used in modern cryptographic techniques must be proved mathematically to be secure. This is essentially why modern cryptographic methods are superior.
Modern cryptography applications cover a wide range of areas in addition to the traditional cipher to hide secret messages. Application areas include digital signatures, authentication, digital payments, and digital voting, among others.
In this course, you learn the basic framework to investigate and design digital security based on complexity theory via tailored course materials. Advanced knowledge of mathematics is not a prerequisite. The course begins by introducing Shannon's perfectly secret cipher in order to highlight the difference between the earlier information theoretic framework of cryptography and the modern framework based on complexity theory. After covering several pioneering algorithms of modern cryptography such as RSA we will focus on the heart of modern cryptography and cover some of the most important and fundamental methodologies including zero-knowledge proof, random oracle methodology and authentication theory. The course materials are designed so as to encourage intuitive understanding of issues rather than a mathematically rigorous approach, but assumes an elementary understanding of probability theory.
This is a course in microeconomics and its implications for management and strategy primarily in the context of information technology firms. Microeconomics as discussed in this course focuses on the models and methods by which managers can analyze their market and organizational environment to make appropriate decisions. The key to this decision-making is an understanding of the trade-offs in allocating scarce resources. The core models of microeconomics are fundamental to other applied areas of management such as strategy, marketing, production, and finance.
The main objective of this course is to provide a level of economic “literacy” adequate to understand and apply crucial economic concepts to areas as diverse as management decision making and finance; marketing and strategy; policy making and social analysis.
A second, related objective ofthis course is to discuss the particular economic characteristics of the IT industry, and to offers tools to understand its processes and mechanisms.