Network Technology Protocols and Defense. From an operating systems standpoint, we will study privileged and non-privileged states, processes and threads (and their management), memory (real, virtual, and management), files systems, access controls (models and mechanisms), access control lists, virtualization/hypervisors, how does an OS protect itself from attack?, security design principles as applied to an OS, domain separation, process isolation, resource encapsulation, and least privilege. We will also cover machine level representation of data, computer architecture and organization, assembly level machine organization, interfacing and communication, memory systems organization and architecture, functional organization, multiprocessing and alternative architectures, performance enhancements, and distributed architectures. From a computer architecture standpoint, we will study hardware components, gates/buses/memory, and their use in constructing adders, comparators and addressing schemes. This course covers computer architecture and operating systems. Computer Architecture and Operating Systems. Course Type(s): Core curriculum course.ĬS-339.
The assignments in the course are designed to assess both core competencies and essential (soft/professional) skills. In addition, essential skills (e.g., teamwork and communications skills), which are required in the workforce.
The content for the course covers core competencies e.g., knowledge, skills, and abilities relating to the identification, detection, protection against, response to, and recovery from an insider threat including how to build and maintain communications with executives, peers and regulators. Students will focus on the interrelated dimensions of threats (which may include but are not limited to technical, procedural, legal, behavioral, skills/proficiencies) and the spectrum of constituent cyber domains/functional areas in which to identify solutions. The goal of the course is to enable students to analyze realistic case scenarios and identify the depth and breadth of cybersecurity from multiple perspectives. In this course, students will become "cyber interns" and work in teams with course faculty, graduate assistants, and industry experts as mentors using the iQ4 online/cloud communication platform. If there are minor or gross misconceptions surrounding the criminal justice system and voters galvanize what we refer to as "living room policy-making," the results can be ineffective, irresponsible, or injurious.ĬS-298. Because much of public policy stems from reaction to voters' opinions, how voters form these opinions matters greatly. It is imperative that future practitioners in the field of criminal justice come to an understanding of this phenomenon. This explains why people who rely on media for their information about crime and criminal justice often hold misconceptions about the nature of crime, criminal justice practices, and criminals themselves. Today, this focus on crime and entertainment that centers on crime is widespread. From the beginning of this "American experiment," crime and criminal justice have held a prominent place in media. The list of media forms has grown rapidly-in addition to more traditional sources of media, we now rely on websites, social network sites, and blogs.
Newspapers, advertising, television, etc. Every citizen, every day, has contact with the media in some form. This course provides insight into the intersection of media and crime and the subsequent influence this has on public policy. This course examines the literature of the Black Atlantic, proceeding from a survey of different theorizations of blackness to an analysis of select works by black authors that focus particularly on social and cultural encounters, exchanges, movements, and inter-group conceptualizations of different Africana peoples. This is what scholar Paul Gilroy, in his groundbreaking formulation, calls "the Black Atlantic": an Africanist socio-cultural entity that traverses national and geographic borders.
3 Credits.Īfricana culture has flowed across the Atlantic Ocean littoral from the earliest days of the trans-Atlantic slave trade - not just from West Africa to the New World, but back and forth in complex circuits interconnecting the black peoples of West Africa, the Caribbean, the United States, and the United Kingdom.