Teaching

CYBER 221: Overview of Information Security

Undergraduate course, Penn State, College of IST, 2025

Overview

This course focuses on an overview of information security. Students will learn the principles of information security, security architectures and models, aspects and methods of information security such as physical security control, operations security, access control, hacks/attacks/defense, systems and programs security, cryptography, network and web security, worms and viruses, and other Internet secure applications. Students will also learn how to plan and manage security, security policies, business continuity plans, disaster recovery plans, and social and legal issues of information security. A major component of the course will be several hands-on exercises and a final team-based project. This course will incorporate collaborative and action-learning experiences wherever appropriate. Emphases will be placed on developing and practicing writing and speaking skills through application of the concepts, theories and technologies that define the course.

SRA 221: Overview of Information Security

Undergraduate course, Penn State, College of IST, 2025

Overview

The goal of this course is to provide an overview of information security. The topics include software/web security, cryptography, network security, pub key infra, access control, and machine learning security/privacy.

SRA 221: Overview of Information Security

Undergraduate course, Penn State, College of IST, 2024

Overview

The goal of this course is to provide an overview of information security. The topics include software/web security, cryptography, network security, pub key infra, access control, and machine learning security/privacy.

SRA 221: Overview of Information Security

Undergraduate course, Penn State, College of IST, 2024

Overview

The goal of this course is to provide an overview of information security. The topics include software/web security, cryptography, network security, pub key infra, access control, and machine learning security/privacy.

Trustworthy Machine Learning

Graduate course, Penn State, College of IST, 2023

Overview

Machine learning techniques are widely used to solve real-world problems. However, a key challenge is that they are vulnerable to various security and privacy attacks, e.g., adversarial examples, data poisoning attacks, and membership inference attacks. In this course, we will discuss existing attacks and state-of-the-art defenses against those attacks.