star twitter facebook envelope linkedin youtube alert-red alert home left-quote chevron hamburger minus plus search triangle x

Program and Schedule


Class #1: Introduction to Information Security

This course introduces a variety of cyber security topics from a management, policy, and technology framework. Topics covered include; security of user-web interaction; safeguarding the Internet of Things; cyber-warfare; securing virtual, cloud, and mobile environments; and legal and ethical issues of security and privacy.

Randy Trzeciak holds a dual appointment between the Heinz College and the CERT Program at the Software Engineering Institute. Randy is Director of the Masters of Science Information Security Policy & Management (MSISPM) at CMU and instructs the core introductory course in the program. At CERT, Randy is the Technical Manager of the Enterprise Threat and Vulnerability Management Team and the Insider Threat Center

 Class #2: Data Management and Security

Data plays a fundamental part in the functioning of the modern world. As custodians of this data, databases affect almost every aspect of our lives---education, employment, entertainment, tax, medical, commercial---to name a few. In the broader picture of information security, database security is a critical facet. In this course we will study how to design, build, work with, and secure a database.

Raja Sooriamurthi is a Teaching Professor in the Information Systems Program in Dietrich College. With his academic training in Artificial Intelligence, Raja teaches a range of classes in the general space of using data for decision making (Database Design and Development, Intelligent Decision Support Systems, Big Data and Analytics, Practical Data Science). Along with colleagues, he also works in the pedagogical area of puzzle-based learning and has co-authored the book Guide to Teaching Puzzle-based Learning.

 Class: Ethical Penetration Testing

This course will introduce students to professional penetration testing by teaching offensive tactics along with the appropriate methodologies and responsibilities it takes to ethically attack systems. The majority of time will be spent in hands-on labs performing reconnaissance, discovering vulnerabilities, developing exploits, and carefully penetrating targets.

Michael Cook oversees the CERT penetration testing and vulnerability assessment program. He works with the DHS and state and local government entities to minimize vulnerabilities and improve operational resiliency.