Ricardo A. Calix

Machine Learning for Cyber Security

Summer 2019

This is a course in machine learning for cyber security. Topics include: the basic ML approach, features and feature extraction, data set formats, supervised and unsupervised machine learning, applications of machine learning to cyber security: IOT, Malware, IDS, etc.

Biometrics

Spring 2012

This course covers the fundamental concepts and design implications required to implement biometric systems. Topics include: the basic biometric approach, features and feature extraction, data set formats, supervised and unsupervised machine learning, dimensionality reduction and performance evaluation, image based biometric techniques, speech based biometric techniques, behavioral based biometric techniques, and biometric problems and ethical issues.

Assured Systems Design and Implementation

Spring 2012, Spring 2013, Spring 2019

This course covers the design and implementation of assured systems in an enterprise environment. Topics include: Systems design and implementation, network security threats and controls, and special topics.

Intrusion Detection and Prevention Systems

Fall 2013

This course will cover the fundamental concepts and design implications required to develop and implement intrusion detection and prevention systems that address security violations in computer systems. Topics to be covered include: main classes of attacks against computer systems, taxonomy and architecture of intrusion detection and prevention systems, network traffic analysis and feature extraction algorithms, signature and anomaly based techniques, key heuristic based and machine learning based techniques and algorithms for intrusion detection, artificial neural networks (ANNs), and ANN-based embedded systems for intrusion detection.

Systems Administration and Management

Spring 2012, Spring 2013, Spring 2019

Topics include: workstations, servers, services, data centers, disaster recovery, security policy, network administration, helpdesks, debugging, upgrades, namespaces, system maintenance management, email and printing services, system backup, remote access, IT support, scripting with bash and Python for system management.

 

 

Systems Assurance

Fall 2012, Fall 2013, Fall 2018

This course covers the implementation of systems assurance with computing systems. Topics include confidentiality, integrity, authentication, non-repudiation, intrusion detection, physical security, and encryption. Extensive laboratory exercises are assigned.

Software Assurance

Fall 2012, Fall 2013, Fall 2018

This course covers defensive programming techniques, bounds analysis, error handling, advanced testing techniques, detailed code auditing, software specification in a trusted assured environment. Extensive laboratory exercises are assigned.

Physical Computing

Physical computing, in the broadest sense, means building interactive physical systems by the use of software and hardware that can sense and respond to the analog world. In the broad sense, physical computing is a creative framework for understanding human beings' relationship to the digital world. In practical use, the term most often describes handmade art, design or DIY hobby projects that use sensors and microcontrollers to translate analog input to a software system, and/or control electro-mechanical devices such as motors, servos, lighting or other hardware.

Web Systems Technology

Fall 2012, Spring 2013, Fall 2013

This course covers web technologies, information architecture, digital media, web development, vulnerabilities, social software and other topics.


Older courses

rcalix@pnw.edu