Class Information
Class Information
COSC-374 (old numbering), Operating Systems
From the course catalog:
This course studies the software
systems that provide the interface between the computer system
hardware resources and the users of the system. This interface
is composed of a large collection of programs that provide
simplified and uniform access to information storage (data and
programs on tape, disk, and in memory), processing elements
(CPUs and remote computers), input/output devices
(telecommunications, keyboards, mice, video displays,
printers, etc.), and data acquisition and equipment control
devices. Topics include, processes and threads of execution,
concurrent process synchronization, concurrent access to
hardware resources, file systems, memory management and
virtual memory, job scheduling, system modeling and
performance evaluation, network communication and protocols,
and computer and network security. A variety of example
operating systems of different types will be examined and
their characteristics compared. Prerequisites: COSC-173 and
COSC 251. Spring.
Prerequisites
A note on the prerequisites: I am assuming you really did take COSC 250 and 251 and have some clue about how computers operate. Likewise, I am assuming you can navigate basic data structures and can program in C or C++. There will be at least three, not-insignificant programing projects over the course of the semester.
Textbook
Silberschatz, Galvin, Gagne, Operating System Concepts, Wiley, Eighth Edition. ISBN 978-0470128725. The soft-cover international edition is fine. It is what I use, and it is less than half the price of the new hardcover edition.
Class information: Spring 2011
Information
Warfare (COSC-411)
Class Web
Site: https://people.cs.georgetown.edu/~eburger/COSC411
From the course catalog:
This course will study the nature of information warfare, including computer crime and information terrorism, as it relates to national, economic, organizational, and personal security. Students will gain an understanding of the threats to information resources, including military and economic espionage, communications eavesdropping, computer break-ins, denial-of-service, destruction and modification of data, distortion and fabrication of information, forgery, control and disruption of information flow, electronic bombs, and psyops and perception management. They will learn about countermeasures, including authentication, encryption, auditing, monitoring, intrusion detection, and firewalls, and the limitations of those countermeasures. They will learn about cyberspace law and law enforcement, information warfare and the military, and intelligence in the information age. Information warfare policy and ethical issues will be examined.
Format
This
course brings in a number of guest lecturers from the
military, government, industry, and academia. As such,
missing a class or not reading materials before class
could really impact your chances of success in the course.
Prerequisites
There are no prerequisites for the course. However, there can be a considerable amount of readings. None require a deep computer science or policy background, but either of those or both would help.
Class information: Spring 2016
All Semesters
Computer
Science Project Tutorial (Undergraduate: COSC-302,
Graduate: COSC-999-03)
Available for undergraduate independent study. Individual experimental work related to computer science. Student must make arrangements with Prof. Burger and file a proposal endorsed by him. Written report to be submitted upon completion of work.
Prerequisites: Permission of the instructor
Computer
Science Thesis (Undergraduate: COSC-301, Graduate:
COSC-999-01)
Available for undergraduate independent study. Individual experimental work related to computer science. Student must make arrangements with Prof. Burger and file a proposal endorsed by him. Written report to be submitted upon completion of work.
Prerequisites: Permission of the instructor
Class Information: Spring 2019
FinTech & Blockchain (FINC-258): See GU360
Class information: Fall 2018
Advanced Networking (COSC-525): See GU360
Cyber Security Seminar (UNXD-437): See GU360
This is a required course for CyberCorps™ scholarship recipients as well as any other interested individuals (with permission of the instructor).
Meeting
bi-weekly, this combination academic and community-building
course will provide students with an understanding of topics
such as: the requirements of individuals who want security
clearances; Federal cybersecurity regulations and standards,
such as FISMA; the respective roles of DHS and NSA when it
comes to securing government and civilian networks; and the
policy controls and best practices to protect networks and
systems. This course will build community between graduate and
undergraduate students and faculty as well.
The seminar course will have a mix of invited speakers from
government, FFRDCs, industry, academia, and civil society as
well as presentations by the students. We benefit by having
alumnae nearby, who we will invite to campus on a regular
basis to describe their experience at government agencies.
Some class meetings may occur in the field, such as at
Congressional offices, Executive offices, select agencies
(such as DHS, NSA, NGA, DISA), and partner campuses of other
local universities. This provides students with networking
opportunities and the opportunity to work on their
professional communication skills and hone presentation skills
to government officials.