- Mar 25, 2026
- May 6, 2026
- Jun 17, 2026
- Jul 29, 2026
- Sep 9, 2026
- Oct 21, 2026
- Dec 2, 2026
Protocols for authenticating machines play an important role in systems security, and this course will focus on various aspects of this challenge. Using case studies of protocols that work and that have failed will help you to acquire the skill — and the skepticism — necessary to analyze and deploy authentication protocols successfully. In this course, you will investigate shared key and public key cryptography along with the trade-offs associated with these different types of keys. You will also examine some of the standard cryptographic building blocks and their use.
The following course is required to be completed before taking this course:
- Systems Security
- Apr 15, 2026
- May 27, 2026
- Jul 8, 2026
- Aug 19, 2026
- Sep 30, 2026
- Nov 11, 2026
- Dec 23, 2026
If an attacker can masquerade as an authorized user of a system, then many other defenses become irrelevant. This course addresses how a computing system can authenticate a human user, discussing implementations of mechanisms as well as their privacy implications. You will explore the protocols of passwords, biometrics, and tokens, along with their combination as multifactor authentication.
The following course is required to be completed before taking this course:
- Systems Security
Additionally, you are required to have completed the following course or have equivalent experience:
- Authenticating Machines
- Mar 25, 2026
- May 6, 2026
- Jun 17, 2026
- Jul 29, 2026
- Sep 9, 2026
- Oct 21, 2026
- Dec 2, 2026
Access control mechanisms ensure that a user is able to read and/or update only certain objects. With discretionary access control, it is the creator of an object who decides which other users should have access. A broad set of mechanisms have been developed to enforce discretionary access control in a computing system. This course will survey the two approaches widely used in these mechanisms: access control lists and capabilities. Through the use of case studies, you will review the pragmatics of implementations in processor hardware, operating systems, and programming languages.
It is recommended to only take this course if you have completed “Systems Security,” “Authenticating Machines,” and “Authenticating Humans,” or have equivalent experience.
- May 27, 2026
- Jul 8, 2026
- Aug 19, 2026
- Sep 30, 2026
- Nov 11, 2026
- Dec 23, 2026
Sometimes the owner of an object is not, in fact, the one to determine who should get access to that object; rather, it is an institutional policy that dictates that decision. This form of access control is known as mandatory access control, and it is frequently used in business and military settings. In this course, you will review various forms of mandatory access control policies and their implementations, including multilevel security, commercial, and role-based access control schemes.
It is recommended to only take this course if you have completed “Systems Security,” “Authenticating Machines,” “Authenticating Humans,” and “Discretionary Access Control,” or have equivalent experience.
- Mar 25, 2026
- May 6, 2026
- Jun 17, 2026
- Jul 29, 2026
- Sep 9, 2026
- Oct 21, 2026
- Dec 2, 2026
Vulnerable systems are made secure by employing enforcement mechanisms. Beyond enforcement mechanisms for authentication and for authorization, this course will explore the use of mechanisms for protecting the integrity of systems and, thus, preventing an attacker from circumventing controls. You will learn about the three primary classes of enforcement mechanisms — mediation/monitoring, isolation, and asymmetry — and discuss how they are deployed in systems today.
It is recommended to only take this course if you have completed “Systems Security,” “Authenticating Machines,” “Authenticating Humans,” “Discretionary Access Control,” and “Mandatory Access Control,” or have equivalent experience.
- Apr 15, 2026
- May 27, 2026
- Jul 8, 2026
- Aug 19, 2026
- Sep 30, 2026
- Nov 11, 2026
- Dec 23, 2026
eCornell Online Workshops are live, interactive 3-hour learning experiences led by Cornell faculty experts. These premium short-format sessions focus on AI topics and are designed for busy professionals who want to gain immediately applicable skills and strategic perspectives. Workshops include faculty presentations, breakout discussions, and guided hands-on practice.
The AI Workshops All-Access Pass provides you with unlimited participation for 6 months from your date of purchase. Whether you choose to attend one workshop per month, or several per week, the All-Access Pass will allow you to customize your AI journey and stay on top of the latest AI trends.
Workshops cover a range of cutting-edge AI topics applicable across industries, hosted by Cornell faculty at the forefront of their fields. Whether you are just getting started with AI, seeking to build your AI skillset, or exploring advanced applications of AI, Workshops will provide you with an action-oriented learning experience for immediate application in your career. Sample Workshops include:
- Work Smarter with AI Agents: Individual and Team Effectiveness
- Leading AI Transformation: Bigger Than You Imagine, Harder Than You Expect
- Using AI at Work: Practical Choices and Better Results
- Search & Discoverability in the Era of AI
- Don't Just Prompt AI - Govern it
- AI-Powered Product Manager
- Leverage AI and Human Connection to Lead through Uncertainty

eCornell was truly one of the best investments I made in my entire career and it’s what brought me to where I am now.
eCornell was truly one of the best investments I made in my entire career and it’s what brought me to where I am now.

What I wanted was something that had an exceptional caliber of professionals and professors, and eCornell actually gave me that.
What I wanted was something that had an exceptional caliber of professionals and professors, and eCornell actually gave me that.
- View slide #1
- View slide #2
- View slide #3
- View slide #4
- View slide #5
top Minds
100% Online
that fit your life and career.
career



