• <More on Intel.com
Masthead Light

Intel® Security Curricula

Intel Security Program Open Source Curricula

The following courses have been developed by universities using sponsorship from the Intel® Higher Education Program.  The curricula are hosted on the universities’ servers and are open to use.

University Professor Courses/More Info
Aalto University and University of Helsinki N. Asokan

Mobile Platform Security

Software Security

Bluegrass Community and Technical College Cindy S. Tucker  Secure Coding in an Introductory-level Android Mobile Application Development Course
Carnegie Mellon University Virgil Gligor Trusted Computing
Georgia Tech Information Security Center Wenke Lee Georgia Tech Information Security Center
HuaZhong University of Science and Technology Hefei Ling Privacy Requirements in Data Center/Cloud Usecase
Imperial College London Michael Huth Integrating Security Protocol Analyzers into Undergraduate Curricula
K.U. Leuven
Ingrid Verbauwhede

Secure Embedded Circuits & Systems 

Trust in Embedded Devices 

Harvey Mudd College Geoff Kuenning Fundamental Cyber Security Curricula For CS
National Taiwan University Chen-Mou Cheng High-speed Cryptographic Engineering
Peking University Qingni Shen Virtualization Security Curriculum
Royal Holloway, University of London Dusko Pavlovic Economics and Security
Shanghai Jiao Tong University Kefei Chen Security in Mobile Cloud
Towson Blair Taylor  Balancing Privacy and Social Media
Tsinghua University Zhen Chen Security Vulnerability Analysis Based on Cloud Platform with Intel® Architecture
Tsinghua University Yu Chen System Security Topics on Advanced OS Course
TU Berlin Jean-Pierre Seifert Integrated Embedded Security Course
Union College Elizabeth Hawthorne  Digital Forensics and Cyber Investigations
Universidade Estadual do Ceará (UECE) André Luiz Moura dos Santos Security of Large Scale Systems
University of California at Los Angeles Peter Reiher Security Curricula For Core Computer Science and 
Engineering Classes
University of California at Los Angeles William Kaiser DEEP -- Decision Support for Energy Efficient Processing
University College London Angela Sasse People and Security
University College London Gianluca Stringhini  Computer Security 2
University of Maryland Elaine Shi Privacy Enhancing Technologies
University of Michigan Morley Mao Network Security Research Projects
University of Michigan J. Alex Halderman Introduction to Computer Security

University of North Carolina Chapel Hill

Michael Reiter

Authentication in Distributed Systems

University of Science and Technology of China

Shaoyin Cheng

Software Security and Testing

University of Southern California Information Sciences Institute

Jelena Mirkovic


University of Texas at San Antonio Ravi Sandhu 
Security Architectures for Cloud and Distributed Systems
University of Warsaw Aleksy Schubert Constructing Trusted Computing Base
University of Warsaw Aleksy Schubert Cryptography for Computer Scientists
University of Washington Tadayoshi Kohno Control-Alt-Hack: White Hat Hacking For Fun and Profit
Wuhan University Huanguo Zhang Trusted Computing Technology and Use Case Curriculum
Xidian University Hui Li  Algorithmic Data Privacy and Management