Your feedback has been sent to our team.
—
—
—
Spring 2026
Students apply academic experiences in professional and/or research settings; reflect and critically and constructively analyze experiences from multiple perspectives; and view the work as connecting course content authentic contexts. Students work as professionals with site supervisors and instructors to complete related assignments and relevant background research on the professional and academic resources available.
—
—
—
Spring 2026
An Independent Study in Archaeology. Subject to be determined by student and instructor.
—
—
3.89
Spring 2025
In this course, students will learn how to trace the "causal chains" from such actions/inactions to various ecosystem, social, and economic outcomes and to measure and value those outcomes. We will consider the philosophical/ethical underpinnings of the Ecosystem Services framework, use computer mapping and other software tools for evaluation, and review current applications of the framework by private and public sector entities.
—
—
3.59
Spring 2025
Explores mobile device architecture and cyber threats. Examines the security strengths and weaknesses of mobile devices and platforms, as well as corporate mobile security policies and procedures. Topics include mobile device operating system software architecture, mobile application architecture, mobile device and application vulnerability assessment testing, and mobile device forensic analysis.
—
—
—
Fall 2025
Critique models and adapt them to a variety of data sets. Gain a deeper understanding of core ML concepts. Build towards neural networks (latent index models, more complex linear models with non-linear transformations of the data). Compare new methods to kNN, clustering, linear models from ML1 to discuss performance differences as complex and predictive power increases. How mathematical concepts are present in the models presented.
—
—
—
Spring 2026
Principles of interactivity in application and dashboard development using R, Python, and JavaScript programming languages. Design visually appealing and user-friendly interfaces, develop interactive applications for data visualization, and build dynamic dashboards for effective data communication with end-users. Covers theoretical concepts and hands-on implementation to provide a comprehensive understanding of the full design process.
—
—
—
Spring 2026
Explainable artificial intelligence (XAI) is a subfield of machine learning that provides transparency for complex models to connect the technical meaning to social interpretation. Explore interpretability, transparency, and black-box machine learning methods. Covers definitions, decision support, trust, and ethical considerations, and the latest advances in creating reliable and transparent AI models.
—
—
—
Summer 2025
Explores the tools and techniques used to assess the security posture of a target system. Topics include footprinting, reconnaissance, vulnerability discovery, and malware. Covers vulnerability discovery in a variety of systems, including web applications, mobile platforms, and cloud computing. Aligns with the EC-Council ANSI accredited Certified Ethical Hacker exam 312-50.
—
—
—
Spring 2026
Understand Deep Learning covering neural networks, activation functions, and optimization algorithms. Gain experience with TensorFlow and PyTorch, mastering key techniques such as Convolutional Neural Networks (CNNs), Recurrent Neural Networks (RNNs), and Generative Adversarial Networks (GANs). Explore transfer learning, reinforcement learning, and natural language processing (NLP), along with industry applications and ethical considerations.
—
—
3.67
Fall 2025
What are the strengths and weaknesses of the major policy-making institutions, and how does the current system of American governance compare with that of other advanced societies? This class will examine the key institutional and political actors in policymaking; focusing on the increasing fole of non-governmental institutions in problem solving.
No course sections viewed yet.