Search

CS 592: Introduction to Digital Forensics for Teachers

This course covers basic concepts and skills of digital forensics. Topics include the digital forensics profession, basic investigation procedure, legal aspects of forensics, setting up the forensic lab environment, evidence data acquisition...

CS 593: Cyber Security Teaching Methods

This course is focused on introduction to existing generally accepted guidelines and frameworks (such as HSCCG, CSEC, CAE Knowledge Units, NCWF) in the discipline of cyber security. Methods for teaching cyber security to transform cyber security...

BUS 597: Independent Study

Variable

This course will allow a student(s) to study a certain business-related topic under the guidance of an affiliated WPI Business School faculty member. The student must produce an appropriate deliverable from this experience to satisfy the course...

Certificate in Artificial Intelligence in Business

The Artificial Intelligence in Business Certificate will prepare professionals with the necessary technological and business foundations to formulate AI strategy and policy, design and implement AI-based business solutions and applications, and use...

Master of Science in Explosion Protection Engineering (XPE)

Goal

The goal of the Master of Science program in Explosion Protection Engineering is:

  • To incorporate current standards of practice and modern theories into education
  • To conduct research to develop new knowledge, and to improve methods of...

B.S./M.S. in Explosion Protection Engineering (XPE)

The requirements for the proposed M.S. in XPE are structured so that undergraduate students would be able to pursue a five-year Bachelors/Masters program, in which the Bachelors degree is awarded in any major offered at WPI and the Master’s degree is...

Graduate Certificate in Secure Programming

Program Goals and Objectives

With the growing demand for expertise in programming securely, the Graduate-level Certificate Program in Secure Programming provides participants with the depth of software security knowledge necessary to develop and...