Knitting = Coding + Algorithms
Instructor: Pam Duffy
Knitting is a computational process! This course explores how pattern recognition, algorithms, and loops play a role in fiber arts. Students will learn how crafting techniques reflect core programming concepts like iteration and abstraction.
Seeing the Internet
Instructor: Dennis Frezzo
The internet isn’t invisible! This course visualizes how data moves across networks, from browsing a website to streaming video. Through hands-on experiments, students will map, trace, and analyze the web’s infrastructure.
Electronics for Makers
Instructor: Dennis Frezzo
A hands-on introduction to electronics, circuits, and hardware tinkering. Students will build simple electronic projects while learning the fundamentals of voltage, resistance, sensors, and microcontrollers.
The Internet of Things (IoT)
Instructor: Dennis Frezzo
The world is full of smart devices—but how do they work? This course introduces students to the Internet of Things, exploring connected devices, embedded systems, and cloud-based interactions through hands-on projects.
Personal Cartography: Mapping Your World
Instructor: Brian Gillikin
Students will create interactive digital maps based on their personal interests—travel, urban exploration, outdoor adventures, or even their favorite books. Learn the basics of cartography, digital mapping tools, and geographic visualization.
Social Media Feed Algorithms
Instructor: Jen Golbeck
Your social media feeds are shaped by AI-driven algorithms—but how do they work? This course demystifies platform curation, algorithmic bias, and engagement strategies, helping students understand and critically assess their digital environments.
Ethical Hacking Series (3 1-credit courses or 3 credits for the sequence)
Instructor: Ido Sivan-Sevilla
- Operating Systems – Identify vulnerabilities in operating systems and how to defend against cyber threats.
- Networking – Learn ethical hacking techniques for analyzing and securing networks.
- Honeypots – Experiment with deception-based security strategies to trap malicious actors.