<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Courses on Aashutosh Poudel</title><link>https://atosh502.github.io/tags/courses/</link><description>Recent content in Courses on Aashutosh Poudel</description><generator>Hugo</generator><language>en-US</language><copyright>Copyright © \b20\d{2}\b, Aashutosh Poudel.</copyright><lastBuildDate>Sat, 28 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://atosh502.github.io/tags/courses/index.xml" rel="self" type="application/rss+xml"/><item><title>Courses</title><link>https://atosh502.github.io/blog/courses/</link><pubDate>Sat, 28 Mar 2026 00:00:00 +0000</pubDate><guid>https://atosh502.github.io/blog/courses/</guid><description>&lt;p&gt;A list of courses on various topics.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Programming&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://ocw.mit.edu/courses/6-s095-programming-for-the-puzzled-january-iap-2018/"&gt;Programming for the Puzzled&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://missing.csail.mit.edu/"&gt;Missing Semester | MIT&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Systems/Security&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://shd.mit.edu/home/"&gt;Secure Hardware Design&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/eunomia-bpf/bpf-developer-tutorial"&gt;bpf-developer-tutorial&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.udemy.com/course/essentials-of-garbage-collectors"&gt;Garbage Collection Algorithms&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://pdos.csail.mit.edu/6.828/2018/labguide.html"&gt;Operating System Engineering | MIT&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://dse.in.tum.de/teaching/"&gt;Systems Programming | TUM&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/ls1-sys-prog-course/docs"&gt;Systems Programming&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/ls1-adv-sys-prog-course/docs"&gt;Advanced Systems Programming&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cs.wm.edu/~smherwig/courses/csci415-f2024/index.html"&gt;Systems Programming | Stephen Herwig&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cs.wm.edu/~smherwig/courses/csci780-s2025/"&gt;Distributed System Security | Stephen Herwig&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.coursera.org/learn/hardware-security"&gt;Hardware Security | Gang Qu&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cl.cam.ac.uk/teaching/2425/ConcDisSys/"&gt;Concurrent and Distributed Systems | Martin Kleppmann&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Cryptography&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://appliedcryptography.page/"&gt;appliedcryptography.page | Nadim Kobeissi&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cseweb.ucsd.edu/~mihir/cse209b-Wi21/index.html"&gt;Seeing The Invisible&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.coursera.org/learn/cryptography/"&gt;Cryptography | Jonathan Katz&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.coursera.org/projects/encryption-decryption-cpp"&gt;Encryption and Decryption using C++&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.coursera.org/learn/mathematical-foundations-cryptography"&gt;Mathematical Foundations for Cryptography&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/matthewdgreen/practicalcrypto"&gt;matthewdgreen | practicalcrypto&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cs.unc.edu/~saba/priv_class/summer25/index.html"&gt;PETS | Saba Eskandarian&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cs.unc.edu/~saba/crypto_class/index.html"&gt;Cryptography | Saba Eskandarian&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://rareskills.io/zk-book"&gt;Zero Knowledge Proofs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cl.cam.ac.uk/teaching/2425/P79/"&gt;Cryptography and Protocol Engineering | Martin Kleppmann&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Math/Physics&lt;/p&gt;</description></item><item><title>appliedcryptography.page</title><link>https://atosh502.github.io/blog/til/2026/march/appliedcryptography.page/</link><pubDate>Tue, 24 Mar 2026 00:00:00 +0000</pubDate><guid>https://atosh502.github.io/blog/til/2026/march/appliedcryptography.page/</guid><description>&lt;ul&gt;
&lt;li&gt;Very interesting talk by &lt;a href="https://nadim.computer/"&gt;Nadim Kobeissi&lt;/a&gt; on teaching Cryptography in Post-Crisis Lebanon.&lt;/li&gt;
&lt;li&gt;The course syllabus, assignments, and projects are awesome.&lt;/li&gt;
&lt;li&gt;For students with zero crypto experience.&lt;/li&gt;
&lt;li&gt;Based on Joy of Cryptography (Mike Rosulek) and Serious Cryptography (Jean-Philippe Aumasson).&lt;/li&gt;
&lt;li&gt;&amp;ldquo;Earning Attention, Not Assuming It&amp;rdquo;
&lt;ul&gt;
&lt;li&gt;enfranchise students and earn their attention&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&amp;ldquo;Break the intimidation barrier&amp;rdquo;
&lt;ul&gt;
&lt;li&gt;hard math behind cryptography is &amp;ldquo;intimidation&amp;rdquo;&lt;/li&gt;
&lt;li&gt;&amp;ldquo;intimidation&amp;rdquo; stemming from &amp;ldquo;notation&amp;rdquo;&lt;/li&gt;
&lt;li&gt;&amp;ldquo;notations&amp;rdquo; (mathematical formalisms) are scarier than the &amp;ldquo;ideas&amp;rdquo; they contain&lt;/li&gt;
&lt;li&gt;&amp;ldquo;ideas&amp;rdquo; are intuitive and easy to explain&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Links&lt;/p&gt;</description></item></channel></rss>