Currently, information technology occupies an important position in the social infrastructure and information security supports its safety and security. The information security includes various aspects. Extensive knowledge of information security is required to ensure the security. In this lecture, we teach the broad and balanced knowledge on the information security without sticking to a specific research field.
Students acquire the extensive knowledge of the information security, specifically, network security, software security, cryptography, authentication protocols, and protection of intellectual property, from the various viewpoints of the advanced information security.
information security, network security, intrusion detection, public key infrastructure, applied cryptography, electronic commerce, copyright protection
|✔ Specialist skills||✔ Intercultural skills||Communication skills||Critical thinking skills||✔ Practical and/or problem-solving skills|
We give lectures.
|Course schedule||Required learning|
|Class 1||Overview of information security||Understand the overview of the information security|
|Class 2||Web Security||Understand the vulnerabilities and their mechanism in Web computing|
|Class 3||Software Development and Security||Understand the methods and mechanisms for obtaining security requirements in software development and quality assurance through security testing.|
|Class 4||Information flow control||Understand the information flow control necessary to ensure security.|
|Class 5||Malware||Understand the mechanisms and the today's situation of malware such as a computer virus|
|Class 6||Program analysis for security||Understand program analysis methods to ensure security.|
|Class 7||Blockchain||Understand blockchain technology and related technologies from a security perspective.|
|Class 8||Security Management||Understand the knowledge and state-of-arts of security management in the real organization|
|Class 9||Public key infrastructure||Understand the position and the usage of the public key infrastructure in the information society|
|Class 10||Human Aspect of Security||Understand human's mind in the information security|
|Class 11||Security protocol||Understand the role of the security protocol to ensure the safe communication on the internet|
|Class 12||cloud and privacy||Understand the issues and the traditional techniques on the security and the privacy|
|Class 13||Supplemental Advanced Topics 1.||Understand supplimental advanced topics on the information security.|
|Class 14||Supplemental Advanced Topics 2.||Understand supplimental advanced topics on the information security.|
To enhance effective learning, students are encouraged to spend approximately 100 minutes preparing for class and another 100 minutes reviewing class content afterwards (including assignments) for each class.
They should do so by referring to textbooks and other course material.
We will give handouts to students as necessary
1 Network Security Private Communication in a PUBLIC World, Charlie Kaufman, Rdia Perlman, Mike Speciner Prentice Hall
2. Practical Unix & Internet Security Simon Garfinkel, Gene Spafford O'Reilly & Associates
Evaluated by reports
Fundamental knowledge of operating systems and computer networks.