-
Major Subject: Electronic Computer Network Technology.
Fundamentals, Network and Information Security Fundamentals, Windows System Security Prevention, Network Security.
Technical technology, Linux server configuration and management methods, network security protection, etc.
Career direction: University graduates can work in the control and development of cyber security and other fields in computer, communication, electronic information technology, e-commerce, financial industry, smart government and other industries. Technical certificates are available:
Network Engineer, Network Information Security Technology Engineer, Information Security Technology Technology Engineering Department Xiangcheng Division, etc.
Information Security Major.
The key courses are as follows: the basic professional and the key professional subjects are: advanced mathematics and discrete mathematics.
Calculation Methods, Probability Statistics and Mathematical Statistics, Preliminary Computers and Algorithms, C Language Programming, Programming and Optimization Algorithms, Principles and Assembly Programs of Computational Balances, Database Principles, Computer Operating Systems.
College Physics, Combination and Graph Theory, Analytic Geometry and Logic, Basic Principles of Cryptographic Algorithms, Basic Theory of Numbering, Fundamentals of Information Theory, Network Information Security System Architecture, Software Development, Digital Logic, Internet, etc.
The information security major belongs to the computer major, which is computer science, communication, mathematics, physics, laws and regulations.
Interdisciplinary science and key scientific research such as management methods ensure data security.
of science and technology. Shape high-end data security professionals who can work in electronic computers, communications, e-commerce, smart government affairs, electronic devices, and financial industries.
This major shapes the comprehensive development of literacy, professional knowledge and work ability, has the basic knowledge of social sciences, humanities and electronic information science, grasps the basic theories, basic technologies and common sense of network information security, and has the professional ability of network information security research, scientific research and development and business systems.
-
The main courses of information security major: advanced mathematics, linear algebra, calculation methods, probability theory and mathematical statistics, preliminary computer and algorithms, C++ language programming, data structures and algorithms, etc.
In addition to the public basic courses of science and engineering, students mainly study the professional foundation and professional courses: advanced mathematics, linear algebra, computational methods, probability theory and mathematical statistics, computer and algorithm preliminary, C++ language programming, data structure and algorithm, computer theory and assembly language, database principle, operating system, college physics, set and graph theory, algebra and logic, cryptography principle, coding theory, information theory foundation, information security architecture, software engineering, digital logic, computer networks, etc.
In addition to the above-mentioned professional courses, there are also major elective courses for large sales, mainly including: Principles of Data Communication, Introduction to Information Security, Computer Network Security Management, Digital Identification and Authentication System, Network Security Detection and Prevention Technology, Firewall Technology, Virus Mechanism and Protection Technology, Network Security Protocols and Standards, etc.
-
The main courses of information security include the principles and techniques of cryptography, network defense and reputation resistance, cryptography application and practice, computer system and network security, network protocol, engineering, introduction to network information security, etc. Information security refers to the establishment of better technical management and security protection for the data processing system, and the protection of computer software and hardware data from destruction, alteration and leakage due to accidental or malicious reasons.
-
Information security refers to the hardware and software of the information network, including the protection of the data in the system grinding, not to be destroyed by accident or blind failure, malicious reasons, changes and leaks, the system can run normally, and the task of information will not be interrupted; The courses required for information security majors include Advanced Mathematics, Computational Methods, Linear Algebra, Preliminary Computer Science and Algorithms, Mathematical Structures and Algorithms, Probability Theory and Mathematical Statistics.
-
Information security is to ensure the security of the information in the process of transmission, and to ensure that the information is not distorted in the process of transmission; The subjects studied are network security information security, operating systems, security information theory and coding, computer networks, computer virus and its prevention and control technology, intrusion detection technology, web technology and application.
-
The core undergraduate courses of information security major include Principles and Mathematical Foundations of Information Security, Software Security, Operating Systems, Advanced Data Structures and Algorithm Analysis, Computer Composition, Cryptography, Data Security and Privacy Protection, Computer Networks, Computer Architecture, Principles and Practice of Network Security, Compilation Principles, System Security, Artificial Intelligence Security, Wireless and Internet of Things Security Basics, Game Theory Basics, Advanced Cryptography, Multi-** Security, Signal Processing for Information Security, Hardware Security Basics, Safety, laws and regulations and ethics, etc.
-
Information security focuses on computer fundamentals, encryption technology, network security, data security, application security, security management, law and ethics, and security incident response.
1. Computer Basics: Learn the basic knowledge of computer system structure, operating system, network communication principles and databases, and understand the working principles of computers and common software and hardware technologies.
2. Encryption technology: Learn various encryption algorithms, protocols and technologies, including symmetric encryption, asymmetric encryption, digital signatures, digital certificates, etc., to protect the confidentiality, integrity and identity authentication of data.
3. Network security: learn the basic principles and techniques of network security, including network attack and defense, configuration and management of firewalls and intrusion detection systems, network security policies and security assessments, etc.
4. Data security: learn the methods and techniques of data security management, including data backup and recovery, access control, permission management, data classification and encryption, data loss and leakage prevention, etc.
5. Application security: learn security coding, vulnerability scanning and penetration testing techniques in application development, as well as security protection and security assessment of mobile applications and web applications.
6. Security management: learn the principles and practices of information security management, including security strategy and policy formulation, risk assessment and management, security awareness training, security compliance and supervision, etc.
7. Law and ethics: Learn the legal and ethical issues related to information security, and understand the legal requirements and ethical guidelines for personal privacy protection, intellectual property protection and cybercrime.
8. Security incident response: learn the analysis and response methods of security events, including intrusion detection and response, traceability and forensics, malicious analysis and removal, etc.
Information Security Professional Learning Content
1. Network security, learn the basic principles and technologies of network security, including network attack and defense, intrusion detection and prevention, firewall and VPN technology, network security management and strategy, etc.
2. Cryptography, the study of the principles and methods of using cryptography algorithms to encrypt and protect data, including symmetric encryption algorithms (such as DES, AES), asymmetric encryption algorithms (such as RSA, ECC), digital signatures, digital certificates, etc.
3. Security strategy and management, learn to formulate and implement information security strategy and management, including risk assessment, security control and compliance, security audit and monitoring, security incident response, etc.
4. Malware analysis and security protection, learning and analyzing the working principles and characteristics of various types of malware (such as viruses, Trojans, worms, botnets, etc.), as well as developing and applying corresponding security protection technologies.
5. Data security and privacy protection, learn the methods and technologies of data security management, including data encryption and encryption algorithms, access control, data backup and recovery, privacy protection and compliance, etc.
6. Application security, learning security coding and software vulnerability analysis in application development, as well as developing and applying corresponding security protection technologies, such as web application security, mobile application security, etc.
Information security technology is a professional course for undergraduate students majoring in information management and information systems. With the rapid development of computer technology, computer information security has attracted more and more attention. It is essential for students to master the necessary information security management and security prevention techniques. >>>More
Information security itself includes a wide range of confidential security, such as national military and political security, and a small scope, of course, including preventing the leakage of commercial enterprise secrets, preventing young people from browsing bad information, and leaking personal information. The information security system in the network environment is the key to ensure information security, including computer security operating system, various security protocols, security mechanisms (digital signature, information authentication, data encryption, etc.), and even the security system, any one of which can threaten the global security. Information security services should at least include the basic theories that support information network security services, as well as the network security service architecture based on the new generation of information network architecture. >>>More
The main threats to information system security are: >>>More
Yes, the employment of electronic information engineering (including electronic information major or communication engineering major) is very good. >>>More
Generally, it refers to the protective measures (iron windows, surveillance, iron doors, iron filing cabinets, etc.) of the house where confidential records are stored. >>>More