Training Program for Information Security
Undergraduates Version 2015
TRAINING GOALS
Have a solid foundation of science and engineering, solid professional knowledge and skills, practical applications skills, systems analysis and design ability, capacity to become an innovator in the field of computer science; basic literacy in academic research sufficient to continue to postgraduate education; humanistic literacy, knowledge of professional ethics and social responsibility;
good communication and coordination skills, teamwork, interdisciplinary collaboration skill as well as the international skill, in order to cultivate the future success for industry or academic and even management.
REQUIREMENTS
Undergraduate graduates majoring in Information Security must meet the following requirements:
1 Engineering Knowledge: master mathematics, natural science, engineering and computer science knowledge to solve complex engineering problems of computer system.
2 Problem Analysis: analysis based on the basic principles, using applied mathematics, natural sciences and engineering science to obtain valid conclusions for complex engineering problems in computer systems.
3 Design / Develop Solutions: able to design solutions for the engineering of complex computer systems, meeting the specific requirements of computer systems, components or processes; can embody a sense of innovation in design; consider the social, health, security, legal, cultural and environmental factors.
4 Research: Able to complex engineering problems using scientific methods, including experimental design, analysis and interpretation of data, and derive rational conclusions.
5 Using Modern Tools: be able to address complex computer systems engineering questions and development tasks by selecting and employing appropriate technologies, resources, and tools, including modeling and prediction techniques while also understanding of the limitations of such techniques.
6 Engineering and Society: be able to use engineering related background knowledge to do rational analysis, computer engineering and computer systems evaluation for engineering problems implementing social schemes, health, safety, legal and culturally oriented programs, with an understanding and perspective on related responsibilities.
7 Environment and Sustainable Development: to understand and evaluate engineering practices for complex computer systems engineering problems related to the environment, and understand sustainable development.
8 Occupation Specifications: have some humanistic and social science literacy, awareness of social responsibility, and abide by standards of professional ethics to carry out work responsibly.
9 Individuals and Team: can take responsibility as an individual in a multidisciplinary context, or as a team member taking the role of a responsible person.
10 Communication: have the ability to effectively communicate and exchange ideas about complex computer system engineering problems with industry peers and the public, including report writing and document design, statement making, clarity in expression and making authoritative responses. Also, have international sensitivity so as to be capable of communication in a cross-cultural context.
11 Project Management: understand and use decision making methods for project management; use economic principles in a multidisciplinary environment.
12 Independent Learning & Lifelong Learning: have the consciousness of lifelong learning and continuous learning and have the ability to adapt to technology and social development.
TRAINING CHARACTERISTICS
The major in the Ministry of education undergraduate professional directory belongs to information security specialty. Our training program uses information security education accreditation standards as a criterion, combined with our school’s actual development. We pay attention to the network space safety first level discipline as the basic knowledge and professional skill, and at the same time, we exercise students information security engineering practice ability, cultivate scientific research and technological innovation literacy, strengthen interdisciplinary and international exchanges. We emphasize the focus of information system security, network security, information content security and information mining research and many cross concentration characteristics.
LENGTH OF SCHOOLING, BASIC REQUIREMENTS FOR GRADUATION AND DEGREE GRANTING
1 Undergraduate basic educational system normally takes 4 years, with flexible learning time of 3-6 years, in accordance with the credit management system.
2 Students majoring in information security graduate with at least 165 credits, including various types of courses and procedure requirements of credits. Credits required are listed in the following table:
Curriculum Category |
General Required |
Subject Core |
College Core |
Major Core |
Major Elective |
General Elective |
Focus Practice |
Total |
Credits |
24 |
24 |
28 |
13 |
35 |
8 |
33 |
165 |
3 The students who complete the training program consisting of required courses, elective courses and related courses, achieve the required minimum graduation marks, and complete the courses required with qualified ethics, intellectual and health. Meet the degree granting requirements of the relevant documents will be awarded the degree of Bachelor of Engineering.
THE CURRICULUM AND CREDIT DISTRIBUTION
(a) general education curriculum (compulsory 24 + (6) elective credits + 8 credits)
General education curriculum includes two parts. The compulsory and electives. Electives are in accordance with the Hunan University general elective courses (Quality Education) program. The general compulsory courses are as follows:
Course Code |
Course Name |
Credit |
Remarks |
GE01101 |
AN INTRODUCTION TO MAO ZEDONG THOUGHT AND THEORETICAL SYSTEM OF CHINESE CHARACTERISTICS SOCIALISM |
3 (+3) |
|
GE01039 |
ETHICS EDUCATION AND LAW FUNDAMENTALS |
1.5+(1.5) |
|
GE01100 |
SITUATION AND POLICY |
0.5+(1.5) |
|
GE01102 |
OUTLINE OF MODERN CHINESE HISTORY |
2 |
|
GE01103 |
THE BASIC PRINCIPLE OF THE MARX DOCTRINE (ONE) |
2 |
|
GE01104 |
THE BASIC PRINCIPLE OF THE MARX DOCTRINE (TWO) |
2 |
|
GE01012(-15) |
COLLEGE ENGLISH |
8 |
|
GE01107(-13) |
PSYCHOLOGICAL QUALITY AND CAREER DEVELOPMENT |
1 |
|
GE01089 (-92) |
PHYSICAL EDUCATION |
4 |
|
(b) subject core courses (24 credits)
Course Code |
Course Name |
Credit |
Remarks |
|
|
GE03025 |
HIGHER MATHEMATICS A (1) |
5 |
|
|
GE03025 |
HIGHER MATHEMATICS A (2) |
5 |
|
|
GE03003 |
LINEAR ALGEBRA A |
3 |
|
|
GE03004 |
PROBABILITY THEORY AND MATHEMATICAL STATISTICS A |
3 |
|
|
GE03005 |
GENERAL PHYSICS A (1) |
3 |
|
|
GE03006 |
GENERAL PHYSICS A (2) |
3 |
|
|
GE03007 |
GENERAL PHYSICS EXPERIMENT A (1) |
1 |
|
|
GE03008 |
GENERAL PHYSICS EXPERIMENT A (2) |
1 |
|
|
(c) college core courses (28 credits)
Course Code |
Course Name |
Credit |
Remarks |
CS04022 |
ADVANCED PROGRAM DESIGN |
4 |
|
CS04001 |
DISCRETE MATHEMATICS |
4 |
|
CS05054 |
DIGITAL CIRCUITS AND LOGIC DESIGN |
4 |
|
CS04023 |
INFORMATION SYSTEM SECURITY |
4 |
|
CS04002 |
DATA STRUCTURE |
4 |
|
CS04007 |
OPERATING SYSTEM |
4 |
|
CS04021 |
PROGRAMMING STUDIO |
2 |
|
CS04024 |
DIGITAL SYSTEM EXPERIMENT |
1 |
|
CS04026 |
NETWORK SYSTEM EXPERIMENT |
1 |
|
(d) major core courses (13 credits)
Course Code |
Course Name |
Credit |
Remarks |
CS05081 |
Algorithm design and analysis |
4 |
|
CS05082 |
computer network |
4 |
|
CS05083 |
database system |
4 |
|
CS05084 |
Security system experiment |
1 |
|
(e) major elective courses (35 credits)
(1) major limited elective courses (11 credits)
The students must take 3 courses from the following in order to strengthen the major and professional foundation for a total of 11 credits.
Course Code |
Course Name |
Credit |
Remarks |
CS06177 |
MATHEMATICAL BASE FOR INFORMATION SECURITY |
3 |
|
CS06178 |
CRYPTOGRAPHY |
4 |
|
CS06179 |
NETWORK SECURITY |
4 |
|
(2) Major all-you-can-choose elective courses (24 credits)
Major elective courses using a combination of concentration and optional courses, students first select all the courses from information security concentration, and then from other concentrations (we encourage cross-concentration elective courses), in total choosing eight courses with a total of 24 credits. Courses offer are as follows:
Course Code |
Course Name |
Credit |
Remarks |
CS06180 |
INFORMATION SYSTEM SECURITY |
3 |
Information Security Concentration |
CS06181 |
INFORMATION HIDING |
3 |
CS06182 |
SOFTWARE SECURITY |
3 |
CS06183 |
INFORMATION SECURITY ENGINEERING |
3 |
CS06184 |
TRUSTED COMPUTING SYSTEM |
3 |
CS06185 |
INFORMATION CONTENT SECURITY |
3 |
CS06186 |
THE CLASSIFIED INFORMATION MANAGEMENT SYSTEM |
3 |
Security Technology Concentration |
CS06187 |
SECURITY TECHNOLOGY BASIS |
3 |
CS04019 |
INTRODUCTION TO SECURITY MANAGEMENT |
3 |
CS06188 |
SECRECY LAW |
3 |
CS06012 |
THE HISTORY OF SECRECY AND SECURITY SYSTEM |
3 |
CS06189 |
MACHINE LEARNING |
3 |
Information Systems Concentration (The “MACHINE LEARNING” course is the prerequisite course for both “DATA MINING”and “BIOINFORMATICS”) |
CS06124 |
DATA MINING |
3 |
CS006065 |
BIOINFORMATICS |
3 |
Note:
1) We encourage students take major or cross-major elective courses, credits should be not less than 50% of “should have” credits.
2) During the period of study, if the student participated in academic competitions or published academic papers and the college identified (see < College of Computer Science and Electrical Engineering, Hunan University Academic Research Classification Guidance and Technology Innovation Achievements Guidance >), you may apply to substitute two elective credits.
(f) centralized practice (33 credits)
Course Code |
Course Name |
Credit |
Remarks |
GE01040 |
MILITARY TRAINING, MILITARY AND DEFENSE (INCLUDING MILITARY THEORY) |
0 |
|
CS10018 |
ENTRANCE EDUCATION AND MAJOR INTRODUCTION |
0 |
|
GE09030 |
CHINESE WRITING TRAINING |
1 |
Year One Summer Semester |
GE09028 |
ENGLISH WRITING TRAINING |
1 |
GE09001 |
PROGRAM DESIGN |
2 |
CS10019 |
ELECTRONICS SYSTEM DESIGN |
2 |
Year Two Summer Semester |
CS10020 |
SOFTWARE DESIGN |
2 |
CS10021(22) |
SPECIALTY SYNTHETIC DESIGN (CHOOSE ONE FROM TWO OPTIONS): 1. THE DESIGN AND IMPLEMENTATION OF SECURITY NETWORK PROTOCOL STACK; 2. THE DESIGN AND REALIZATION OF INFORMATION SYSTEM SECURITY |
4 |
Year Three Summer Semester |
CS10023 |
GRADUATION CO-OP PRACTICE |
2 |
The Eighth Semester |
CS10024 |
DATABASE SYSTEM DESIGN |
2 |
|
CS10025 |
SECURITY SYSTEM DESIGN |
3 |
Specialized Practical Course |
CS10026 |
GRADUATION DESIGN (INCLUDING SUPERVISOR TRAINING COURSE) |
14 |
Include 2 credits of supervisor training course. the supervisor training course is an "tutorial system" for a specific task, this course must be to project-oriented with the CDIO mode (Conceive, Design, Implement, Operate), at the same time teaching with discussion mode. each semester guide 3-6 students per session. the content of this course includes: undergraduate academic guidance, the first grade and second grade summer semester curriculum design supervision, the third grade summer semester curriculum design guidance, the fourth year undergraduate students graduation co-op practice and graduation design guidance. |
THE CURRICULUM SCHEDULE OF RESPONSIBLE TEACHERS
Serial Number |
Name |
Title |
Education |
Specialty |
Major courses (major core, major elective, general elective) |
1 |
LIAO Bo |
PROFESSOR |
PhD |
Information system |
Discrete mathematics |
2 |
PENG Fei |
PROFESSOR |
PhD |
Information security, security technology |
Security technology basis |
3 |
WANG Shulin |
PROFESSOR |
PhD |
Bioinformatics |
Bioinformatics |
4 |
HU Yupeng |
ASSOCIATE PROFESSOR |
PhD |
Information security |
Network security, trusted computing system |
5 |
PENG Li |
ASSOCIATE PROFESSOR |
PhD |
Security management |
Introduction to Security management, information system security management |
6 |
SUN Jianhua |
ASSOCIATE PROFESSOR |
PhD |
Information security, security technology |
Network security |
7 |
HU Fengsong |
ASSOCIATE PROFESSOR |
PhD |
Information security |
Operating system, software security |
8 |
WU Ronghui |
ASSOCIATE PROFESSOR |
PhD |
Information system |
Discrete mathematics |
9 |
CHEN Xiangtao |
ASSOCIATE PROFESSOR |
PhD |
Information security |
Database system, data mining |
10 |
LUO Gang |
ASSOCIATE PROFESSOR |
PhD |
Information security, security technology |
Mathematical foundation of information security, information hiding |
11 |
LIU Yuling |
ASSISTANT PROFESSOR |
PhD |
Information security, security technology |
Security technology basis, information security |
12 |
XIAO Sheng |
ASSISTANT PROFESSOR |
PhD |
Information security, security technology |
Computer network |
13 |
ZHANG Wei |
ASSISTANT PROFESSOR |
PhD |
Information system |
Algorithm design and analysis |
14 |
LU Xinguo |
ASSISTANT PROFESSOR |
PhD |
Information system |
Algorithm design and analysis |
15 |
YANG Qiuwei |
ASSISTANT PROFESSOR |
PhD |
Information security, security technology |
Cryptography |
16 |
LIU Caiping |
ASSISTANT PROFESSOR |
PhD |
Information system |
Computer network, information security engineering |
17 |
OU Bo |
ASSISTANT PROFESSOR |
PhD |
Information security, security technology |
Cryptography, the history of confidentiality study and confidentiality system |
18 |
CAO Zhi |
ASSISTANT PROFESSOR |
PhD |
Information systems, computational biology |
Discrete mathematics, machine learning |
19 |
CHEN Zuo |
ASSISTANT PROFESSOR |
PhD |
Information security |
Operating system, information system security |
20 |
RONG Huigui |
ASSISTANT PROFESSOR |
PhD |
Security technology |
Security management |
21 |
TANG Dan |
ASSISTANT PROFESSOR |
PhD |
Information security |
Mathematical base for information security |
MAJOR RESPONSIBLE PROFESSOR
Serial Number |
Name |
Title |
Education |
Specialty |
Major courses (major core, major elective, general elective) |
1 |
LIAO Bo |
PROFESSOR |
PhD |
Information system |
Discrete mathematics |