新葡萄京官网

UNDERGRADUATE COURSES

Cyberspace Security Technology(网络空间安全技术)

DATE :Jan 20, 2020                     source :

Course number (code): 314005040

Course name (in English): Cyberspace Security Technology

Credit point3.5        

Class hour64

Assessment methodProcess assessment

Comprehensive score = Ordinary score *60% + Final exam *40%

Ordinary score detailed introduction

Ordinary score = Class attendance (10%) + Class test (20%) + Course experiment (20%) + Course center interaction (10%)

Preorder courses: Computer communication and networking, Applied Cryptography

Basic orientation: Junior students majoring in Cybersecurity and Information security

Textbooks (Title, Author, Publisher, Publication date):

"Eleventh Five-Year" National Planned TextbookInformation system security theory and technology, Yong Fang , etc., higher education press, 2011.8


Bibliography (Title, Author, Publisher, Publication date):

1. (US)William Stallings, Network Security Essentials Applications and Standards (Fifth Edition), Tsinghua University Press,2014.5

2. Jianwei Liu, Yumin Wang, Cyber Security-Technology and Practice (3rd Edition), Tsinghua University Press,2017.4

3. (US)Mark Stamp, Information Security: Principles and Practice (2nd Edition), Tsinghua University Press, 2013.5

4. Zhenxue Wang, etc., Information System Security Risk Estimation and Control Theory, Science Press, 2011.6

5. Course websites of famous foreign universities

6. Domestic related websites

Course Introduction:

The purpose of this course is to enable students to master the basic theoretical background knowledge of cyberspace security, cyberspace security architecture, open system interconnection security framework and its mechanism technology, system security technology and basic knowledge. In terms of security technology, it is necessary to understand and master in detail the main content of information system identification technology, access control technology, firewall technology, intrusion detection and monitoring technology, IPS, UTM, physical isolation technology, VPN, and cutting-edge security technology in cyberspace, and be familiar with some specific application plans.

In the aspect of abilities, students should be flexible and broad in thinking. In respect of knowledge structure, through the study of this course, you can get a comprehensive and in-depth understanding of cyberspace security technology, and get a comprehensive understanding of cyberspace security technology, security management, security assessment, and relevant national policies and regulations and their relationships.


CLOSE

Contact US