Basic courses include: advanced mathematics, college physics, discrete mathematics, mathematical foundation of information security, digital logic, electrotechnics, advanced programming language (C++), engineering drawing, linear algebra, probability theory and mathematical statistics, introduction to computer science, computer composition and architecture, and data structure.
Specialized compulsory courses include: computer network, computer security, operating system, software engineering, network attack and defense, PKI (public key infrastructure) principle and technology, cryptography and network security, database and Java programming.
Specialized elective courses include: network engineering and network management, network information retrieval, digital communication principle, high-performance computing technology, embedded system, human-computer interaction, artificial intelligence, data warehouse and data mining (bilingual), software testing and quality assurance, computing methods, software design and architecture, software project management (bilingual), multimedia technology, digital image processing and computer network storage.
Two backbone courses of information security specialty
During school, students are not only emphasized to master basic knowledge, but also to cultivate their professional quality and ability. In addition to the basic courses of science and engineering, students mainly study advanced mathematics, linear algebra, calculation methods, probability theory and mathematical statistics, computer and algorithm, C++ language programming, data structure and algorithm, computer principle and assembly language, database principle, operating system, college physics, set theory and graph theory, algebra and logic, cryptography principle, coding theory and information theory.
In addition to the above majors, a large number of professional elective courses are also offered, including: data communication principle, introduction to information security, computer network security management, digital identification and authentication system, network security detection and prevention technology, firewall technology, virus mechanism and protection technology, network security protocols and standards, etc. In addition to completing various experiments and course designs at different levels of the information security system, students will also receive strict training in graduation design.