Python |
Python is an object-oriented, platform-independent, interpreted, and interactive language that is the most popular programming language in the world. In this lecture, you will learn Python-based data structures, data processing methods, exception handling, file input/output, etc., and learn the characteristics of Python, such as modules, object orientation, and lambda functions. Also, by writing a real application program, you improve your ability to develop Python programs. |
1-1 |
Major-Elective
|
Information Engineering Introduction |
In order to implement information service, not only operating system but also various knowledge and skills such as application, network, and database are required. Through this course, basic knowledge to configure information service is acquired. In addition, students can understand the type, scope, and characteristics of information services, and identify technologies, solutions, and platforms to implement them. Also, understand the requirements of stakeholders and the construction process applied when building information services. |
1-1 |
Major-Essential
|
Computer Language - C |
C language is not only the most used for legacy information system implementation, but also evaluated as a basic language for understanding various development languages. Through this course, students will understand the grammar, structure, and usage of the C language as well as its scope of application. Finally, it is possible to implement the necessary functions in the Server Platform, NW, and Security fields. |
1-2 |
Major-Essential
|
Web Programming |
Today, the Internet connects the world in real time and provides a space where people can share information using digital devices such as computers and smartphones. The web is the most widely used service in this Internet space. This lecture deals with HTML5, CSS3, and JavaScript, which are essential languages for web client development. You will also learn about Git and GitHub, which are widely used tools for source management and team-level efficient project execution. |
1-2 |
Major-Elective |
Data Structure |
Recent information services process vast amounts of data. Database can be used, but for high-speed data processing, massive data must be properly loaded into the system memory. Through this course, students learn data structures and basic algorithms necessary to implement information security technology. Understand the storage, inquiry, search, and deletion mechanisms of information data. Learn how to utilize arrays and lists, which are most frequently used in information security technology, and learn the characteristics and utilization of libraries. |
2-1 |
Major-Elective
|
Database |
A database is a system that systematically stores large amounts of data for search and inquiry. The purpose of this lecture is to learn basic concepts, theories, and application skills of databases. It does not simply deal with concepts, but actually designs databases through various exercises, project design, and web server program implementation. |
2-1 |
Major-Essential
|
OOP |
OOP is a concept that is the basis of object-oriented languages, and is very effective in implementing and utilizing legacy languages and managing system resources. In this lecture, students understand the concept of object-oriented language and acquire object-oriented languages such as Java, C++, and Python, which are widely used in providing system applications or web services. Through this, students acquire development skills for building application services as well as system applications. |
2-1 |
Major-Elective
|
Network - TCP/IP |
By learning the principles of various information and communication technologies and how to use them in real life, students are equipped with basic knowledge in the information society. Furthermore, students learn important IoT and 5G communication technologies in the current topic of the 4th industrial revolution to lay the foundation for information protection technology. In addition, the basic process of computer communication and the overall description and operation principle of the TCP/IP protocol are explained. |
2-1 |
Major-Essential
|
Information Security Introduction |
Passwords have long been used to protect sensitive information. At first, it was mainly used for military purposes, but recently it has developed into an academic field as the need to protect information has arisen in all areas of society. In this lecture, we understand the world and history of cryptography and learn various cryptographic techniques through cryptographic technology boxes defined by cryptographers. |
2-2 |
Major-Essential
|
A CryptoMath |
Information services use a variety of cryptography technologies. Additionally, a mathematical way of thinking is required to implement complex and diverse information services. This course helps you understand and utilize these cryptographic technologies and implement complex information services.
| 2-2 |
Major-Elective
|
Network Design and Implementation |
General information services are not built as a single system, and most utilize NW functions. The information service provider should be able to build this NW or change its configuration if necessary. Through this lecture, students will be able to acquire knowledge and skills about NW required for information service, and build a network necessary for information service. Design a wired and wireless network environment that can interoperate systems, and deploy and operate network equipment necessary for this. |
2-2 |
Major-Elective
|
Linux System |
The majority of personal PCs use Windows or MAC operating systems, but recently information services are choosing Linux as their server environment operating system. Linux is widely adopted not only as a server platform, but also as an operating environment for IoT and artificial intelligence that aims for a lightweight operating environment. In this course, students acquire knowledge and skills on the structure, characteristics, and utilization of the Linux operating system. |
2-2 |
Major-Essential
|
IoT Device Design |
Information services are expanding to fields such as maritime, energy, agriculture, medical care, and education. These fields require not only information processing technology, but also devices to generate and collect information. This course designs and implements IoT terminals needed in the IT convergence field.
| 3-1 |
Major-Essential
|
Network Programming |
Recently, information services are interconnecting various information systems, and the technology applied here is network programming. Network programming is essential to integrating multiple applications into one and implementing targeted functions. Through this lecture, students acquire knowledge about the purpose and types of various network protocols required in the network environment. In addition, it is possible to design and implement the network protocol necessary to implement the target function. |
3-1 |
Major-Elective
|
Cryptography |
Modern society is experiencing rapid changes in all areas of society, including finance, trade, and electronic commerce, due to the development of computers and hardware, communication technology, and information systems. In this lecture, we will learn about cryptography theory that can be the basis for safely protecting this information society. To this end, after understanding the overview of cryptosystems, the principles and operation of classical cryptosystems, and the theory of cryptographic mathematics, various modern cryptographic techniques are studied. It also allows you to keep abreast of the latest cryptographic technology trends. |
3-1 |
Major-Essential
|
Machine Learning Programming |
Recently, information services require automatic responses to user requirements. Machine learning is the foundation technology that can be the most fundamental for automatic response. Through this lecture, students learn artificial intelligence technology used in various information services. Students understand the types of artificial intelligence algorithms and their mechanisms, and implement each algorithm. Learn algorithms widely used in information security technology.
| 3-1 |
Major-Elective
|
Web Service Design |
Most information services are composed of web services to satisfy the ease of construction and convenience of use. Through this lecture, students acquire knowledge and skills about the characteristics and structure of the most used web service, how to use it, and precautions. In addition, learn the meaning and utilization method of Framework used for web service implementation. |
3-2 |
Major-Essential
|
Cloud Platform |
Legacy systems are inherently inefficient. A cloud platform has been proposed to improve this inefficiency and increase integrated operation management efficiency. Recently, most information services operate on cloud platforms. Through this lecture, students acquire knowledge and skills about the background, structure, and utilization method of the cloud platform, and practice building information services in the cloud environment. |
3-2 |
Major-Elective
|
Network & System Security |
NW and systems are the basis for providing information services. However, there are various security threats not only in the data transmission section but also in the system. Through this subject, you will learn about security threats occurring in NW and systems and how to respond to them.
| 3-2 |
Major-Essential
|
Application & DB Security |
Many information services consist of web servers and databases. Because it provides very complex functionality, it is relatively insecure. Through this course, you will learn how to develop or operate safe information services.
| 3-2 |
Major-Elective
|
IoT Server Programming |
Recent IoT services not only handle multiple IoT devices, but also collect and store sensing data. Furthermore, the IoT Server analyzes the stored data and executes response actions appropriate to the situation. Through this lecture, students learn the necessary knowledge and skills to receive, store, and analyze data generated in the IoT service environment. Students can implement an IoT server and analyze stored data. |
3-2 |
Major-Elective
|
OSS Capstone Design #1 |
In this course, students form teams and carry out projects on selected topics in the fields of system software, embedded systems, and software development. Students develop practical skills related to design and implementation by presenting and discussing the latest technologies through seminars. |
4-1 |
Major-Essential
|
Mobile Programming |
User terminals such as smart phones and tablet PCs continue to develop. Accordingly, the information service also considers the mobile environment by default. Through this lecture, students learn the structure and characteristics of mobile services, as well as related knowledge and skills. In addition, students implement mobile apps in the Android environment and link them with the server environment. |
4-1 |
Major-Elective
|
OSS |
Understand DevOps used in the field and utilize OSS, which is widely used in the information security field. Build and utilize APM and MailServer, which are OSS widely used in the information security field. Build and utilize representative DevOps systems such as CMS, BTS, and CI&CD systems. Establish an OSS Firewall practice environment and check each security function. |
4-1 |
Major-Elective
|
OSS Capstone Design #2 |
Develop the OSS Capstone Design Project from the previous semester. Modify and improve the implemented SW by reflecting the user's requirements. |
4-2 |
Major-Essential
|
Field Training |
You have acquired a lot of information-related knowledge and skills. Now we need to put what we have learned to use. Go to the field and use the knowledge and skills you have acquired.
| 4-2 |
Major-Elective
|