Course number (code): 314005040
Course name (in English): Cyberspace Security Technology
Credit point:3.5
Class hour:64
Assessment method:Process assessment
Comprehensive score = Ordinary score *60% + Final exam *40%
Ordinary score detailed introduction:
Ordinary score = Class attendance (10%) + Class test (20%) + Course experiment (20%) + Course center interaction (10%)
Preorder courses: Computer communication and networking, Applied Cryptography
Basic orientation: Junior students majoring in Cybersecurity and Information security
Textbooks (Title, Author, Publisher, Publication date):
("Eleventh Five-Year" National Planned Textbook)Information system security theory and technology, Yong Fang , etc., higher education press, 2011.8
Bibliography (Title, Author, Publisher, Publication date):
1. (US)William Stallings, Network Security Essentials Applications and Standards (Fifth Edition), Tsinghua University Press,2014.5
2. Jianwei Liu, Yumin Wang, Cyber Security-Technology and Practice (3rd Edition), Tsinghua University Press,2017.4
3. (US)Mark Stamp, Information Security: Principles and Practice (2nd Edition), Tsinghua University Press, 2013.5
4. Zhenxue Wang, etc., Information System Security Risk Estimation and Control Theory, Science Press, 2011.6
5. Course websites of famous foreign universities
6. Domestic related websites
Course Introduction:
The purpose of this course is to enable students to master the basic theoretical background knowledge of cyberspace security, cyberspace security architecture, open system interconnection security framework and its mechanism technology, system security technology and basic knowledge. In terms of security technology, it is necessary to understand and master in detail the main content of information system identification technology, access control technology, firewall technology, intrusion detection and monitoring technology, IPS, UTM, physical isolation technology, VPN, and cutting-edge security technology in cyberspace, and be familiar with some specific application plans.
In the aspect of abilities, students should be flexible and broad in thinking. In respect of knowledge structure, through the study of this course, you can get a comprehensive and in-depth understanding of cyberspace security technology, and get a comprehensive understanding of cyberspace security technology, security management, security assessment, and relevant national policies and regulations and their relationships.