Training Program for Secrecy Management
Undergraduates Version 2015
 
 
TRAINING GOALS
 
Have a solid foundation of science and engineering, solid professional knowledge and skills, practical applications skills, systems analysis and design ability, capacity to become an innovator in the field of computer science; basic literacy in academic research sufficient to continue to postgraduate education; humanistic literacy, knowledge of professional ethics and social responsibility;
good communication and coordination skills, teamwork, interdisciplinary collaboration skill as well as the international skill, in order to cultivate the future success for industry or academic and even management.
 
REQUIREMENTS
Undergraduate graduates majoring in Secrecy Management must meet the following requirements:
1 Engineering Knowledge: master mathematics, natural science, engineering and computer science knowledge to solve complex engineering problems of computer system.
2 Problem Analysis: analysis based on the basic principles, using applied mathematics, natural sciences and engineering science to obtain valid conclusions for complex engineering problems in computer systems.
3 Design / Develop Solutions: able to design solutions for the engineering of complex computer systems, meeting the specific requirements of computer systems, components or processes; can embody a sense of innovation in design; consider the social, health, security, legal, cultural and environmental factors.
4 Research: Able to complex engineering problems using scientific methods, including experimental design, analysis and interpretation of data, and derive rational conclusions.
5 Using Modern Tools: be able to address complex computer systems engineering questions and development tasks by selecting and employing appropriate technologies, resources, and tools, including modeling and prediction techniques while also understanding of the limitations of such techniques.
6 Engineering and Society: be able to use engineering related background knowledge to do rational analysis, computer engineering and computer systems evaluation for engineering problems implementing social schemes, health, safety, legal and culturally oriented programs, with an understanding and perspective on related responsibilities.
7 Environment and Sustainable Development: to understand and evaluate engineering practices for complex computer systems engineering problems related to the environment, and understand sustainable development.
8 Occupation Specifications: have some humanistic and social science literacy, awareness of social responsibility, and abide by standards of professional ethics to carry out work responsibly.
9 Individuals and Team: can take responsibility as an individual in a multidisciplinary context, or as a team member taking the role of a responsible person.
10 Communication: have the ability to effectively communicate and exchange ideas about complex computer system engineering problems with industry peers and the public, including report writing and document design, statement making, clarity in expression and making authoritative responses. Also, have international sensitivity so as to be capable of communication in a cross-cultural context. 
11 Project Management: understand and use decision making methods for project management; use economic principles in a multidisciplinary environment.
12 Independent Learning & Lifelong Learning: have the consciousness of lifelong learning and continuous learning and have the ability to adapt to technology and social development.
 
TRAINING CHARACTERISTICS
The major in the China Ministry of Education undergraduate professional directory belongs to information security specialty. Our training program uses information security education accreditation standards as a criterion, combined with our school’s actual development. The training plan reinforces the network space safety first-level discipline as subject core based knowledge, pays attention to information security and secrecy-related engineering co-op ability, cultivates scientific research and technical innovation and quality, strengthens the interdisciplinary and international exchange characteristics, focuses on the security technology, computer system security and network security research, and many more professional cross-concentration characteristics.
 
LENGTH OF SCHOOLING, BASIC REQUIREMENTS FOR GRADUATION AND DEGREE GRANTING
1 Undergraduate basic educational system normally takes 4 years, with flexible learning time of 3-6 years, in accordance with the credit management system.
2 Students majoring in secrecy management graduate with at least 165 credits, including various types of courses and procedure requirements of credits. Credits required are listed in the following table:
 
  
   | Curriculum Category | General Required | Subject Core | College   Core | Major Core | Major   Elective | General   Elective | Focus Practice | Total | 
  
   | Credits | 24 | 24 | 28 | 13 | 35 | 8 | 33 | 165 | 
 
3 The students who complete the training program consisting of required courses, elective courses and related courses, achieve the required minimum graduation marks, and complete the courses required with qualified ethics, intellectual and health. Meet the degree granting requirements of the relevant documents will be awarded the degree of Bachelor of Engineering.
 
THE CURRICULUM AND CREDIT DISTRIBUTION
(a) general education curriculum (compulsory 24 + (6) elective credits + 8 credits)
General education curriculum includes two parts. The compulsory and electives. Electives are in accordance with the Hunan University general elective courses (Quality Education) program. The general compulsory courses are as follows:
 
  
   | Course Code | Course Name | Credit | Remarks | 
  
   | GE01101 | AN INTRODUCTION TO MAO   ZEDONG THOUGHT AND THEORETICAL SYSTEM OF CHINESE CHARACTERISTICS SOCIALISM | 3 (+3) | 
 | 
  
   | GE01039 | ETHICS EDUCATION AND LAW FUNDAMENTALS | 1.5+(1.5) | 
 | 
  
   | GE01100 | SITUATION AND POLICY | 0.5+(1.5) | 
 | 
  
   | GE01102 | OUTLINE OF MODERN CHINESE HISTORY | 2 | 
 | 
  
   | GE01103 | THE BASIC PRINCIPLE OF THE MARX   DOCTRINE (ONE) | 2 | 
 | 
  
   | GE01104 | THE BASIC PRINCIPLE OF THE MARX   DOCTRINE (TWO) | 2 | 
 | 
  
   | GE01012(-15) | COLLEGE ENGLISH | 8 | 
 | 
  
   | GE01107(-13) | PSYCHOLOGICAL QUALITY AND CAREER   DEVELOPMENT | 1 | 
 | 
  
   | GE01089 (-92) | PHYSICAL EDUCATION | 4 | 
 | 
 
(b) subject core courses (24 credits)
 
  
   | Course Code | Course Name | Credit | Remarks | 
 | 
  
   | 
 | 
  
   | GE03025 | HIGHER MATHEMATICS A (1) | 5 | 
 | 
 | 
  
   | GE03025 | HIGHER MATHEMATICS A (2) | 5 | 
 | 
 | 
  
   | GE03003 | LINEAR ALGEBRA A | 3 | 
 | 
 | 
  
   | GE03004 | PROBABILITY THEORY AND MATHEMATICAL   STATISTICS A | 3 | 
 | 
 | 
  
   | GE03005 | GENERAL PHYSICS A (1) | 3 | 
 | 
 | 
  
   | GE03006 | GENERAL PHYSICS A (2) | 3 | 
 | 
 | 
  
   | GE03007 | GENERAL PHYSICS EXPERIMENT A (1) | 1 | 
 | 
 | 
  
   | GE03008 | GENERAL PHYSICS EXPERIMENT A (2) | 1 | 
 | 
 | 
 
(c) college core courses (28 credits)
 
  
   | Course Code | Course Name | Credit | Remarks | 
  
   | CS04022 | ADVANCED PROGRAM DESIGN | 4 | 
 | 
  
   | CS04001 | DISCRETE MATHEMATICS | 4 | 
 | 
  
   | CS05054 | DIGITAL CIRCUITS AND LOGIC DESIGN | 4 | 
 | 
  
   | CS04023 | COMPUTER SYSTEM | 4 | 
 | 
  
   | CS04002 | DATA STRUCTURE | 4 | 
 | 
  
   | CS04007 | OPERATING SYSTEM | 4 | 
 | 
  
   | CS04021 | PROGRAMMING STUDIO | 2 | 
 | 
  
   | CS04024 | DIGITAL SYSTEM EXPERIMENT | 1 | 
 | 
  
   | CS04026 | NETWORK SYSTEM EXPERIMENT | 1 | 
 | 
 
(d) major core courses (13 credits)
 
  
   | Course Code | Course Name | Credit | Remarks | 
  
   | CS05081 | ALGORITHM DESIGN AND ANALYSIS | 4 | 
 | 
  
   | CS05082 | COMPUTER NETWORK | 4 | 
 | 
  
   | CS05083 | DATABASE SYSTEM | 4 | 
 | 
  
   | CS05084 | SAFETY SYSTEM EXPERIMENT | 1 | 
 | 
 
(e) major elective courses (32 credits)
(1) major limited elective courses (11 credits)
The students must take 3 courses from the following in order to strengthen the major and professional foundation for a total of 11 credits.
 
  
   | Course Code | Course Name | Credit | Remarks | 
  
   | CS06187 | CONFIDENTIAL TECHNICAL FOUNDATION | 3 | 
 | 
  
   | CS06178 | CRYPTOGRAPHY | 4 | 
 | 
  
   | CS06179 | NETWORK SECURITY | 4 | 
 | 
 
 
(2) major all-you-can-choose elective courses (24 credits)
Major elective courses using a combination of concentration and optional courses, students are advised to first select all the courses from information security concentration, and then from other concentrations (we encourage cross-concentration and cross-major elective courses), in total choosing eight courses with a total of 24 credits. Courses offer are as follows:
 
  
   | Course Code | Course Name | Credit | Remarks | 
  
   | CS06186 | THE CLASSIFIED INFORMATION MANAGEMENT   SYSTEM | 3 | Confidential Technical Concentration | 
  
   | CS04019 | INTRODUCTION TO SECURITY MANAGEMENT | 3 | 
  
   | CS06188 | SECRET LAW | 3 | 
  
   | CS06012 | SECRET HISTORY AND SECRECY SYSTEM | 3 | 
  
   | CS06180 | INFORMATION SYSTEM SECURITY | 3 | Information Security Concentration | 
  
   | CS06181 | INFORMATION HIDING | 3 | 
  
   | CS06182 | SOFTWARE SECURITY | 3 | 
  
   | CS06183 | INFORMATION SECURITY ENGINEERING | 3 | 
  
   | CS06184 | TRUSTED COMPUTING SYSTEM | 3 | 
  
   | CS06185 | INFORMATION CONTENT SAFETY | 3 | 
  
   | CS06189 | MACHINE LEARNING | 3 | Information Systems Concentration (in which "MACHINE LEARNING"   is the prerequisite course for "DATA MINING" and "BIOINFORMATICS".) | 
  
   | CS06124 | DATA MINING | 3 | 
  
   | CS06065 | BIOINFORMATICS | 3 | 
 
Note:
1) We encourage students take major or cross-major elective courses, credits should be not less than 50% of “should have” credits.
2) During the period of study, if the student participated in academic competitions or published academic papers and the college identified (see < College of Computer Science and Electrical Engineering, Hunan University Academic Research Classification Guidance and Technology Innovation Achievements Guidance >), you may apply to substitute two elective credits.
(f) centralized practice (33 credits)
 
  
   | Course    Code | Course    Name | Credit | Remarks | 
 
 
  
   | GE01040 | MILITARY   TRAINING, MILITARY AND DEFENSE (INCLUDING MILITARY THEORY) | 0 | 
 | 
  
   | CS10018 | ENTRANCE   EDUCATION AND MAJOR INTRODUCTION | 0 | 
 | 
  
   | GE09030 | CHINESE   WRITING TRAINING | 1 | Year One Summer Semester | 
  
   | GE09028 | ENGLISH   WRITING TRAINING | 1 | 
  
   | GE09001 | PROGRAM   DESIGN | 2 | 
  
   | CS10019 | ELECTRONICS   SYSTEM DESIGN | 2 | Year Two Summer Semester | 
  
   | CS10020 | SOFTWARE   DESIGN | 2 | 
  
   | CS10021(22) | SPECIALTY   SYNTHETIC DESIGN  (CHOOSE ONE FROM TWO   OPTIONS):                 1. THE DESIGN AND IMPLEMENTATION OF SECURITY NETWORK PROTOCOL   STACK;               2. THE DESIGN AND   REALIZATION OF INFORMATION SYSTEM SECURITY | 4 | Year Three Summer Semester | 
  
   | CS10023 | GRADUATION CO-OP PRACTICE | 2 | The Eighth Semester | 
  
   | CS10024 | DATABASE   SYSTEM DESIGN | 2 | 
 | 
  
   | CS10025 | SECURITY SYSTEM DESIGN | 3 | Specialized Practical Course | 
  
   | CS10026 | GRADUATION   DESIGN (INCLUDING   SUPERVISOR TRAINING COURSE) | 14 | Include   2 credits of supervisor training course. the supervisor training course is an   "tutorial system" for a specific task, this course must be to   project-oriented with the CDIO mode (Conceive, Design, Implement, Operate), at   the same time teaching with discussion mode. each semester guide 3-6 students   per session. the content of this course includes: undergraduate academic   guidance, the first grade and second grade summer semester curriculum design   supervision, the third grade summer semester curriculum design guidance, the fourth   year undergraduate students graduation co-op practice and graduation design   guidance. | 
 
 
 
 
 
THE CURRICULUM SCHEDULE OF RESPONSIBLE TEACHERS
 
  
   | Serial Number | Name | Title | Education | Specialty | Major    courses (major core, major elective, general elective) | 
 
 
  
   | 1 | PENG Fei | PROFESSOR | PhD | Information security, security   technology | Confidential technical foundation | 
  
   | 2 | LIAO Bo | PROFESSOR | PhD | Information system | Discrete mathematics | 
  
   | 3 | WANG Shulin | PROFESSOR | PhD | Bioinformatics | Bioinformatics | 
  
   | 4 | HU Yupeng | ASSOCIATE   PROFESSOR | PhD | Information safety | Network security, trusted computing   system | 
  
   | 5 | PENG Li | ASSOCIATE   PROFESSOR | PhD | Confidential management | Security management, information system   security management | 
  
   | 6 | SUN Jianhua | ASSOCIATE   PROFESSOR | PhD | Information security, security   technology | Network security | 
  
   | 7 | HU Fengsong | ASSOCIATE   PROFESSOR | PhD | Information security | Operating system, software security | 
  
   | 8 | WU Ronghui | ASSOCIATE   PROFESSOR | PhD | Information system | Discrete mathematics | 
  
   | 9 | CHEN Xiangtao | ASSOCIATE   PROFESSOR | PhD | Information security | Database system, data mining | 
  
   | 10 | LUO Gang | ASSOCIATE   PROFESSOR | PhD | Information security, security   technology | Mathematics foundation   of information security, information hiding | 
  
   | 11 | LIU Yuling | ASSISTANT   PROFESSOR | PhD | Information security, security   technology | Security technology foundation, information   content security | 
  
   | 12 | XIAO Sheng | ASSISTANT   PROFESSOR | PhD | Information security, security   technology | Computer network | 
  
   | 13 | ZHANG Wei | ASSISTANT   PROFESSOR | PhD | Information system | Algorithm design and analysis | 
  
   | 14 | LU Xinguo | ASSISTANT   PROFESSOR | PhD | Information system | Algorithm design and analysis | 
  
   | 15 | YANG Qiuwei | ASSISTANT   PROFESSOR | PhD | Information security, security   technology | Cryptography | 
  
   | 16 | LIU Caiping | ASSISTANT   PROFESSOR | PhD | Information security | Computer network, information security   engineering | 
  
   | 17 | OU Bo | ASSISTANT   PROFESSOR | PhD | Information security, security   technology | Cryptography, secret history and   security system | 
  
   | 18 | CAO Zhi | ASSISTANT   PROFESSOR | PhD | Information systems, biological   computing | Discrete mathematics, machine learning | 
  
   | 19 | CHEN Zuo | ASSISTANT   PROFESSOR | PhD | Information security | Operating system, information system   security | 
  
   | 20 | RONG Huigui | ASSISTANT   PROFESSOR | PhD | Security Techniques | Introduction to security management | 
  
   | 21 | Tang Dan | ASSISTANT   PROFESSOR | PhD | Information security | Mathematical foundation for Information   security | 
 
 
MAJOR RESPONSIBLE PROFESSOR
 
  
   | Serial Number | Name | Title | Education | Specialty | Major   courses (major core, major elective, general elective) | 
  
   | 1 | PENG Fei | PROFESSOR | PhD | Information security, security   technology | Confidential technical foundation |