Training Program for Information Security
Undergraduates Version 2015
 
 
TRAINING GOALS
 
Have a solid foundation of science and engineering, solid professional knowledge and skills, practical applications skills, systems analysis and design ability, capacity to become an innovator in the field of computer science; basic literacy in academic research sufficient to continue to postgraduate education; humanistic literacy, knowledge of professional ethics and social responsibility;
good communication and coordination skills, teamwork, interdisciplinary collaboration skill as well as the international skill, in order to cultivate the future success for industry or academic and even management.
 
REQUIREMENTS
Undergraduate graduates majoring in Information Security must meet the following requirements:
1 Engineering Knowledge: master mathematics, natural science, engineering and computer science knowledge to solve complex engineering problems of computer system.
2 Problem Analysis: analysis based on the basic principles, using applied mathematics, natural sciences and engineering science to obtain valid conclusions for complex engineering problems in computer systems.
3 Design / Develop Solutions: able to design solutions for the engineering of complex computer systems, meeting the specific requirements of computer systems, components or processes; can embody a sense of innovation in design; consider the social, health, security, legal, cultural and environmental factors.
4 Research: Able to complex engineering problems using scientific methods, including experimental design, analysis and interpretation of data, and derive rational conclusions.
5 Using Modern Tools: be able to address complex computer systems engineering questions and development tasks by selecting and employing appropriate technologies, resources, and tools, including modeling and prediction techniques while also understanding of the limitations of such techniques.
6 Engineering and Society: be able to use engineering related background knowledge to do rational analysis, computer engineering and computer systems evaluation for engineering problems implementing social schemes, health, safety, legal and culturally oriented programs, with an understanding and perspective on related responsibilities.
7 Environment and Sustainable Development: to understand and evaluate engineering practices for complex computer systems engineering problems related to the environment, and understand sustainable development.
8 Occupation Specifications: have some humanistic and social science literacy, awareness of social responsibility, and abide by standards of professional ethics to carry out work responsibly.
9 Individuals and Team: can take responsibility as an individual in a multidisciplinary context, or as a team member taking the role of a responsible person.
10 Communication: have the ability to effectively communicate and exchange ideas about complex computer system engineering problems with industry peers and the public, including report writing and document design, statement making, clarity in expression and making authoritative responses. Also, have international sensitivity so as to be capable of communication in a cross-cultural context. 
11 Project Management: understand and use decision making methods for project management; use economic principles in a multidisciplinary environment.
12 Independent Learning & Lifelong Learning: have the consciousness of lifelong learning and continuous learning and have the ability to adapt to technology and social development.
 
TRAINING CHARACTERISTICS
The major in the Ministry of education undergraduate professional directory belongs to information security specialty. Our training program uses information security education accreditation standards as a criterion, combined with our school’s actual development. We pay attention to the network space safety first level discipline as the basic knowledge and professional skill, and at the same time, we exercise students information security engineering practice ability, cultivate scientific research and technological innovation literacy, strengthen interdisciplinary and international exchanges. We emphasize the focus of information system security, network security, information content security and information mining research and many cross concentration characteristics.
 
LENGTH OF SCHOOLING, BASIC REQUIREMENTS FOR GRADUATION AND DEGREE GRANTING
1 Undergraduate basic educational system normally takes 4 years, with flexible learning time of 3-6 years, in accordance with the credit management system.
2 Students majoring in information security graduate with at least 165 credits, including various types of courses and procedure requirements of credits. Credits required are listed in the following table:
 
  
   | Curriculum Category | General Required | Subject Core | College   Core | Major Core | Major   Elective | General   Elective | Focus Practice | Total | 
  
   | Credits | 24 | 24 | 28 | 13 | 35 | 8 | 33 | 165 | 
 
3 The students who complete the training program consisting of required courses, elective courses and related courses, achieve the required minimum graduation marks, and complete the courses required with qualified ethics, intellectual and health. Meet the degree granting requirements of the relevant documents will be awarded the degree of Bachelor of Engineering.
THE CURRICULUM AND CREDIT DISTRIBUTION
(a) general education curriculum (compulsory 24 + (6) elective credits + 8 credits)
General education curriculum includes two parts. The compulsory and electives. Electives are in accordance with the Hunan University general elective courses (Quality Education) program. The general compulsory courses are as follows:
 
  
   | Course Code | Course Name | Credit | Remarks | 
  
   | GE01101 | AN INTRODUCTION TO MAO   ZEDONG THOUGHT AND THEORETICAL SYSTEM OF CHINESE CHARACTERISTICS SOCIALISM | 3 (+3) | 
 | 
  
   | GE01039 | ETHICS EDUCATION AND LAW FUNDAMENTALS | 1.5+(1.5) | 
 | 
  
   | GE01100 | SITUATION AND POLICY | 0.5+(1.5) | 
 | 
  
   | GE01102 | OUTLINE OF MODERN CHINESE HISTORY | 2 | 
 | 
  
   | GE01103 | THE BASIC PRINCIPLE OF THE MARX   DOCTRINE (ONE) | 2 | 
 | 
  
   | GE01104 | THE BASIC PRINCIPLE OF THE MARX   DOCTRINE (TWO) | 2 | 
 | 
  
   | GE01012(-15) | COLLEGE ENGLISH | 8 | 
 | 
  
   | GE01107(-13) | PSYCHOLOGICAL QUALITY AND CAREER   DEVELOPMENT | 1 | 
 | 
  
   | GE01089 (-92) | PHYSICAL EDUCATION | 4 | 
 | 
 
(b) subject core courses (24 credits)
 
  
   | Course Code | Course Name | Credit | Remarks | 
 | 
  
   | 
 | 
  
   | GE03025 | HIGHER MATHEMATICS A (1) | 5 | 
 | 
 | 
  
   | GE03025 | HIGHER MATHEMATICS A (2) | 5 | 
 | 
 | 
  
   | GE03003 | LINEAR ALGEBRA A | 3 | 
 | 
 | 
  
   | GE03004 | PROBABILITY THEORY AND MATHEMATICAL   STATISTICS A | 3 | 
 | 
 | 
  
   | GE03005 | GENERAL PHYSICS A (1) | 3 | 
 | 
 | 
  
   | GE03006 | GENERAL PHYSICS A (2) | 3 | 
 | 
 | 
  
   | GE03007 | GENERAL PHYSICS EXPERIMENT A (1) | 1 | 
 | 
 | 
  
   | GE03008 | GENERAL PHYSICS EXPERIMENT A (2) | 1 | 
 | 
 | 
 
(c) college core courses (28 credits)
 
  
   | Course Code | Course Name | Credit | Remarks | 
  
   | CS04022 | ADVANCED PROGRAM DESIGN | 4 | 
 | 
  
   | CS04001 | DISCRETE MATHEMATICS | 4 | 
 | 
  
   | CS05054 | DIGITAL CIRCUITS AND LOGIC DESIGN | 4 | 
 | 
  
   | CS04023 | INFORMATION SYSTEM SECURITY | 4 | 
 | 
  
   | CS04002 | DATA STRUCTURE | 4 | 
 | 
  
   | CS04007 | OPERATING SYSTEM | 4 | 
 | 
  
   | CS04021 | PROGRAMMING STUDIO | 2 | 
 | 
  
   | CS04024 | DIGITAL SYSTEM EXPERIMENT | 1 | 
 | 
  
   | CS04026 | NETWORK SYSTEM EXPERIMENT | 1 | 
 | 
 
(d) major core courses (13 credits)
 
  
   | Course Code | Course Name | Credit | Remarks | 
  
   | CS05081 | Algorithm design and analysis | 4 | 
 | 
  
   | CS05082 | computer network | 4 | 
 | 
  
   | CS05083 | database system | 4 | 
 | 
  
   | CS05084 | Security system experiment | 1 | 
 | 
 
(e) major elective courses (35 credits)
(1) major limited elective courses (11 credits)
The students must take 3 courses from the following in order to strengthen the major and professional foundation for a total of 11 credits.
 
  
   | Course Code | Course Name | Credit | Remarks | 
  
   | CS06177 | MATHEMATICAL BASE FOR INFORMATION SECURITY | 3 | 
 | 
  
   | CS06178 | CRYPTOGRAPHY | 4 | 
 | 
  
   | CS06179 | NETWORK SECURITY | 4 | 
 | 
 
(2) Major all-you-can-choose elective courses (24 credits)
Major elective courses using a combination of concentration and optional courses, students first select all the courses from information security concentration, and then from other concentrations (we encourage cross-concentration elective courses), in total choosing eight courses with a total of 24 credits. Courses offer are as follows:
 
  
   | Course Code | Course Name | Credit | Remarks | 
  
   | CS06180 | INFORMATION SYSTEM SECURITY | 3 | Information Security Concentration | 
  
   | CS06181 | INFORMATION HIDING | 3 | 
  
   | CS06182 | SOFTWARE SECURITY | 3 | 
  
   | CS06183 | INFORMATION SECURITY ENGINEERING | 3 | 
  
   | CS06184 | TRUSTED COMPUTING SYSTEM | 3 | 
  
   | CS06185 | INFORMATION CONTENT SECURITY | 3 | 
  
   | CS06186 | THE CLASSIFIED INFORMATION MANAGEMENT SYSTEM | 3 | Security Technology Concentration | 
  
   | CS06187 | SECURITY TECHNOLOGY BASIS | 3 | 
  
   | CS04019 | INTRODUCTION TO SECURITY MANAGEMENT | 3 | 
  
   | CS06188 | SECRECY LAW | 3 | 
  
   | CS06012 | THE HISTORY OF SECRECY AND SECURITY SYSTEM | 3 | 
  
   | CS06189 | MACHINE LEARNING | 3 | Information Systems Concentration (The “MACHINE LEARNING” course is the prerequisite course for   both “DATA MINING”and “BIOINFORMATICS”) | 
  
   | CS06124 | DATA MINING | 3 | 
  
   | CS006065 | BIOINFORMATICS | 3 | 
 
Note:
1) We encourage students take major or cross-major elective courses, credits should be not less than 50% of “should have” credits.
2) During the period of study, if the student participated in academic competitions or published academic papers and the college identified (see < College of Computer Science and Electrical Engineering, Hunan University Academic Research Classification Guidance and Technology Innovation Achievements Guidance >), you may apply to substitute two elective credits.
(f) centralized practice (33 credits)
 
  
   | Course    Code | Course    Name | Credit | Remarks | 
 
 
  
   | GE01040 | MILITARY   TRAINING, MILITARY AND DEFENSE (INCLUDING MILITARY THEORY) | 0 | 
 | 
  
   | CS10018 | ENTRANCE   EDUCATION AND MAJOR INTRODUCTION | 0 | 
 | 
  
   | GE09030 | CHINESE   WRITING TRAINING | 1 | Year One Summer Semester | 
  
   | GE09028 | ENGLISH   WRITING TRAINING | 1 | 
  
   | GE09001 | PROGRAM   DESIGN | 2 | 
  
   | CS10019 | ELECTRONICS   SYSTEM DESIGN | 2 | Year Two Summer Semester | 
  
   | CS10020 | SOFTWARE   DESIGN | 2 | 
  
   | CS10021(22) | SPECIALTY   SYNTHETIC DESIGN  (CHOOSE ONE FROM TWO   OPTIONS):                 1. THE DESIGN AND IMPLEMENTATION OF SECURITY NETWORK PROTOCOL   STACK;               2. THE DESIGN AND REALIZATION OF INFORMATION SYSTEM SECURITY | 4 | Year Three Summer Semester | 
  
   | CS10023 | GRADUATION   CO-OP PRACTICE | 2 | The Eighth Semester | 
  
   | CS10024 | DATABASE   SYSTEM DESIGN | 2 | 
 | 
  
   | CS10025 | SECURITY SYSTEM DESIGN | 3 | Specialized Practical Course | 
  
   | CS10026 | GRADUATION   DESIGN (INCLUDING   SUPERVISOR TRAINING COURSE) | 14 | Include   2 credits of supervisor training course. the supervisor training course is an   "tutorial system" for a specific task, this course must be to   project-oriented with the CDIO mode (Conceive, Design, Implement, Operate), at   the same time teaching with discussion mode. each semester guide 3-6 students   per session. the content of this course includes: undergraduate academic   guidance, the first grade and second grade summer semester curriculum design   supervision, the third grade summer semester curriculum design guidance, the fourth   year undergraduate students graduation co-op practice and graduation design   guidance. | 
 
 
THE CURRICULUM SCHEDULE OF RESPONSIBLE TEACHERS
 
  
   | Serial Number | Name | Title | Education | Specialty | Major    courses (major core, major elective, general elective) | 
 
 
  
   | 1 | LIAO   Bo | PROFESSOR | PhD | Information system | Discrete mathematics | 
  
   | 2 | PENG   Fei | PROFESSOR | PhD | Information security,   security technology | Security technology basis | 
  
   | 3 | WANG   Shulin | PROFESSOR | PhD | Bioinformatics | Bioinformatics | 
  
   | 4 | HU   Yupeng | ASSOCIATE   PROFESSOR | PhD | Information security | Network security, trusted   computing system | 
  
   | 5 | PENG Li | ASSOCIATE   PROFESSOR | PhD | Security management | Introduction to Security   management, information system security management | 
  
   | 6 | SUN Jianhua | ASSOCIATE   PROFESSOR | PhD | Information security,   security technology | Network security | 
  
   | 7 | HU Fengsong | ASSOCIATE   PROFESSOR | PhD | Information security | Operating system, software   security | 
  
   | 8 | WU Ronghui | ASSOCIATE   PROFESSOR | PhD | Information system | Discrete mathematics | 
  
   | 9 | CHEN   Xiangtao | ASSOCIATE   PROFESSOR | PhD | Information security | Database system, data   mining | 
  
   | 10 | LUO   Gang | ASSOCIATE   PROFESSOR | PhD | Information security,   security technology | Mathematical   foundation of information security, information hiding | 
  
   | 11 | LIU   Yuling | ASSISTANT   PROFESSOR | PhD | Information security,   security technology | Security technology basis,   information security | 
  
   | 12 | XIAO   Sheng | ASSISTANT   PROFESSOR | PhD | Information security,   security technology | Computer network | 
  
   | 13 | ZHANG   Wei | ASSISTANT   PROFESSOR | PhD | Information system | Algorithm design and   analysis | 
  
   | 14 | LU   Xinguo | ASSISTANT   PROFESSOR | PhD | Information system | Algorithm design and   analysis | 
  
   | 15 | YANG   Qiuwei | ASSISTANT   PROFESSOR | PhD | Information security,   security technology | Cryptography | 
  
   | 16 | LIU   Caiping | ASSISTANT   PROFESSOR | PhD | Information system | Computer network,   information security engineering | 
  
   | 17 | OU   Bo | ASSISTANT   PROFESSOR | PhD | Information security,   security technology | Cryptography, the history   of confidentiality study and confidentiality system | 
  
   | 18 | CAO   Zhi | ASSISTANT   PROFESSOR | PhD | Information systems,   computational biology | Discrete mathematics,   machine learning | 
  
   | 19 | CHEN   Zuo | ASSISTANT   PROFESSOR | PhD | Information security | Operating system,   information system security | 
  
   | 20 | RONG   Huigui | ASSISTANT   PROFESSOR | PhD | Security technology | Security management | 
  
   | 21 | TANG   Dan | ASSISTANT   PROFESSOR | PhD | Information security | Mathematical base for information   security | 
 
 
MAJOR RESPONSIBLE PROFESSOR
 
  
   | Serial Number | Name | Title | Education | Specialty | Major   courses (major core, major elective, general elective) | 
  
   | 1 | LIAO   Bo | PROFESSOR | PhD | Information   system | Discrete mathematics |