| Grade | Course | Credits | Field | Education Contents | New Tec. | New Opening |
|---|---|---|---|---|---|---|
| 1 - 1 |
Introduction to Computer Engineering |
3 |
Deep |
Introduction to computers and software | ||
| 1 - 2 |
Data Structures |
3 | Core | Understanding and Implementing the Operation Principles of Various Data Structures | ||
| Digital logic circuit | 3 | Deep | Understanding Logical Circuits | |||
| 2 - 1 | System program | 3 | Core | Assembly, Runtime Environment, Low-Level Programming | ||
| Problem Solving Techniques | 3 | Core | Algorithm for solving various problems in real life | O | ||
|
JAVA Programming Lab |
2 | Experiment | JAVA Programming Practice | |||
| Open Source SW Practice | 2 | Experiment | Open Source SW Development Methodology and Application | |||
| 2 - 2 |
Algorithms |
3 | Core | Understanding and Implementing Computing Algorithms | ||
|
Introduction to Computer Architectures |
3 | Core | Understanding Computer Structure and Principles of Operation | |||
| Automata | 3 | Deep | Understanding Automata Theory | |||
| Industry-Academic Cooperation Project 1 | 1 | Deep | Implementation of Industry-Academic Cooperation Project | |||
| Industry-Academic Cooperation Project 2 | 1 | Deep | Implementation of Industry-Academic Cooperation Project | |||
| Industry-Academic Cooperation Project 3 | 1 | Deep | Implementation of Industry-Academic Cooperation Project | |||
|
System Programming Lab |
2 | Experiment | Linux Operating System Programming Practice | |||
| Introduction to programming | 3 | Deep | Introduction to programming for students with multiple majors | |||
| 3 - 1 | Introduction to Database | 3 | Core | Understanding and Implementing SQL and NoSQL Learning and DBMS/NoSQL Platform Structure for Database Utilization | O | |
| Operating system | 3 | Core | Understanding and Implementing the Operating System Structure | |||
| programming language | 3 | Core | Theory and compiler design of programming languages | |||
| Seminar on Computer Engineering | 1 | Deep | The latest research and industry trends in the computer field | |||
| Mobile App Programming Lab | 2 | Experiment | Mobile and Internet of Things Experiments | |||
| 3 - 2 | Introduction to Software Engineering | 3 | Core | Theory and Application of Software Engineering | ||
| Computer Network | 3 | Core | Understanding How Wired and Wireless Networks Work | |||
| Artificial Intelligence | 3 | Core | Basic Theory of Artificial Intelligence | O | ||
| Software seminar | 1 | Deep | Software Latest Research and Industry Trends | |||
| Introduction to Information Protection | 3 | Deep | cryptography, system security, network security | |||
|
Introduction to Real-Time Systems |
3 | Deep | Design and Analysis of Real-Time Systems, and In-Depth Understanding of Operating System and Network Principles | |||
|
ICT Startup |
3 | Deep | Enhancing ICT Entrepreneurship Competencies through Practical Software Startup Experience and Mentoring | |||
| Web Programming Practice | 2 | Experiment | Web programming practice such as JAVA Script | |||
| 4 - 1 |
Fundamentals of machine learning |
3 | Core | Machine Learning, Neural Network Theory | O | |
|
Introduction to Embedded Software |
3 | Deep | Comprehensive Study of Core Technologies Including Embedded System Architecture, OS, and Network Connectivity | |||
| Introduction to Computer Graphics | 3 | Deep | Computer Graphics Theory and Implementation Method | O | ||
|
Special Topics in Software 1 |
3 | Deep | The Latest Theory of Software | |||
| Artificial Intelligence Project | 2 | Experiment | Artificial intelligence SW practice such as TensorFlow | O | ||
| Network Project | 2 | Experiment | Latest network SW practices, including SDN | |||
| Computer vision | 3 | Deep | Computer Vision Theory and Implementation Method | O | ||
| Internet services and information protection | 3 | Deep | Theory and Methodology of Computer Security Technology | O | ||
|
Introduction to Big Data Analytics |
3 | Deep | Theory and Methodology for Big Data Analysis | O | ||
|
Introduction to Human Computer Interaction |
3 | Deep | Understanding and Applying HCI Techniques | O | ||
| Introduction to Deep Neural Networks | 3 | Deep | Deep Learning Theory and Practice | O | ||
| 4 - 2 | Multicore computing | 3 | Deep | Structure and parallelism of multicore computers | ||
|
Special Topics in Software 2 |
3 | Deep | The Latest Theory of Software | |||
| Database Project | 2 | Experiment | Implementing a database system | O | ||
| Embedded Systems Project | 2 | Experiment | Implementing Embedded Systems | O | ||
|
Modeling Simulation |
3 | Deep | Learning Security DEVS-Based Modeling Theory, Programming, and Simulation Execution Techniques | O | ||
|
Internet Service and Information Security |
3 | Deep | Theories and Methodologies of Computer Security Technologies | |||
|
Introduction to Computer Vision |
3 | Deep | Learning Fundamental Concepts, Algorithms, and Applications of Computer Vision | |||
| AI Capstone Design | 3 | Deep | AI Industry-Academic Cooperation Project | O | ||
| Capstone Design Project | 3 | Deep | Industry-Academic Cooperation Project Based on Practical Practice | O | ||
| 4 |
Virtual Reality Theory |
3 | Common | Virtual Reality Foundation and Latest Technologies | O | O |
|
Offensive Security |
3 | Common | Analysis of Security Vulnerabilities from Cyber Attack Techniques and Legal & Ethical Perspectives | |||
|
Network Security And Artificial Intelligence |
3 | Common | Latest network technology using AI | O | O | |
|
Principles of Distributed Computing |
3 | Common | the latest theory of distributed systems | O | O | |
| Information visualization | 3 | Common | Information Visualization The latest theories and technologies | O | O | |
|
Principles of Compilers and Programming Languages |
3 | Common | Latest compilers and PL technologies | O | O | |
|
Software Analysis for Security |
3 | Common | Learning Software Vulnerability Detection through Static and Dynamic Analysis | |||
| Blockchain and Smart Contracts | 3 | Common | Latest blockchain technologies and theories | O | O | |
|
Seminar In Digital Healthcare Security |
3 | Common | Latest Trends in Digital Healthcare Security: Devices, Infrastructure, Data | O | ||
|
Introduction to Recommender Systems |
3 | Common | Core Algorithms for Preference Inference & Recommendation Models | O | ||
|
Artificial Intelligence Ethics |
3 | Common | Analysis of Ethical Issues and Solutions in AI Data, Algorithms, and Applications | |||
|
Moving Object Networking and Security |
3 |
Common |
Learning Wireless Networking, Security Protocols, and Safe Mobility Technologies for Moving Objects | |||
|
Software Security With AI |
3 | Common | Enhancing Software Security with Deep Learning and Discussing Recent Research Trends | |||
|
Introduction to information security |
3 | Common | Overview of Fundamental Concepts in Information Security: System, Network, Software, Web Security, and Cryptography | |||
|
Computer Networks and Artificial Intelligence |
3 | Common | Learning Advanced Applications of AI-Integrated Network Security Protocols | |||
|
Machine learning techniques for security |
3 | Common | Theory and Practice of Machine Learning and Deep Learning Techniques in Security | |||
|
Principles of Reinforcement Learning |
3 | Common | Learning Reinforcement Learning: From Basic Theory to Deep Neural Network-Based Algorithms | O | ||
|
Software Hacking Lab |
3 | Common | Hands-on Hacking: Binary Reversing, Vulnerability Analysis, and Patching | |||
|
Research Paper Writing In Network Security |
3 | Common |
Learning Network Security Research: Planning, Design, Implementation, Evaluation, and Paper Presentation |
|||
|
Data Science and Security |
3 | Common | Overview of Information Security: System, Network, Software, Web Security, and Cryptography | |||
|
Special Topics in Systems Security |
3 | Common | Learning System and Software Security: Fundamental Theories and CTF-Based Attack & Defense Techniques |



