Curriculum
∎ Each department operates an advanced major track consisting of 18 to 21 credits.
∎ Practical courses and major credit requirements have been streamlined:
- - Experiment Course: 2 credits
- - Major Course: 56 credits
-
∎Upgraded major core credits by further classifying artificial intelligence-related Courses into major cores (21 credits). -
∎ Eliminating existing major core / general distinction and reorganizing into problem-solving and TOPIC-centered - major core and depth courses
-
∎ Major Core Tracks for Undergraduate and Graduate General Courses

| Course | Education Contents | Category |
|---|---|---|
| Principles of Distributed Computing | The latest theories of distributed systems |
3 Credits (Common Courses) |
| Blockchain and Smart Contracts | The latest technologies and theories of blockchain | |
| Artificial Intelligence Security | The latest security technology utilizing Artificial Intelligence | |
| Information Visualization | The latest theories and technologies of Information Visualization | |
| Software Structural Design Theory | Analyze the latest computer architecture | |
| Principles of Compilers and Programming Languages | The latest compiler and programming language design | |
| Computer Networks and Artificial Intelligence | Learning Advanced Applications of AI-Integrated Network Security Protocols | |
| Advanced Computer Network Design | Latest theory of Advanced Computer Network | |
| Virtual Reality Theory | Foundation and latest technologies of Virtual Reality | |
| Robot vision | (Information and Communiation Technology) 4th Industrial Convergence Subject | |
| Seminar In Digital Healthcare Security | Latest Trends in Digital Healthcare Security: Devices, Infrastructure, Data | |
| Intelligence Control | (ECE) 4th Industrial Convergence Subject | |
| Offensive Security | Analysis of Security Vulnerabilities from Cyber Attack Techniques and Legal & Ethical Perspectives | |
| Network Security And Artificial Intelligence | Latest network technology using AI | |
| Software Analysis for Security | Learning Software Vulnerability Detection through Static and Dynamic Analysis | |
| Introduction to Recommender Systems | Core Algorithms for Preference Inference & Recommendation Models | |
| Artificial Intelligence Ethics | Analysis of Ethical Issues and Solutions in AI Data, Algorithms, and Applications | |
| Moving Object Networking and Security | Learning Wireless Networking, Security Protocols, and Safe Mobility Technologies for Moving Objects | |
| Software Security With AI | Enhancing Software Security with Deep Learning and Discussing Recent Research Trends | |
| Introduction to information security | Overview of Fundamental Concepts in Information Security: System, Network, Software, Web Security, and Cryptography | |
| Machine learning techniques for security | Theory and Practice of Machine Learning and Deep Learning Techniques in Security | |
| Principles of Reinforcement Learning | Learning Reinforcement Learning: From Basic Theory to Deep Neural Network-Based Algorithms | |
| Software Hacking Lab | Hands-on Hacking: Binary Reversing, Vulnerability Analysis, and Patching | |
| Research Paper Writing In Network Security | Learning Network Security Research: Planning, Design, Implementation, Evaluation, and Paper Presentation | |
| Data Science and Security | Overview of Information Security: System, Network, Software, Web Security, and Cryptography | |
| Special Topics in Systems Security | Learning System and Software Security: Fundamental Theories and CTF-Based Attack & Defense Techniques | |
| ICT Standard Technologies and Practice | Introduction to ICT Standardization: AI, Networks, IoT, SDN, NFV, IBN, and Standardization Strategies |
3 Credits (Common Courses for All Degrees) |
| Data Modeling for Intelligent Networks and Security | Data Modeling and Management Automation: YANG, NETCONF, RESTCONF for SDN, NFV, and Network Security | |
| Program Analysis for Software Security | Program Analysis and Compiler Techniques: Static & Dynamic Analysis, Vulnerability Detection, and Secure Code Transformation | |
| Special Topics on Confidential Computing for AI and Data | Confidential Computing for AI and Data: TEE Technologies, Security Threats, and Practical Applications |



