Curriculum
∎ Each department operates an advanced major track consisting of 18 to 21 credits.
∎ Practical courses and major credit requirements have been streamlined:
- - Experiment Course: 2 credits
- - Major Course: 56 credits
-
∎Upgraded major core credits by further classifying artificial intelligence-related Courses into major cores (21 credits). -
∎ Eliminating existing major core / general distinction and reorganizing into problem-solving and TOPIC-centered - major core and depth courses
-
∎ Major Core Tracks for Undergraduate and Graduate General Courses
Course | Education Contents | Category |
---|---|---|
Principles of Distributed Computing | The latest theories of distributed systems |
3 Credits (Common Courses) |
Blockchain and Smart Contracts | The latest technologies and theories of blockchain | |
Artificial Intelligence Security | The latest security technology utilizing Artificial Intelligence | |
Information Visualization | The latest theories and technologies of Information Visualization | |
Software Structural Design Theory | Analyze the latest computer architecture | |
Principles of Compilers and Programming Languages | The latest compiler and programming language design | |
Computer Networks and Artificial Intelligence | Learning Advanced Applications of AI-Integrated Network Security Protocols | |
Advanced Computer Network Design | Latest theory of Advanced Computer Network | |
Virtual Reality Theory | Foundation and latest technologies of Virtual Reality | |
Robot vision | (Information and Communiation Technology) 4th Industrial Convergence Subject | |
Seminar In Digital Healthcare Security | Latest Trends in Digital Healthcare Security: Devices, Infrastructure, Data | |
Intelligence Control | (ECE) 4th Industrial Convergence Subject | |
Offensive Security | Analysis of Security Vulnerabilities from Cyber Attack Techniques and Legal & Ethical Perspectives | |
Network Security And Artificial Intelligence | Latest network technology using AI | |
Software Analysis for Security | Learning Software Vulnerability Detection through Static and Dynamic Analysis | |
Introduction to Recommender Systems | Core Algorithms for Preference Inference & Recommendation Models | |
Artificial Intelligence Ethics | Analysis of Ethical Issues and Solutions in AI Data, Algorithms, and Applications | |
Moving Object Networking and Security | Learning Wireless Networking, Security Protocols, and Safe Mobility Technologies for Moving Objects | |
Software Security With AI | Enhancing Software Security with Deep Learning and Discussing Recent Research Trends | |
Introduction to information security | Overview of Fundamental Concepts in Information Security: System, Network, Software, Web Security, and Cryptography | |
Machine learning techniques for security | Theory and Practice of Machine Learning and Deep Learning Techniques in Security | |
Principles of Reinforcement Learning | Learning Reinforcement Learning: From Basic Theory to Deep Neural Network-Based Algorithms | |
Software Hacking Lab | Hands-on Hacking: Binary Reversing, Vulnerability Analysis, and Patching | |
Research Paper Writing In Network Security | Learning Network Security Research: Planning, Design, Implementation, Evaluation, and Paper Presentation | |
Data Science and Security | Overview of Information Security: System, Network, Software, Web Security, and Cryptography | |
Special Topics in Systems Security | Learning System and Software Security: Fundamental Theories and CTF-Based Attack & Defense Techniques | |
ICT Standard Technologies and Practice | Introduction to ICT Standardization: AI, Networks, IoT, SDN, NFV, IBN, and Standardization Strategies |
3 Credits (Common Courses for All Degrees) |
Data Modeling for Intelligent Networks and Security | Data Modeling and Management Automation: YANG, NETCONF, RESTCONF for SDN, NFV, and Network Security | |
Program Analysis for Software Security | Program Analysis and Compiler Techniques: Static & Dynamic Analysis, Vulnerability Detection, and Secure Code Transformation | |
Special Topics on Confidential Computing for AI and Data | Confidential Computing for AI and Data: TEE Technologies, Security Threats, and Practical Applications |