Academic Foundations
Course Number | Course Title | Creadits(Hour) | Remarks |
---|---|---|---|
SMRT101 |
INTRODUCTION TO SMART SECURITY |
3(3) |
Introduction to Smart Security introduces the technological elements and developments of smart security that are essential to the future society through the introduction of the information age, which futurist Alvin Toffler talked about in the third wave. |
SMRT102 |
MATHEMATICS FOR SMART SECURITY |
3(3) |
Students can learn the basic knowledge in mathematics for computer science. The basic mathematical knowledge to be considered in this course covers from the mathematics for the theoretical computer science to that for applied computer science like artificial intelligence and cybersecurity. |
SMRT111 |
C PROGRAMMING AND PRACTICE |
3(4) |
The aim of this subject is to help the students grasp the C-language programming ability. This includes the fundamental data types, functions, arrays, pointers, structures and unions of C-language. It is mandatory for the students to practice the programming skills by submitting the programmed code as well as the output of it. |
SMRT112 |
COMPUTATIONAL LOGIC |
3(3) |
This course is to learn the basic necessary logical theory and application method for smart security majors. In this course, propositional logic, intuitive logic in propositional logic, and predicate logic are studied. In particular, we use Gentzen's Natural Deduction for computational logic. |
Major Required
Course Number | Course Title | Credit(Hour) | Remarks |
---|---|---|---|
SMRT201 | ALGORITHM AND PRACTICE FOR CRYPTOGRAPHY | 3(4) |
We study the basic algorithms and data structures. We also study the mathematically-hard problems and algorithms for those hard problems. |
SMRT222 | MODERN CRYPTOGRAPHY | 3(3) |
Cryptography is one of the most important areas of information security. In this class, we will acquire basic concepts of cryptography such as secret key cipher, mode of operation, hash function, public key cipher, digital signature, key management, authentication, etc. |
SMRT262 | CYBER ETHICS | 3(3) |
We learn basic professional ethics that we need to have as a cyber security expert. It is an interdisciplinary training course that fosters professional judgment skills by profession from the basic theory of ethics. In particular, we learn about the basic humanities of ethical approaches and the international ethical standards that we need to know as a smart security worker. It also consists of deductive and inductive investigation analysis of various job-specific codes of conduct in the smart age, and learning and training on the entire course of practical case studies and applications. |
SMRT301 | AI SECURITY I | 3(3) |
AI is recognized as an innovative technology in the field of cybersecurity. Since most existing cybersecurity systems operate based on rules created after analyzing intrusion cases, it is difficult to cope with zero-day attacks or large-scale attacks that change rapidly. Because AI can make adaptive decisions based on data, it becomes a novel technology in various cybersecurity fields such as intrusion detection, malware analysis, and vulnerability analysis. In this class, we discuss AI technology to implement effective cybersecurity systems. |
SMRT332 | SECURE SOFTWARE ENGINEERING I | 3(3) |
Secure Software Engineering is intended to secure the system by both “designing-in” the necessary countermeasures and “engineering-out” vulnerabilities throughout the lifecycle of the system. In this course, students will learn (1) security engineering processes, from requirements to maintenance, (2) security requirements engineering, (3) tools and methodology for secure architecture design & secure code development, (4) risk management and testing strategies to improve security, (5) formal verification and other high-assurance methods for security, (6) security assessment & authorization such as Common Criteria, CMVP, SSE-CMM, RMF A&A, etc. |
COSE342 | COMPUTER NETWORK | 3(3) |
The course will cover the basic concepts and principles of computer networks; layered network architectures, protocols (TCP/IP protocol suite), routing, network security, network management, applications and local area networks. |
Major Elective
Course Number | Course Title |
Credit(Hour) |
Remarks |
---|---|---|---|
SMRT203 |
FORMAL METHODS |
3(3) |
Cryptographic protocols are communication protocols which are designed to provide security services of various kinds, using cryptographic mechanisms. This course study how to design and analyze cryptographic protocols for key agreement, entity authentication, secure data transport, non-repudiation, secret sharing, and secure multy-party computation. |
SMRT205 |
MATHEMATICS FOR AI SECURITY |
3(3) |
In this lecture, we will discuss about fundamental mathematical concepts that are required to understand various fields of AI such as machine learning and deep learning. Subjects will be from (numerical) linear algebra, analysis, statistics, probability, and numerical optimization. |
SMRT221 |
CRYPTOGRAPHIC MATH |
3(3) |
Cryptography is one of the most important areas of information security. This class studies basic knowledge of mathematics required for studying cryptography. |
SMRT223 |
INTRODUCTION TO DIGITAL FORENSICS |
3(3) |
This course introduces digital forensic technologies and evidence law used for investigation of incidents and improves the practical ability of cyber security through case analysis and practice based on the theory of digital evidence investigation methods. |
SMRT224 |
SOFTWARE REVERSE ENGINEERING |
3(3) |
This course covers fundamental problems, principles, and techniques in software reverse engineering of binaries including static analysis techniques, disassembly algorithms, dynamic analysis techniques, automated static and dynamic analysis techniques, malware analysis techniques, anti-analysis techniques, and malware obfuscation and packing techniques. |
SMRT226 |
INTRODUCTION TO HACKING |
3(3) |
In this course, we will learn about fundamentals of hacking and security in terms of cryptography, network, web and system software. We will also practice some hacking techniques by conducting some labs. |
SMRT242 |
SECURE CODING |
3(4) |
Software is implemented using a programming language. At this time, if an error is included, the function of the software cannot be executed as desired, and a security problem occurs. In this course, we learn about coding techniques and theroy to eliminate such errors when coding. |
SMRT302 |
DATA SECURITY |
3(3) |
This course covers security techniques to store and manage data and information. Database management system will be covered, which is a reprentative tool to manage data. Students will learn basics of database management systems as well as security techniques such as cryptography, access control and authentication. |
SMRT321 |
CRYPTOGRAPHIC PROTOCOL |
3(3) |
Cryptographic protocols are communication protocols which are designed to provide security services of various kinds, using cryptographic mechanisms. This course study how to design and analyze cryptographic protocols for key agreement, entity authentication, secure data transport, non-repudiation, secret sharing, and secure multy-party computation. |
SMRT322 |
CRYPTOGRAPHIC APPLICATIONS |
3(3) |
Based on modern cryptography, we look at various applications for cryptography. |
SMRT323 |
COMPUTER SYSTEM SECURITY |
3(3) |
In this course, we will learn about computer systems security. Specifically, we will practice some techniques including software security, operating systems security and CPU security. |
SMRT324 |
COMPUTER NETWORK SECURITY |
3(3) |
This course covers the fundamentals and various security issues from the broad areas of modern computer networks including wireless and mobile networks, and the Internet of Things (IoT). Precisely, this course provides the network security features such as firewall, TLS, and DNS security; the fundamentals of wireless networks including 802.11, 5G/6G, and the vulnerabilities and security technologies; a variety of network technologies for resource-constrained IoT, potential threats, and solutions. Through various practical tasks and projects, wireless and mobile network security skills would be fertile. |
SMRT334 |
RISK MANAGEMENT |
3(3) |
Protection of information requires decision-making regarding the formulation and implementation of the solution most adequate for given circumstances. This process involves identifying assets to be protected and external threats to those assets. Also part of the process are eliminating the internal vulnerabilities such that risk does not manifest. Most of the risk assessment and methodology used in information security events are tools for understanding subject security problems and improving the decision-making process. |
SMRT336 |
AI SECURITYⅡ |
3(3) |
AI is establishing itself as a core technology enabling various applications such as smart city, smart factory, autonomous vehicle, IoT, and intrusion detection system. At the same time, the trustworthiness of AI and AI-augmented systems is becoming more critical. In this course, based on the understanding of vulnerability attack and defense techniques in recent research, we will cultivate primary skills for implementing secure AI. |
SMRT338 |
INTRODUCTION TO DE-IDENTIFICATION |
3(3) |
In this course, students learn the scope and definition of personal information defined in the Korean law and foreign countries. Afterwards, students learn various de-identification techniques to create pseudonymous or anonymous information in order to safely handle sensitive or personal information in databases or data mining. |
SMRT422 |
HARDWARE SECURITY |
3(3) |
This course covers hardware-assisted security techniques and securing hardware design. Students learn cryptographic hardware, physical attacks, side-channel attacks, and hardware Trojan. |
SMRT424 |
DIGITAL FORENSIC PRACTICE |
3(3) |
This course introduces basic knowledge and tool usage to conduct digital forensic investigations. It also introduces forensic artifacts of various file systems and learns how to extract and analyze data from embedded devices. |
SMRT431 |
SECURE SOFTWARE ENGINEERINGⅡ |
3(3) |
Testing and verification are very important and indispensable elements in developing secure software. In this course, students will learn how to locate software bugs and defects using the latest testing techniques, and also look at how to automate this. |
SMRT433 |
SECURITY FOR BIGDATA |
3(3) |
To date, there have been various data analysis approaches and attacks techniques for the Bigdata. In this course, students will first learn such various data analysis approaches which are shown in data mining and machine learning society. Afterwards, students will learn several security techniques for bigdata. |
SMRT435 |
SMART SECURITY APPLICATION |
3(3) |
In this lecture, students learn how to apply core techniques (e.g., system and network security techniques) to enhance the security level of various internet services or smart systems. For example, students can learn how to solve the security problems of famous internet services or smart products such as PC/mobile games or smart cars. |
SMRT461 |
CYBER TECHNOLOGY AND LAW |
3(3) |
With the development of ICT and the emergence of new technologies, we are facing changes such as the Industry 4.0 and a Hyper-Connected society. In this course, we examine technology, legal and policy issues that may arise in cyberspace and new environments, and explore countermeasures from the perspective of smart security. |
SMRT463 |
PRIVACY PROTECTION |
3(3) |
We study several privacy-enhancing technologies for various applications such as network routing, database, computing and so on. |
SMRT465 |
CAPSTONE DESIGN Ⅰ |
3(3) |
Capstone design related to smart security is conducted under the guidance of the supervisor. |
SMRT466 |
CAPSTONE DESIGN Ⅱ |
3(3) |
Capstone design related to smart security is conducted under the guidance of the supervisor. |
SMRT468 |
WAY TO SET UP A GREAT STARTUP COMPANY |
3(3) |
Introducing the elements to be prepared to set up a start-up company, and understanding the method and main procedures through practice. Understanding how to set up a business and cultivate business management capabilities applicable to the field through this. |
SMRT481 |
INTERNSHIP Ⅰ |
3 |
During senior, students can take classes and concurrently practice for a certain amount of time at an external institution. |
SMRT482 |
INTERNSHIP Ⅱ |
6 |
Two months during summer or winter vacation, full-time practice is held at an external institution. |
SMRT483 |
INTERNSHIP Ⅲ |
12 |
One semester during the fourth year is held at an external institution on a full-time basis. |
COSE221 |
DIGITAL LOGIC DESIGN |
3(3) |
This course covers the principles and methods of the digital logic design as a preparation for understanding the computer organization. Hardware design language is covered as well. Main topics include combinational logic and sequential logic designs. Various widely-used digital components will be studied based on the studied principles such as adder/subtractor, decoder, multiplexer, ALU, latch and flip-flops. |
COSE222 |
COMPUTER ARCHITECTURE |
3(3) |
This course covers the computer organization details and design focusing on CPU and memory hierarchy. For the CPU operation and design, the implementation detail for the machine code execution is covered with the pipelined architecture. The memory hierarchy includes caches, main memory and storage. |
COSE312 |
COMPILER |
3(3) |
This course includes detailed study of the basic techniques for compiler implementation, including lexical analysis, syntax analysis, semantic analysis, intermediate code generation, object code generation, and code optimization. |
COSE341 |
OPERATING SYSTEMS |
3(3) |
This course covers the definition, the stage of development, and the structure of operating systems. The basic functions of operating system needed to precess a job will be studied as well; Basic functions include process management, synchronization, memory management, virtual memory, file system and mass storage management. |
COSE451 |
SOFTWARE SECURITY |
3(3) |
Introduction to software security will be covered, which includes buffer overflow and other software vulnerabilities, secure coding practices, checking tools in development process, and malware analysis. |