고려대학교 행정학과

QUICK MENU
  • 사이트맵
  • KUPID
  • English

Division of Smart Security|Curriculum

Academic Foundations

Course Number Course Title Creadits(Hour) Remarks

SMRT101

INTRODUCTION TO SMART SECURITY

3(3)

Introduction to Smart Security introduces the technological elements and developments of smart security that are essential to the future society through the introduction of the information age, which futurist Alvin Toffler talked about in the third wave. 

SMRT102

MATHEMATICS FOR SMART SECURITY

3(3)

 Students can learn the basic knowledge in mathematics for computer science. The basic mathematical knowledge to be considered in this course covers from the mathematics for the theoretical computer science to that for applied computer science like artificial intelligence and cybersecurity.

SMRT111

C PROGRAMMING AND PRACTICE

3(4)

The aim of this subject is to help the students grasp the C-language programming ability. This includes the fundamental data types, functions, arrays, pointers, structures and unions of C-language. It is mandatory for the students to practice the programming skills by submitting the programmed code as well as the output of it.

SMRT112

COMPUTATIONAL LOGIC

3(3)

This course is to learn the basic necessary logical theory and application method for smart security majors. In this course, propositional logic, intuitive logic in propositional logic, and predicate logic are studied. In particular, we use Gentzen's Natural Deduction for computational logic.

 

 

Major Required

 

Course Number Course Title Credit(Hour) Remarks
SMRT201 ALGORITHM AND PRACTICE FOR CRYPTOGRAPHY 3(4)

We study the basic algorithms and data structures. We also study the mathematically-hard problems and algorithms for those hard problems.

SMRT222 MODERN CRYPTOGRAPHY 3(3)

Cryptography is one of the most important areas of information security. In this class, we will acquire basic concepts of cryptography such as secret key cipher, mode of operation, hash function, public key cipher, digital signature, key management, authentication, etc.

SMRT262 CYBER ETHICS 3(3)

We learn basic professional ethics that we need to have as a cyber security expert. It is an interdisciplinary training course that fosters professional judgment skills by profession from the basic theory of ethics. In particular, we learn about the basic humanities of ethical approaches and the international ethical standards that we need to know as a smart security worker. It also consists of deductive and inductive investigation analysis of various job-specific codes of conduct in the smart age, and learning and training on the entire course of practical case studies and applications.

SMRT301 AI SECURITY I 3(3)

AI is recognized as an innovative technology in the field of cybersecurity. Since most existing cybersecurity systems operate based on rules created after analyzing intrusion cases, it is difficult to cope with zero-day attacks or large-scale attacks that change rapidly. Because AI can make adaptive decisions based on data, it becomes a novel technology in various cybersecurity fields such as intrusion detection, malware analysis, and vulnerability analysis. In this class, we discuss AI technology to implement effective cybersecurity systems.

SMRT332 SECURE SOFTWARE ENGINEERING I 3(3)

Secure Software Engineering is intended to secure the system by both “designing-in” the necessary countermeasures and “engineering-out” vulnerabilities throughout the lifecycle of the system. In this course, students will learn (1) security​ ​engineering​ ​processes,​ ​from​ ​requirements​ ​to​ ​maintenance, (2) security requirements engineering, (3) tools​ ​and​ ​methodology​ ​for secure architecture design & ​secure​ ​code​ ​development, (4) risk​ ​management​ ​and​ ​testing​ ​strategies​ ​to​ ​improve​ ​security, (5) formal​ ​verification​ ​and​ ​other​ ​high-assurance​ ​methods​ ​for​ ​security, (6) security assessment & authorization such as Common Criteria, CMVP, SSE-CMM, RMF A&A, etc.

COSE342 COMPUTER NETWORK 3(3)

The course will cover the basic concepts and principles of computer networks; layered network architectures, protocols (TCP/IP protocol suite), routing, network security, network management, applications and local area networks.

 

 

 

 

Major Elective

 

Course Number Course Title

Credit(Hour)

Remarks

SMRT203

FORMAL METHODS

3(3)

Cryptographic protocols are communication protocols which are designed to provide security services of various kinds, using cryptographic mechanisms. This course study how to design and analyze cryptographic protocols for key agreement, entity authentication, secure data transport, non-repudiation, secret sharing, and secure multy-party computation.  

 

SMRT205

MATHEMATICS FOR AI SECURITY

3(3)

In this lecture, we will discuss about fundamental mathematical concepts that are required to understand various fields of AI such as machine learning and deep learning. Subjects will be from (numerical) linear algebra, analysis, statistics, probability, and numerical optimization.

SMRT221

CRYPTOGRAPHIC MATH

3(3)

Cryptography is one of the most important areas of information security. This class studies basic knowledge of mathematics required for studying cryptography.

SMRT223

INTRODUCTION TO DIGITAL FORENSICS

3(3)

This course introduces digital forensic technologies and evidence law used for investigation of incidents and improves the practical ability of cyber security through case analysis and practice based on the theory of digital evidence investigation methods.

SMRT224

SOFTWARE REVERSE ENGINEERING

3(3)

This course covers fundamental problems, principles, and techniques in software reverse engineering of binaries including static analysis techniques, disassembly algorithms, dynamic analysis techniques, automated static and dynamic analysis techniques, malware analysis techniques, anti-analysis techniques, and malware obfuscation and packing techniques.

SMRT226

INTRODUCTION TO HACKING

3(3)

In this course, we will learn about fundamentals of hacking and security in terms of cryptography, network, web and system software. We will also practice some hacking techniques by conducting some labs.

SMRT242

SECURE CODING

3(4)

 Software is implemented using a programming language. At this time, if an error is included, the function of the software cannot be executed as desired, and a security problem occurs. In this course, we learn about coding techniques and theroy to eliminate such errors when coding.

SMRT302

DATA SECURITY

3(3)

This course covers security techniques to store and manage data and information. Database management system will be covered, which is a reprentative tool to manage data. Students will learn basics of database management systems as well as security techniques such as cryptography, access control and authentication.

SMRT321

CRYPTOGRAPHIC PROTOCOL

3(3)

Cryptographic protocols are communication protocols which are designed to provide security services of various kinds, using cryptographic mechanisms. This course study how to design and analyze cryptographic protocols for key agreement, entity authentication, secure data transport, non-repudiation, secret sharing, and secure multy-party computation.  

SMRT322

CRYPTOGRAPHIC APPLICATIONS

3(3)

Based on modern cryptography, we look at various applications for cryptography.

SMRT323

COMPUTER SYSTEM SECURITY

3(3)

In this course, we will learn about computer systems security. Specifically, we will practice some techniques including software security, operating systems security and CPU security.

SMRT324

COMPUTER NETWORK SECURITY

3(3)

This course covers the fundamentals and various security issues from the broad areas of modern computer networks including wireless and mobile networks, and the Internet of Things (IoT). Precisely, this course provides the network security features such as firewall, TLS, and DNS security; the fundamentals of wireless networks including 802.11, 5G/6G, and the vulnerabilities and security technologies; a variety of network technologies for resource-constrained IoT, potential threats, and solutions. Through various practical tasks and projects, wireless and mobile network security skills would be fertile.

SMRT334

RISK MANAGEMENT

3(3)

 Protection of information requires decision-making regarding the formulation and implementation of the solution most adequate for given circumstances. This process involves identifying assets to be protected and external threats to those assets. Also part of the process are eliminating the internal vulnerabilities such that risk does not manifest. Most of the risk assessment and methodology used in information security events are tools for understanding subject security problems and improving the decision-making process.

SMRT336

AI SECURITYⅡ

3(3) 

AI is establishing itself as a core technology enabling various applications such as smart city, smart factory, autonomous vehicle, IoT, and intrusion detection system. At the same time, the trustworthiness of AI and AI-augmented systems is becoming more critical. In this course, based on the understanding of vulnerability attack and defense techniques in recent research, we will cultivate primary skills for implementing secure AI.

SMRT338

INTRODUCTION TO DE-IDENTIFICATION

3(3)

In this course, students learn the scope and definition of personal information defined in the Korean law and foreign countries. Afterwards, students learn various de-identification techniques to create pseudonymous or anonymous information in order to safely handle sensitive or personal information in databases or data mining.

SMRT422

HARDWARE SECURITY

3(3)

This course covers hardware-assisted security techniques and securing hardware design. Students learn cryptographic hardware, physical attacks, side-channel attacks, and hardware Trojan.

SMRT424

DIGITAL FORENSIC PRACTICE

3(3)

This course introduces basic knowledge and tool usage to conduct digital forensic investigations. It also introduces forensic artifacts of various file systems and learns how to extract and analyze data from embedded devices.

SMRT431

SECURE SOFTWARE ENGINEERINGⅡ

3(3)

Testing and verification are very important and indispensable elements in developing secure software. In this course, students will learn how to locate software bugs and defects using the latest testing techniques, and also look at how to automate this.

SMRT433

SECURITY FOR BIGDATA

3(3)

 To date, there have been various data analysis approaches and attacks techniques for the Bigdata. In this course, students will first learn such various data analysis approaches which are shown in data mining and machine learning society. Afterwards, students will learn several security techniques for bigdata.

SMRT435

SMART SECURITY APPLICATION

3(3)

In this lecture, students learn how to apply core techniques (e.g., system and network security techniques) to enhance the security level of various internet services or smart systems. For example, students can learn how to solve the security problems of famous internet services or smart products such as PC/mobile games or smart cars.

SMRT461

CYBER TECHNOLOGY AND LAW

3(3)

With the development of ICT and the emergence of new technologies, we are facing changes such as the Industry 4.0 and a Hyper-Connected society. In this course, we examine technology, legal and policy issues that may arise in cyberspace and new environments, and explore countermeasures from the perspective of smart security.

SMRT463

PRIVACY PROTECTION

3(3)

We study several privacy-enhancing technologies for various applications such as network routing, database, computing and so on.

SMRT465

CAPSTONE DESIGN Ⅰ

3(3)

Capstone design related to smart security is conducted under the guidance of the supervisor.

SMRT466

CAPSTONE DESIGN Ⅱ

3(3)

Capstone design related to smart security is conducted under the guidance of the supervisor.

SMRT468

WAY TO SET UP A GREAT STARTUP COMPANY

3(3)

Introducing the elements to be prepared to set up a start-up company, and understanding the method and main procedures through practice. Understanding how to set up a business and cultivate business management capabilities applicable to the field through this.

SMRT481

INTERNSHIP Ⅰ

3

During senior, students can take classes and concurrently practice for a certain amount of time at an external institution.

SMRT482

INTERNSHIP Ⅱ

6

Two months during summer or winter vacation, full-time practice is held at an external institution.

SMRT483

INTERNSHIP Ⅲ

12

One semester during the fourth year is held at an external institution on a full-time basis.

COSE221

DIGITAL LOGIC DESIGN

3(3)

This course covers the principles and methods of the digital logic design as a preparation for understanding the computer organization. Hardware design language is covered as well. Main topics include combinational logic and sequential logic designs. Various widely-used digital components will be studied based on the studied principles such as adder/subtractor, decoder, multiplexer, ALU, latch and flip-flops. 

COSE222

COMPUTER ARCHITECTURE

3(3)

This course covers the computer organization details and design focusing on CPU and memory hierarchy. For the CPU operation and design, the implementation detail for the machine code execution is covered with the pipelined architecture. The memory hierarchy includes caches, main memory and storage.

COSE312

COMPILER

3(3)

 This course includes detailed study of the basic techniques for compiler implementation, including lexical analysis, syntax analysis, semantic analysis, intermediate code generation, object code generation, and code optimization.

COSE341

OPERATING SYSTEMS

3(3)

 This course covers the definition, the stage of development, and the structure of operating systems. The basic functions of operating system needed to precess a job will be studied as well; Basic functions include process management, synchronization, memory management, virtual memory, file system and mass storage management.

COSE451

SOFTWARE SECURITY

3(3)

Introduction to software security will be covered, which includes buffer overflow and other software vulnerabilities, secure coding practices, checking tools in development process, and malware analysis.