(1) Information Security Course
Take the unified examination of computer specialty (data structure, operating system, computer network, co
(1) Information Security Course
Take the unified examination of computer specialty (data structure, operating system, computer network, computer composition principle) for postgraduate entrance examination. The specific undergraduate courses vary from school to school. You can check it on the home pages of colleges and universities. In addition to the basic specialized courses of computer specialty: advanced language programming, data structure, operating system, electronic circuit, digital logic, computer composition principle, discrete mathematics and computer network, there are also information security mathematics (number theory foundation, algebraic structure) and cryptography. Some courses include software security, information hiding technology, network security and so on.
⑵ What are the special courses of information security specialty?
As a student majoring in information security.
Let me talk about my understanding of information security.
As a freshman in Macey, I am currently exposed to professional courses such as Introduction to Information Security, Information Security Psychology, JAVA, C Language, Number (nan), Data (de) and Structure (yi) (pi).
The rest are basic courses, such as: advanced mathematics, line generation, big things, English, ideology and politics, history (who says science students don't have to study liberal arts! )
It sounds a lot and difficult, but when you learn it, you will find it (really difficult)! ! !
(3) What courses should information security take?
The basic and specialized courses of study mainly include: advanced mathematics, linear algebra, calculation method, probability theory and mathematical statistics, computer and algorithm, C++ language programming, data structure and algorithm, computer principle and assembly language, database principle, operating system, college physics, * * and graph theory, algebra and logic, cryptography principle, coding theory, information theory foundation, information security architecture, etc. In addition to the above majors, a large number of professional elective courses are also offered, including: data communication principle, introduction to information security, computer network security management, digital identification and authentication system, network security detection and prevention technology, firewall technology, virus mechanism and protection technology, network security protocols and standards, etc.
⑷ Main courses of computer information security technology
1. 1 factors threatening computer information security
1.2 research content of computer information security
1.2. 1 computer external security
1.2.2 computer internal security
1.2.3 computer network security
1.3OSI information security system
1.3. 1 security service
1.3.2 security mechanism
1.4 security strategy of computer system
1.4. 1 security policy
1.4.2 the relationship between people, systems and technology
1.5 Reliability of computer system
1.5. 1 Error avoidance and fault tolerance
1.5.2 fault-tolerant design
1.5.3 fault recovery strategy
Exercise 1 2. 1 Overview of Cryptography Technology
2.2 classic encryption method
2.2. 1 instead of password
2.2.2 Transposition password
Symmetric encryption system
2.3 data encryption standard DES
2.3. 1DES algorithm description
DES algorithm encryption process
Decryption process of DES algorithm
2.3.4 triple DES algorithm
2.4 advanced encryption standard AES
2.4. Mathematical basis of1AES algorithm
2.4.2AES overview of AES algorithm
2.4.3AES algorithm encryption process
AES algorithm decryption process
AES algorithm security
2.5 public key system
2.6RSA algorithm
2.6. Mathematical basis of1RSA algorithm
2.6.2RSA algorithm foundation
2.6.3RSA algorithm flow
RSA algorithm security
2.7NTRU algorithm
2.7. Mathematical basis of1ntru algorithm
NTRU algorithm description
2. 7. 3 tru algorithm example
2.8 Comparison between symmetric encryption system and public key system
2.9 Information hiding technology
2. 10 digital watermark
2. 10. 1 General model of digital watermarking
2. 10.2 main features of digital watermarking
2. 10.3 digital watermark classification
2. 10.4 typical digital watermarking algorithm
2. 10.5 digital watermarking application
2. 10.6 digital watermarking attack
Exercise 2 3. 1 Digital Signature Overview
3. 1. 1 digital signature principle
3. 1.2 digital signature standard DSS
3. 1.3 gpg e-mail encryption
3.2 One-way hash function
3.2. 1 One-way hash function characteristics
3.2.2MD5 algorithm
3.2.3SHA algorithm
3. 2. 4 SHA- 1 comparison with MD5
3.3Kerberos authentication
3.3. 1 What is Kerberos?
Working principle of Kerberos
3.4 Public Key Infrastructure PKI
3.4. 1 digital certificate
3.4.2PKI Basic components of PKI
3.4.3 Performance requirements of PKI
3.4.4PKI standard
3.5 User ID and password mechanism
3.5. 1 user authentication ID
Unsafe password
Security password
Password attack.
Improvement plan
3.6 Biometric technology
3.6. 1 biometric system
Fingerprint identification
3.6.3 Iris recognition
3.6.4 Other biometric technologies
3.7 smart card
Exercise 3 4. 1 computer virus overview
4. 1. 1 Definition of computer virus
4. 1.2 characteristics of computer viruses
4. 1.3 causes of computer virus
4. 1.4 Transmission routes of computer viruses
4. 1.5 Classification of computer viruses
4. 1.6 Performance of computer virus
4. 1.7 General composition of computer virus program
4.2 Computer Virus Production Technology
4.3 Computer antivirus software production technology
4.4 Worm virus analysis
4.5 Trojan horse
4.5. 1 Hackers and Trojans
4.5.2 Basic Principles of Trojan Horse
Trojan horse startup mode
Port of Troy
4.5.5 Hide the Trojan Horse
Trojan classification
4.5.7 Trojan kills horses
4.6 Prevention of computer viruses and hackers
Exercise 4 5. 1 Network security vulnerabilities
5.2 Target detection
5.2. 1 target detection content
Method of target detection
5.3 scanning concept and principle
Scanner concept
5.3.2 Universal Port Scanning Technology
5.3.3 Preventing port scanning
5.4 Network monitoring
5.4. 1 network monitoring principle
5.4.2 Network monitoring, detection and prevention
5.4.3 Introduction of sniffer
5.5 Buffer overflow
5.5. 1 buffer overflow principle
5.5.2 Buffer overflow attack method
5.5.3 Preventing buffer overflow
5.6 Denial of service
5.6. 1 denial of service DDoS
5.6.2 Distributed Denial of Service DDoS
5.6.3DDoS steps of DDOS attack
5.6.4 Strategies to Prevent DDoS Attacks
5.7 Deception Attack and Prevention
5.7. 1IP spoofing attack and its prevention
5.7.2IP address embezzlement and prevention
5.7.3DNS spoofing and prevention
5. 7. 4 Network Fraud and Prevention
5.8 Network Security Service Agreement
Secure socket layer protocol SSL
Transport layer security protocol TLS
Secure channel protocol SSH
5.8.4 Secure Electronic Transaction Set
5.8.5 Internet Protocol Security IPSec
5.9 Wireless Network Security
Ieee 802.111b security protocol.
IEEE802. 1 1i security protocol
5.9.3WAPI security protocol
5.9.4 Spread Spectrum Technology
Exercise 5 6. 1 firewall overview
6. The concept of1.1firewall
6. 1.2 Main functions of firewall
6. 1.3 basic types of firewall
6.2 firewall architecture
6.2. 1 filter router structure
Dual-homed host structure
6.2.3 Shielded host gateway structure
Shielded subnet structure
6.3 firewall technology
6.3. 1 packet filtering technology
6.3.2 Agency service technology
6.3.3 Circuit layer gateway technology
6.3.4 State detection technology
6.4 distributed firewall
6.4. 1 traditional border firewall
Overview of distributed firewall
6.4.3 composition of distributed firewall
6.4.4 Working principle of distributed firewall
6.5 firewall security policy
6.5. 1 firewall service access policy
Firewall design strategy
6.6Windows XP firewall
6.7 Purchase of Firewall
6.8 Introduction of Personal Firewall Program Design
Exercise 6 7. 1 Overview of Intrusion Detection System
7.2 General steps of intrusion detection
7.3 Classification of Intrusion Detection System
7.3. 1 Classify the objects detected by the system.
7.3.2 Classification according to data analysis methods
7.3.3 Classification of buildings
7.4 Key Technologies of Intrusion Detection System
7.5 Introduction of Intrusion Detection System Model
7.5. 1 Distributed Intrusion Detection System
7.5.2 Intrusion Detection System Based on Mobile Agent
7.5.3 Intelligent Intrusion Detection System
7.6 Standardization of Intrusion Detection System
7.6. 1 IDWG of Intrusion Detection Working Group
7.6.2 General Intrusion Detection Framework CIDF
7.7 intrusion detection system Snort
7.8 Purchase of Intrusion Detection Products
Exercise 7 8. 1 Overview of digital forensics
8.2 Electronic evidence
8.2. 1 the concept of electronic evidence
8.2.2 Characteristics of electronic evidence
8.2.3 Electronic evidence in common electronic equipment
8.3 Principles and processes of digital forensics
8.3. 1 principle of digital evidence collection
8.3.2 Digital forensics process
8.4 Network forensics technology
8.4. 1 Overview of network forensics
8.4.2 Network forensics model
8.4.3IDS forensics technology
8.4.4 honey trap forensics technology
8.4.5 Forensic Technology of Fuzzy Expert System
8.4.6SVM forensics technology
8.4.7 Malicious Code Technology
8.5 Common tools for digital forensics
Exercise 8 9. 1 Operating System Security
9. 1. 1 operating system security function
9. 1.2 security design of operating system
9. 1.3 Security Configuration of Operating System
9. 1.4 security of operating system
9.2Windows security mechanism
9.2.1Overview of Windows Security Mechanism
Active directory service
9.2.3 Certification Services
Encrypted file system
Safety template
9.2.6 Safety Account Manager
otherwise
9.3Windows security configuration
9.4UNIX security mechanism
9.5Linux security mechanism
9.5. 1PAM mechanism
Security audit
Mandatory access control
User and file configuration
Network configuration
9.5.6Linux security module LSM
Encrypted file system
9.6Linux security configuration
Exercise 9 10. 1 Overview of data backup
10.2 system data backup
10.2. 1 RAID technology of disk array
10.2.2 system restore card
10.2.3 clone master Ghost
10.2.4 Other backup methods
10.3 user data backup
10. 3. 1 second copy 2000
10. 3. 2 File Wizard 2000
10.4 network data backup
10.4. 1 network backup system
10. 4. 2 as direct attached storage.
10. 4. 3 network attached storage
10.4.4SAN storage network
10.4.5IP storage technology
10.4.6 data migration technology
10.5 data recovery
10.5. 1 data recovery overview
10.5.2 hard disk data recovery
10. 5. 3 Easy recovery
10. 5. 4 final data
Exercise1011.1Overview of Software Protection Technology
1 1.2 static analysis technology
File type analysis of 1 1.2. 1
1 1.2.2W32Da ***
11.2.3 introduction to IDA pro
1 1.2.4 executable code editing tool
1 1.2.5 executable file resource editing tool
1 1.3 dynamic analysis technology
1 1.3. 1 software debugger
11.3.2 Lloyd BG debugger
1 1.4 Common software protection technologies
1 1.4. 1 serial number protection mechanism
1 1.4.2 warning (NAG) window
1 1.4.3 time limit
1 1.4.4 time limit
1 1.4.5 Registration protection
1 1.4.6 Function limitation
1 1.4.7 CD software protection
1 1.4.8 dongle
1 1.4.9 floppy disk protection technology
1 1.4. 10 anti-tracking technology
1 1.4. 1 network software protection
1 1.4. 12 patch technology
1 1.5 software shelling
1 1.5. 1 the concept of "shell"
1 1.5.2 Loading "Shell"
1 1.5.3 Introduction to Software Shell Tools
1 1.5.4 software shelling
Suggestions on 1 1.6 Design Software Protection
Exercise 1 1 Experiment 1 Encryption and Hiding
Experiment 2 cracking the password
Experiment 3 Network Vulnerability Scanning
Experiment 4 "Glacier" Hacking Tool
Experiment 5 Sniffer, a network monitoring tool
Lab 6 Personal Firewall Configuration
Experiment 7 Intrusion Detection Software Settings
Lab 8Windows 2000/XP/2003 Security Settings
Experiment 9 System Data Backup
Experiment 10 user data backup
Experiment 1 1 data recovery
Static Analysis of Experiment 12 Software
Experiment 13 resource editing tool
Dynamic Analysis of Experiment 14 Software
5] information security professional courses
Information security is a new cross-disciplinary subject focused on by national development, which is closely related to departments and industries such as * * *, national defense, finance, manufacturing and commerce, and has broad development prospects. Through study, students will have theoretical knowledge and comprehensive technology in information security protection and confidentiality. Can be engaged in system design and management in scientific research institutions, institutions of higher learning, * * organs (troops), financial industry, information industry and its use management departments, especially senior engineers and technicians engaged in information security protection.
main course
Students majoring in discrete mathematics, signal and system, communication principle, software engineering, coding theory, introduction to information security, information theory, data structure, operating system, information system engineering, modern cryptography, network security, information camouflage, etc. Should have the following basic knowledge and professional ability:
Master basic skills
(1) Master the basic theories and knowledge of safety theory, modern enterprise management, economic information management and information system.
(2) Master the basic theory and knowledge of computer software and hardware encryption and decryption.
(3) Master the basic knowledge and skills of computer maintenance and system support.
(4) master the basic skills of participating in enterprise management for economic information analysis and processing.
(5) Be proficient in a foreign language and be able to apply it to the field of information security management. Employment direction and main work
Information is an important strategic resource for social development. The international struggle around the acquisition, use and control of information is becoming increasingly fierce. Information security has become a key point in maintaining national security and social stability, and all countries have given great attention and input. Network information security has become an important key issue that needs to be solved urgently and concerns the overall situation and long-term interests of the country. It is not only a powerful guarantee to exert the high efficiency and effectiveness brought by the information revolution, but also an important barrier to resist information aggression. Information security capability is an important part of comprehensive national strength, economic competitiveness and viability in 2 1 century, and it is the commanding height that all countries in the world are struggling to climb at the turn of the century. Information security issues have a comprehensive impact on all aspects of China's political, military, economic, cultural and social life. If it is not solved well, the country will be threatened by information war and the economic and financial risks will be high.
In short, with the rapid development of network information technology today, information security has become crucial, and information security has become a hot topic in information science. The starting point of information security technology in China is still relatively low. Only a few colleges and universities in China offer "information security" majors, and there is a shortage of information security technicians. Graduates of this major can engage in the research, design, development and management of various information security systems and computer security systems in * * * organs, national security departments, banks, finance, securities, communications and other departments, and can also engage in computer applications in the IT field.
[6] What is the main learning content of information security?
Information security courses include computer network, windows security, linux security, encryption technology, firewall, network attack and defense, etc., all of which I learned in a group.
126672455 (126672455)
What were the main courses of information security major?
The main courses offered by information security specialty are: circuit and electronic technology, digital logic, computer composition principle, high-level language programming, discrete mathematics, data structure, operating system principle, signal and system, communication principle, information security mathematics, information theory and coding, computer network, information security foundation, internet security, cryptography network programming, etc.
(8) Introduction of information security specialty.
Information security major, according to the Catalogue of Undergraduate Majors in Colleges and Universities (20 12) issued by the Ministry of Education, the professional code is 080904K version, which belongs to the computer category (0809). With comprehensive professional knowledge of information security, students have extensive knowledge and basic ability for further development; Strengthen the basic literacy required by the subject, so that students have the basic quality needed for scientific research in this subject and lay a good foundation for their future development and innovation; Make students have strong application ability, have the ability to solve practical application problems by using the basic knowledge they have mastered, and constantly enhance the ability of system application, development and continuous acquisition of new knowledge. Strive to make students have a solid theoretical foundation and strong application ability; It can not only undertake the development of practical systems, but also carry out scientific research.
What are the courses for information security?
Courses are:
1, PKI technology:
This course is not only suitable for students majoring in information security, but also suitable for IT personnel and related business personnel in finance, telecommunications and other industries. With the development of computer security technology, PKI has been widely used at home and abroad. It is an indispensable security infrastructure for e-commerce, e-government, online banking and online securities trading. The main contents are as follows: From the concept and theoretical basis of PKI, the system structure of PKI, the main functions of PKI, PKI services, the realization and standardization of PKI, and the typical applications based on PKI technology, etc., this paper comprehensively introduces the relevant knowledge of PKI technology and its application. Through the study of this course, students can understand the development trend of PKI, and have a certain understanding and mastery of its key technologies and related knowledge.
2, safety certification technology:
Security authentication technology is one of the important components of network information security, and it is also a specialized course for senior students majoring in information security, aiming at the wide application of network e-commerce. This paper mainly studies various methods to verify the attributes of the authenticated object to confirm whether the authenticated object is true and effective. The main contents include the security threat of network system, data encryption technology, biometric authentication technology, message authentication technology, security protocol and so on. It is a comprehensive application of PKI technology, data encryption, computer network security, database security and other courses, which lays a good foundation for students to better understand the information security mechanism and practice in this field in the future.
3, security scanning technology:
This course systematically introduces scanning technology in network security, so that students can fully understand the principle and application of security scanning technology. In-depth understanding of network security, vulnerabilities and their relationships, master the technical principles of port scanning and operating system fingerprint scanning, understand the application of security scanners and scanning technology, understand anti-scanning technology and system security assessment technology, and master the development trend of scanning technology.
4, firewall principle and technology:
This course deeply understands the core technology, basic structure, working principle, basic concepts, new technologies for firewall development, mainstream firewall products at home and abroad, and firewall selection criteria.
5, intrusion detection technology:
Master the basic theory and method of intrusion detection and its application in the overall network security protection, and find out the corresponding preventive measures by analyzing the means and methods of intrusion in network security; Deeply understand the importance of intrusion detection and its position in security protection. The course content includes the basic knowledge of network security, the principle and realization of network attack, the necessity of intrusion detection technology, the acquisition of information sources, the application of intrusion detection technology and intrusion detection system.
6, data backup and disaster recovery:
This course systematically explains the relevant knowledge and practical technology of data storage technology, data backup and disaster recovery, introduces the strategies and solutions of data backup and recovery, database system and network data backup and recovery, and analyzes and compares some mature technologies and solutions in the market. Fully understand data backup and recovery technology, master common data backup and disaster recovery strategies and solutions, and be familiar with some mature technologies and solutions in the market.
7, database security:
Based on the basic knowledge and typical system learning, this paper introduces the theory and technology of database security, including database security requirements, security precautions, security strategies, security evaluation standards and so on.
8, data file recovery technology:
This course systematically explains the relevant knowledge and practical technology of data storage technology, data backup and disaster recovery, introduces the strategies and solutions of data backup and recovery, database system and network data backup and recovery, and analyzes and compares some mature technologies and solutions in the market. Fully understand data backup and recovery technology, master common data backup and disaster recovery strategies and solutions, and be familiar with some mature technologies and solutions in the market.
9. Algorithm design and analysis:
This course first introduces the general concept of algorithm and the analysis method of algorithm complexity, aiming at enabling students to learn how to evaluate the quality of algorithm; Then it focuses on the commonly used algorithm design skills and the corresponding classical algorithms, aiming at helping students complete the role transformation from "programming" to "programming" and improving their ability to solve problems.
At the level of non-numerical calculation, students are required to have the ability to describe practical problems abstractly as mathematical models, and at the same time, to design effective algorithms for different problem objects and use typical methods to solve problems encountered in scientific research and practical application. And it has the ability to analyze the efficiency of the algorithm, and can scientifically evaluate the efficiency of related algorithms and processing methods.
(9) Information Security Course Introduction and Extended Reading:
Information security mainly includes the following five aspects: the need to ensure confidentiality, authenticity, integrity, unauthorized copying and the security of parasitic systems. Information security itself contains a wide range, including how to prevent the disclosure of secrets of commercial enterprises, prevent teenagers from browsing bad information, and disclose personal information.
The information security system under the network environment is the key to ensure information security, including computer security operating system, various security protocols, security mechanisms (digital signature, message authentication, data encryption, etc. ), and even security systems, such as UniNAC and DLP. As long as there are security loopholes, global security may be threatened.
Information security refers to the protection of information systems (including hardware, software, data, personnel, physical environment and its infrastructure) from being damaged, changed or leaked by accidents or malicious reasons, the system runs continuously and reliably, and the information service is uninterrupted, so as to finally realize business continuity.
Information security discipline can be divided into two levels: narrow security and broad security:
Security in a narrow sense is the field of computer security based on cryptography, which is usually used as a benchmark by early information security majors in China, supplemented by computer technology, communication network technology and programming.
Information security in a broad sense is a comprehensive subject. From traditional computer security to information security, it is not only a change of name, but also an extension of security development. Safety is not a purely technical issue, but a product of the combination of management, technology, law and other issues.
This major trains senior information security professionals who can engage in computer, communication, e-commerce, e-government and e-finance.