Á¦¸ñ | Bachelor of science in Cyber Security | ||
---|---|---|---|
ÀÛ¼ºÀÚ | °ü¸®ÀÚ | ÀÛ¼ºÀÏ | 2019-03-19 |
|
EDITH COWAN UNIVERSITY 1991³â ¼³¸³µÈ ¿¡µð½ºÄÚ¿Ï´ëÇб³´Â, È£ÁÖ ±¹°ø¸³´ëÇÐÀ¸·Î¼ ¿ì¼öÇÑ Çлý¸¸Á·°ú ±¹Á¦ÀûÀÎ ¿¬±¸ ¼º°ú·Î ÀÎÇØ ¸Å¿ì ºü¸£°Ô ¼ºÀåÇÏ°í ÀÖ´Â ´ëÇÐÀÔ´Ï´Ù. Australian Computer Society(ACS, È£ÁÖ ÄÄÇ»ÅÍ Çùȸ)·ÎºÎÅÍ ÇÐÁ¡ ÀÎÁõÀ» ¹Þ¾ÒÀ¸¸ç, ACS ÀÇ º¸¾È Àü¹® ¼¾Å͸¦ ¿î¿µ ÁßÀÌ°í, È£ÁÖ ¿¬¿¬¹æ Á¤ºÎ·ÎºÎÅÍ Academic Centre of Cyber Security Excellence(ACCSE, ÃÖ°í»çÀ̹öº¸¾È ¾ÆÄ«µ¥¹Í¼¾ÅÍ)·Î ÀÎÁ¤ ¹Þ¾Æ ¿¬¿¬¹æ Á¤ºÎÀÇ ÀÚº»À¸·Î ¼³¸³µÈ Cyber Security Cooperative Research Centre(»çÀ̹öº¸¾È Çùµ¿ ¿¬±¸ ¼¾ÅÍ)ÀÇ º»ºÎ¸¦ ¿î¿µÇÏ°í ÀÖ½À´Ï´Ù. ¶ÇÇÑ, ¿¡µð½ºÄÚ¿Ï´ëÇб³ÀÇ Security Research Institute(SRI, º¸¾È ¿¬±¸ ±â°ü)´Â ¼¼°è ÃÖ°íÀÇ µðÁöÅÐ º¸¾È ¹× »çÀ̹ö¹üÁË(Æ÷·»Á÷) Àü¹® ±â°üÀ¸·Î, The Australian Government's Quality Indicators for Learning and Teaching(QILT, È£ÁÖ Á¤ºÎ ±³¼öÇнÀ Ç°Áú ÁöÇ¥)¿¡¼ È£ÁÖ ³» ¸ðµç ±¹°ø¸³´ëÇÐ Áß student experience ºÎ¹® ÃÖ°íÁ¡À» ¹Þ±âµµ ÇÏ¿´½À´Ï´Ù. |
Bachelor of Science in Cyber Security
º» Çаú´Â Çö½Ã´ë °¡Àå Áß¿äÇÑ Å° ¼½ÅÍÀÎ »çÀ̹ö º¸¾ÈÀ» ÁßÁ¡ÀûÀ¸·Î ÇнÀÇÏ´Â ÄÚ½º·Î¼, °è¼ÓÇؼ ±ÞÁõ ÁßÀÎ »çÀ̹ö ¹üÁË¿Í ¿Â¶óÀÎ À§Çù, µðÁöÅÐ »ê¾÷ µîÀ» ´Ù·ç±â ¶§¹®¿¡ Ãë¾÷ÀÇ ±âȸ°¡ °¡Àå ¼ö¿ùÇÒ °ÍÀ¸·Î ÆǴܵǴ Çаúµé Áß ÇϳªÀÔ´Ï´Ù. ÀÌ·Ð ¹× ½Ç½À, IT ºÐ¾ß¿¡¼ ½ÇÁ¦·Î Àû¿ëµÇ´Â ½Ç¿ëÀûÀÎ ÇÁ·Î±×·¥À» ´Ù·ç¸ç ³×Æ®¿öÅ© Àü¹®°¡ ¾ç¼º¿¡ ¸ñÀûÀ» µÎ°í ÀÖ½À´Ï´Ù.
¡ß º»±³ ¼ö»ó °æ·Â
- Top 87th University in the Asia-Pacific(Times Higher Education Asia-Pacific University Ranking 2018)
- Top 150 Young University int he WOrld(Times Higher Education Young Universities Ranking 2018 & QS Top 50 Under 50 2019)
- Rated 5 Stars for Overall Experience, Teaching Quality, Skills Development, Student Support, Learning Resources and Starting Salary(Good Universities Guide 2019)
- Accredited by China's Ministry of Education(MOE)
¡ß ÇÁ·Î±×·¥ ±¸Á¶
- ÃÑ 24 °ú¸ñ
- ÃÑ 4Çбâ
¡ß ÇÁ·Î±×·¥ °³¿ä
Modules
Professional Science Essentials
Programming Principles
Computer Fundamentals
Systems Analysis
Applied Communications
Computer Security
Operating Systems
Systems and Database Designs
Cryptographic Concepts
Introduction to Information Warfare
UNIX and C
Information Security
Database Defence
Project Methods and Professionalism
Software Reverse Engineering
Computer Forensics
Applications Development
Network Security Fundamentals
Programming Secure Software Systems
IT Security Management
Wireless Security
Applied IT Project
Applied IT Project 2
Threat Detection Systems
¡ß Æò°¡ ¹× ½ÃÇè
- ½ÇÇè °úÁ¦, ½ÃÇè, ÇÁ·ÎÁ§Æ®, ±×¸®°í ±â¸»°í»ç µîÀÌ Çлý Æò°¡ ±âÁØ¿¡ Æ÷ÇԵ˴ϴÙ.
¡ß ±â°£
º» ÇÁ·Î±×·¥ ÃÖ¼Ò 16°³¿ùÀÌ ¼Ò¿äµË´Ï´Ù.