Á¦¸ñ Bachelor of science in Cyber Security  
ÀÛ¼ºÀÚ °ü¸®ÀÚ ÀÛ¼ºÀÏ 2019-03-19


http://www.ecu.edu.au

EDITH COWAN UNIVERSITY

1991³â ¼³¸³µÈ ¿¡µð½ºÄÚ¿Ï´ëÇб³´Â, È£ÁÖ ±¹°ø¸³´ëÇÐÀ¸·Î¼­ ¿ì¼öÇÑ Çлý¸¸Á·°ú ±¹Á¦ÀûÀÎ ¿¬±¸ ¼º°ú·Î ÀÎÇØ ¸Å¿ì ºü¸£°Ô ¼ºÀåÇÏ°í ÀÖ´Â ´ëÇÐÀÔ´Ï´Ù.

Australian Computer Society(ACS, È£ÁÖ ÄÄÇ»ÅÍ Çùȸ)·ÎºÎÅÍ ÇÐÁ¡ ÀÎÁõÀ» ¹Þ¾ÒÀ¸¸ç, ACS ÀÇ º¸¾È Àü¹® ¼¾Å͸¦ ¿î¿µ ÁßÀÌ°í, È£ÁÖ ¿¬¿¬¹æ Á¤ºÎ·ÎºÎÅÍ Academic Centre of Cyber Security Excellence(ACCSE, ÃÖ°í»çÀ̹öº¸¾È ¾ÆÄ«µ¥¹Í¼¾ÅÍ)·Î ÀÎÁ¤ ¹Þ¾Æ ¿¬¿¬¹æ Á¤ºÎÀÇ ÀÚº»À¸·Î ¼³¸³µÈ Cyber Security Cooperative Research Centre(»çÀ̹öº¸¾È Çùµ¿ ¿¬±¸ ¼¾ÅÍ)ÀÇ º»ºÎ¸¦ ¿î¿µÇÏ°í ÀÖ½À´Ï´Ù.

¶ÇÇÑ, ¿¡µð½ºÄÚ¿Ï´ëÇб³ÀÇ Security Research Institute(SRI, º¸¾È ¿¬±¸ ±â°ü)´Â ¼¼°è ÃÖ°íÀÇ µðÁöÅÐ º¸¾È ¹× »çÀ̹ö¹üÁË(Æ÷·»Á÷) Àü¹® ±â°üÀ¸·Î, The Australian Government's Quality Indicators for Learning and Teaching(QILT, È£ÁÖ Á¤ºÎ ±³¼öÇнÀ Ç°Áú ÁöÇ¥)¿¡¼­ È£ÁÖ ³» ¸ðµç ±¹°ø¸³´ëÇÐ Áß student experience ºÎ¹® ÃÖ°íÁ¡À» ¹Þ±âµµ ÇÏ¿´½À´Ï´Ù.

 

Bachelor of Science in Cyber Security

º» Çаú´Â Çö½Ã´ë °¡Àå Áß¿äÇÑ Å° ¼½ÅÍÀÎ »çÀ̹ö º¸¾ÈÀ» ÁßÁ¡ÀûÀ¸·Î ÇнÀÇÏ´Â ÄÚ½º·Î¼­, °è¼ÓÇؼ­ ±ÞÁõ ÁßÀÎ »çÀ̹ö ¹üÁË¿Í ¿Â¶óÀÎ À§Çù, µðÁöÅÐ »ê¾÷ µîÀ» ´Ù·ç±â ¶§¹®¿¡ Ãë¾÷ÀÇ ±âȸ°¡ °¡Àå ¼ö¿ùÇÒ °ÍÀ¸·Î ÆǴܵǴ Çаúµé Áß ÇϳªÀÔ´Ï´Ù. ÀÌ·Ð ¹× ½Ç½À, IT ºÐ¾ß¿¡¼­ ½ÇÁ¦·Î Àû¿ëµÇ´Â ½Ç¿ëÀûÀÎ ÇÁ·Î±×·¥À» ´Ù·ç¸ç ³×Æ®¿öÅ© Àü¹®°¡ ¾ç¼º¿¡ ¸ñÀûÀ» µÎ°í ÀÖ½À´Ï´Ù.

 

 

¡ß º»±³ ¼ö»ó °æ·Â
- Top 87th University in the Asia-Pacific(Times Higher Education Asia-Pacific University Ranking 2018)

- Top 150 Young University int he WOrld(Times Higher Education Young Universities Ranking 2018 & QS Top 50 Under 50 2019)

- Rated 5 Stars for Overall Experience, Teaching Quality, Skills Development, Student Support, Learning Resources and Starting Salary(Good Universities Guide 2019)

- Accredited by China's Ministry of Education(MOE)

 

 

¡ß ÇÁ·Î±×·¥ ±¸Á¶
- ÃÑ 24 °ú¸ñ
- ÃÑ 4Çбâ

 

 

¡ß ÇÁ·Î±×·¥ °³¿ä

Modules

  • Professional Science Essentials

  • Programming Principles

  • Computer Fundamentals

  • Systems Analysis

  • Applied Communications

  • Computer Security

  • Operating Systems

  • Systems and Database Designs

  • Cryptographic Concepts

  • Introduction to Information Warfare

  • UNIX and C

  • Information Security

  • Database Defence

  • Project Methods and Professionalism

  • Software Reverse Engineering

  • Computer Forensics

  • Applications Development

  • Network Security Fundamentals

  • Programming Secure Software Systems

  • IT Security Management

  • Wireless Security

  • Applied IT Project

  • Applied IT Project 2

  • Threat Detection Systems

 

 

¡ß Æò°¡ ¹× ½ÃÇè
- ½ÇÇè °úÁ¦, ½ÃÇè, ÇÁ·ÎÁ§Æ®, ±×¸®°í ±â¸»°í»ç µîÀÌ Çлý Æò°¡ ±âÁØ¿¡ Æ÷ÇԵ˴ϴÙ.

 

 

¡ß ±â°£
º» ÇÁ·Î±×·¥ ÃÖ¼Ò 16°³¿ùÀÌ ¼Ò¿äµË´Ï´Ù.