Course Name | Chinese | 网络与信息安全技术 | ||||||||||||
English | The Security Technologies of Network and Information | |||||||||||||
Course Number | Type of Degree | Ph. D | Master | √ | ||||||||||
Total Credit Hours | 36 | In Class Credit Hours | 30 | Credit | 2 | Practice | Computer-using Hours | |||||||
Course Type |
| |||||||||||||
School (Department) | School of Electrical Engineering | Term | Autumn | |||||||||||
Examination |
C.□Paper-oral Combination D.√ OthersLarge-scale homework | |||||||||||||
Chief Lecturer | Name | Xie jihua | Professional Title | Associate Professor | ||||||||||
Website | ||||||||||||||
Teaching Language used in Course | Chinese | Teaching Material Website | ||||||||||||
Applicable Range of Discipline | Electrical Engineering | Name of First-Class Discipline | Electrical Engineering | |||||||||||
Number of Experiment | Preliminary Courses | The Principle of Computer Network,C Language Programming | ||||||||||||
Teaching Books | Textbook Title | Author | Publisher | Year of Publication | Edition Number | |||||||||
Main Textbook | The Security Technologies of Network and Information | Zhu shangming | East China University of Science & Technology Press | 2009.1. | 1 | |||||||||
Main Reference Books | The Security of Computer Network | Liu yunming | Qinghua University Press | 2006 | 1 | |||||||||
The principle、algorithm & protocol of Network security | Man Young Rhee | Qinghua University Press | 2007 | 1 | ||||||||||
I.Course Introduction (including teaching goals and requirements) within 300 words:
The course is mainly about the security function of network system and the security protection technology of network and information, which including data encryption, network entity security, the security of network operating system, firewall and VPN, inbreak inspecting and defense, database and data security and otherwise.
According to the course, students could get the systematic understanding of computer network and information security, command the applied principle of network and information security, practical skills of network security function and information security protection.
II.Teaching Syllabus (including the content of chapters and sections. A sheet can be attached):
The course has nine chapters, with two main parts of classroom teaching and broad work .The teaching content and demand are as follows:
1. The overview of computer network and network security
Introduce the basic concept of computer network, network architecture, network security model and network security evaluation criteria.
2. Data encryption and authentication
Introduce several password system of Data encryption, highlight related technologies of PKI system.
3. The Security of network
Introduce interrelated moving security environment of Physical layer, including Temperature, humidity, electromagnetic radiation, grounding, lightning protection, fire protection, backup and so on.
4. The system security of network operating
Introduce the operating system, which is general about Windows, Unix and Linux, lead into the basic concept of Trusted Computer.
5. The security of Internet
Introduce IPSec , the security of Web and email.
6. The inspecting and defense of computer viruses
Introduce the development and defense of computer viruses.
7. Firewall and Virtual Private Network
Introduce commonly technology of firewall and VPN.
8. Inbreak inspecting and defense
Introduce commonly intrusions and defense methods
9. Database and data security
Introduce the security model, encryption technology of database , and other security questions.
III.Teaching Schedule:
Week | Course Content | Teaching Method |
1 | The overview of computer network and network security | Lectures |
2 | Data encryption and authentication | Lectures |
3 | The Security of network | Lectures |
4 | The system security of network operating | Lectures |
5 | The security of Internet | Lectures |
6 | The inspecting and defense of computer viruses | Lectures |
7 | Firewall and virtual Private network | Lectures |
8 | In break inspecting and defense | Lectures |
9 | Database and data security | Lectures |
10 |


