±³°ú¸ñ °³¿ä
HOME - Çлç¾È³» - ±³°ú¸ñ °³¿ä
¹øÈ£
°ú¸ñ¸í(ÇѱÛ/¿µ¹®)
ÇÐÁ¡-ÀÌ·Ð-½Ç½À
¹øÈ£
°ú¸ñ¸í(ÇѱÛ/¿µ¹®)
ÇÐÁ¡-ÀÌ·Ð-½Ç½À
1
ÇÁ·Î±×·¡¹Ö±âÃÊ
(Basic Programming)
3-2-2
18
ÄÄÇ»Åͳ×Æ®¿öÅ©
(Computer Network)
3-2-1
2
»ç¹°ÀÎÅͳݱâÃʹ×È°¿ë
(Internet of Things Basic and Application)
3-2-2
19
AIº¸¾È¾Ë°í¸®Áò
3-2-1
3
ÇÁ·Î±×·¡¹Ö½ÉÈ­
(Intensive Programming)
3-2-2
20
¼­¹ö½Ã½ºÅÛ±¸¼º¹×¿î¿µ
3-2-1
4
»ç¹°ÀÎÅͳݿ¹×½Ç½À
(Internet of Things Operation and Practice)
3-2-2
21
µðÁöÅÐÆ÷·»½Ä
(Digital Forensics)
3-2-1
5
°í±ÞÇÁ·Î±×·¡¹Ö
(High-level Programming)
3-2-2
22
½Ã½ºÅÛº¸¾ÈÇÁ·Î±×·¡¹Ö
(System Security Programming)
3-2-2
6
Á¤º¸º¸È£ÀÌ·Ð
(Information Security)
3-3-0
23
³×Æ®¿öÅ©º¸¾È°ü¸®
(Network Security Management)
3-2-1
7
³×Æ®¿öÅ©ÇÁ·ÎÅäÄݺм®
(Analysis of Network Protocols)
3-2-1
24
Á¤º¸½Ã½ºÅÛ±¸Ãà
3-2-1
8
Ŭ¶ó¿ìµå½Ã½ºÅÛº¸¾È
(Cloud System Security)
3-2-1
25
¾ÏȣȭÇÁ·Î±×·¡¹Ö
(Encryption Programming)
3-2-1
9
¾ÏÈ£ÇÐ
(Cryptography)
3-2-1
26
ĸ½ºÅæµðÀÚÀÎ1
(Capstone Design 1)
3-2-2
10
µ¥ÀÌÅͺ£À̽ºº¸¾È
(Database Security)
3-2-1
27
ºòµ¥ÀÌÅͺ¸¾È
(Big-data Security)
3-2-1
11
³×Æ®¿öÅ©º¸¾ÈÇÁ·Î±×·¡¹Ö
(Network Security Programming)
3-2-2
28
¾îÇø®ÄÉÀ̼Ǻ¸¾È
(Application Security)
3-2-1
12
ÆÄÀϽýºÅÛº¹±¸
(File System Recovery)
3-2-1
29
Á¤º¸º¸È£ÇÁ·ÎÁ§Æ®
3-2-1
13
¿î¿µÃ¼Á¦º¸¾È
(Operating System Security)
3-2-1
30
ĸ½ºÅæµðÀÚÀÎ2
(Capstone Design 2)
3-2-2
14
³×Æ®¿öÅ©¼³°è¹×½Ç½À
(Network Design and Experiments)
3-2-1
31
ÇØÅ·¹×¸ðÀÇħÅõ
(Hacking and Penetration Testing)
3-2-1
15
º¸¾ÈÇÁ·Î±×·¡¹Ö
(Secure Programming)
3-2-2
32
³×Æ®¿öÅ©Æ÷·»½Ä
(Network Forensics)
3-2-1
16
IoTº¸¾È°³·Ð
3-2-1
33
ºòµ¥ÀÌÅͺм®
(Big Data Analysis)
2-1-2
17
ÄÄÇ»ÅͽýºÅÛ±¸Á¶
(Computer System Architecture)
3-2-1
34
 
 


TOP
TOP