±³°ú¸ñ °³¿ä
HOME -
Çлç¾È³» -
±³°ú¸ñ °³¿ä
¹øÈ£ |
°ú¸ñ¸í(ÇѱÛ/¿µ¹®) |
ÇÐÁ¡-ÀÌ·Ð-½Ç½À |
¹øÈ£ |
°ú¸ñ¸í(ÇѱÛ/¿µ¹®) |
ÇÐÁ¡-ÀÌ·Ð-½Ç½À |
1 |
ÇÁ·Î±×·¡¹Ö±âÃÊ (Basic Programming) |
3-2-2 |
18 |
ÄÄÇ»Åͳ×Æ®¿öÅ© (Computer Network) |
3-2-1 |
2 |
»ç¹°ÀÎÅͳݱâÃʹ×È°¿ë (Internet of Things Basic and Application) |
3-2-2 |
19 |
AIº¸¾È¾Ë°í¸®Áò |
3-2-1 |
3 |
ÇÁ·Î±×·¡¹Ö½ÉÈ (Intensive Programming) |
3-2-2 |
20 |
¼¹ö½Ã½ºÅÛ±¸¼º¹×¿î¿µ |
3-2-1 |
4 |
»ç¹°ÀÎÅͳݿ¹×½Ç½À (Internet of Things Operation and Practice) |
3-2-2 |
21 |
µðÁöÅÐÆ÷·»½Ä (Digital Forensics) |
3-2-1 |
5 |
°í±ÞÇÁ·Î±×·¡¹Ö (High-level Programming) |
3-2-2 |
22 |
½Ã½ºÅÛº¸¾ÈÇÁ·Î±×·¡¹Ö (System Security Programming) |
3-2-2 |
6 |
Á¤º¸º¸È£ÀÌ·Ð (Information Security) |
3-3-0 |
23 |
³×Æ®¿öÅ©º¸¾È°ü¸® (Network Security Management) |
3-2-1 |
7 |
³×Æ®¿öÅ©ÇÁ·ÎÅäÄݺм® (Analysis of Network Protocols) |
3-2-1 |
24 |
Á¤º¸½Ã½ºÅÛ±¸Ãà |
3-2-1 |
8 |
Ŭ¶ó¿ìµå½Ã½ºÅÛº¸¾È (Cloud System Security) |
3-2-1 |
25 |
¾ÏÈ£ÈÇÁ·Î±×·¡¹Ö (Encryption Programming) |
3-2-1 |
9 |
¾ÏÈ£ÇÐ (Cryptography) |
3-2-1 |
26 |
ĸ½ºÅæµðÀÚÀÎ1 (Capstone Design 1) |
3-2-2 |
10 |
µ¥ÀÌÅͺ£À̽ºº¸¾È (Database Security) |
3-2-1 |
27 |
ºòµ¥ÀÌÅͺ¸¾È (Big-data Security) |
3-2-1 |
11 |
³×Æ®¿öÅ©º¸¾ÈÇÁ·Î±×·¡¹Ö (Network Security Programming) |
3-2-2 |
28 |
¾îÇø®ÄÉÀ̼Ǻ¸¾È (Application Security) |
3-2-1 |
12 |
ÆÄÀϽýºÅÛº¹±¸ (File System Recovery) |
3-2-1 |
29 |
Á¤º¸º¸È£ÇÁ·ÎÁ§Æ® |
3-2-1 |
13 |
¿î¿µÃ¼Á¦º¸¾È (Operating System Security) |
3-2-1 |
30 |
ĸ½ºÅæµðÀÚÀÎ2 (Capstone Design 2) |
3-2-2 |
14 |
³×Æ®¿öÅ©¼³°è¹×½Ç½À (Network Design and Experiments) |
3-2-1 |
31 |
ÇØÅ·¹×¸ðÀÇħÅõ (Hacking and Penetration Testing) |
3-2-1 |
15 |
º¸¾ÈÇÁ·Î±×·¡¹Ö (Secure Programming) |
3-2-2 |
32 |
³×Æ®¿öÅ©Æ÷·»½Ä (Network Forensics) |
3-2-1 |
16 |
IoTº¸¾È°³·Ð |
3-2-1 |
33 |
ºòµ¥ÀÌÅͺм® (Big Data Analysis) |
2-1-2 |
17 |
ÄÄÇ»ÅͽýºÅÛ±¸Á¶ (Computer System Architecture) |
3-2-1 |
34 |
|
|