Model Course Plans
We train highly specialised engineers and practitioners who are responsible for solving real-world information security problems from a broad perspective, and creative researchers who will lead the way in the future.
Example Modules for Mathematical Science Course
Information Security Presentation Exercise I (2 credits) [full year] / Information Security Special Lectures (2 credits) / Cryptography, Authentication, and Social Systems (2 credits) / Cryptographic Protocol (2 credits) / Introduction to Algorithms (2 credits) / Introduction to Number Theory (2 credits) / Quantum Computation and Cryptography (2 credits) / AI and Machine Learning (2 credits) / Identification and Privacy Protection (2 credits) / Statistical Methodology (2 credits) / Decision Making under Uncertainty (2 credits) / Information Security Technical Exercises I (2 credits) / Research Guidance (6 credits)
Total30credits
Example Modules for Cyber Security and Governance Course
Information Security Presentation Exercise I (2 credits) [full year] / Information Security Special Lectures (2 credits) / Cryptography, Authentication, and Social Systems (2 credits) / Identification and Privacy Protection (2 credits) / Mass Media and Risk Management (2 credits) / Cyber Security Technology (2 credits) / Information System Architecture (2 credits) / Information Security Technical Exercises I (2 credits) / Risk Management and Information Security (2 credits) / Law and Ethics in Information Security (2 credits) / Introduction to Legal Study (2 credits) / Legal Practice in Information Security (2 credits) / Research Guidance (6 credits)
Total30credits
Example Modules for System Design Course
Information Security Presentation Exercise I (2 credits) [full year] / Information Security Special Lectures (2 credits) / Network Design and Security Operations (2 credits) / Secure System Architecture (2 credits) / Information Device Technology (2 credits) / Information System Architecture (2 credits) / Operating Systems (2 credits) / Secure Programming and Secure OS (2 credits) / Programming (2 credits) / Software Design (2 credits) / Information Security Technical Exercises I (2 credits) / Introduction to Algorithms (2 credits) / Research Guidance (6 credits)
Total30credits
Example Modules for Security/Risk Management Course
Information Security Presentation Exercise I (2 credits) [full year] / Information Security Special Lectures (2 credits) / Risk Management and Information Security (2 credits) / Security System Audit (2 credits) / Security Management and Governance (2 credits) / Information Security Psychology (2 credits) / Organisational Behaviour and Information Security (2 credits) / Statistical Methodology (2 credits) / Presentations for Professionals (2 credits) / Law and Ethics in Information Security (2 credits) / Information Security Technical Exercises I (2 credits) / Cyber Security Technology (2 credits) / Research Guidance (6 credits)
Total30credits
Subject Category | Module Title | Category | Credits | Mathematical Science Course | Cyber Security and Governance Course | System Design Course | Security/Risk Management Course |
---|---|---|---|---|---|---|---|
Major Subjects | Information Security Presentation Exercise I | Required | 2 | ||||
Information Security Special Lectures | Required | 2 | |||||
Cryptography, Authentication, and Social Systems | Optional | 2 | |||||
Cryptographic Protocol | Optional | 2 | |||||
Introduction to Algorithms | Optional | 2 | |||||
Introduction to Number Theory | Optional | 2 | |||||
Quantum Computation and Cryptography | Optional | 2 | |||||
AI and Machine Learning | Optional | 2 | |||||
Practical IoT Security | Optional | 2 | |||||
Identification and Privacy Protection | Optional | 2 | |||||
Cyber Security Technology | Optional | 2 | |||||
Network Design and Security Operations | Optional | 2 | |||||
Secure System Architecture | Optional | 2 | |||||
Information Device Technology | Optional | 2 | |||||
Information System Architecture | Optional | 2 | |||||
Operating Systems | Optional | 2 | |||||
Secure Programming and Secure OS | Optional | 2 | |||||
Programming | Optional | 2 | |||||
Software Design | Optional | 2 | |||||
Information Security Technical Exercises I | Optional | 2 | |||||
Information Security Technical Exercises II | Optional | 2 | |||||
Security System Audit | Optional | 2 | |||||
Security Management and Governance | Optional | 2 | |||||
Risk Management and Information Security | Optional | 2 | |||||
Information Security Psychology | Optional | 2 | |||||
Organisational Behaviour and Information Security | Optional | 2 | |||||
Statistical Methodology | Optional | 2 | |||||
Decision Making under Uncertainty | Optional | 2 | |||||
Presentations for Professionals | Optional | 2 | |||||
Mass Media and Risk Management | Optional | 2 | |||||
Law and Ethics in Information Security | Optional | 2 | |||||
Introduction to Legal Study | Optional | 2 | |||||
Intellectual Property System | Optional | 2 | |||||
International Standards and Guidelines | Optional | 2 | |||||
Legal Practice in Information Security | Optional | 2 | |||||
Information Security Presentation Exercise II | Optional | 2 | |||||
Special Lectures | Optional | 2 | |||||
Special Exercises | Optional | 2 | |||||
Research Guidance | Research Guidance | Required | 6 |
The standard modules for each course are designed to help you choose a suitable curriculum to facilitate your studies. Please select one of the four courses according to your area of interest and research theme, then use this as a guide to choosing the specific modules for your course. Students whose research interests span more than one course, or who wish to acquire a broader knowledge, are free to take standard modules from other courses under the guidance of their supervisor.
A minimum of 20 credits (more than 10 modules) from the optional modules must be completed.
Period | Monday - Friday | Saturday |
---|---|---|
1 | 9:00 - 10:30 | 9:00 - 10:30 |
2 | 10:40 - 12:10 | 10:40 - 12:10 |
3 | 13:00 - 14:30 | 13:00 - 14:30 |
4 | 14:40 - 16:10 | 14:40 - 16:10 |
5 | 18:20 - 19:50 | 16:20 - 17:50 |
6 | 20:00 - 21:30 | - |
Copyright © INSTITUTE of INFORMATION SECURITY. All rights Reserved.