Cyberspace Security
Starting Date | September 2023 |
---|---|
Degree Awarded | Master |
Tuition Fee: | 38000 RMB/year |
Language | English |
Duration of Study | 3 Years |
Application Fee | 300 USD |
Course Introduction | ||||||||||||||||||||||||||||||||||||||||||||||||||||
I Cultivation Objectives Cultivate specialized talents in the field of cyberspace security with all-round development in moral, intellectual and physical development. Students are required to master the basic theories and systematic expertise of cyberspace security, to understand the development status, trends and research frontiers of the disciplines; to master a foreign language proficiently, to have good writing skills and to conduct international academic exchanges; to be able to do scientific research in this discipline and related disciplines or undertake specialized technical work independently, capable of using the methods, techniques and tools of cyberspace security disciplines, capable of engaging in basic research, applied research, and the analysis, design, development and management of key technologies and systems in the field of cyberspace security. II Discipline and Research Direction The cyberspace security discipline has four disciplines: system security and trusted computing, network security, cryptography, big data analytics, and artificial intelligence 1. System Security and Trusted Computing Investigate the basic principles, methods and techniques of the design, implementation, and security test evaluation of computing systems in cyberspace, to ensure the physical security and operational security of chips, system software and computing systems, and to improve the ability of computer systems defending against the malicious codes. 2. Network Security Investigate the principles, techniques, and methods for various threats and protections faced by network devices, communication links, network services, and management in cyberspace, involving multiple phases of network security incidents including prevention, monitoring, emergency response, recovery, and forensics analysis. 3. Cryptography Investigate data protection methods and techniques to protect data information and identities from being stolen, falsified, modified, destroyed, and repudiated in the process of generating, storing, processing, transmitting, and displaying, to ensure the confidentiality, authenticity, integrity, availability and non-repudiation of information. 4. Big Data Analysis and Artificial Intelligence Investigate the acquisition, understanding, analysis, response, and security management of information content in cyberspace.
III Culture Method Take a collective cultivation union way of the mentorship, supervisor responsibility system and the mentoring group. Supervisors should be fully concerned about students' political thought, moral quality, professional study and scientific research practice. Within one month after entering the school, the supervisor shall guide the students to work out a reasonable personal cultivation plan according to the requirements of the cultivation program and the principle of teaching students in accordance with their aptitude, including specific arrangements for course learning, practical activities, academic activities, scientific research and dissertation work. Master's students must complete the scientific research work prescribed by their supervisors, and focus on cultivating their ability to analyze and solve problems independently through courses, scientific research, dissertation and other forms.
IV The Academic System and the Length of Study The three-year system is limited to a maximum of four years.
V The Curriculum 1. Credit Requirements The master's degree in this subject should be no less than 32 credits in which the major course credits are not less than 30 and the Internship practice holds 2 credits.
VI Compulsory Links 1. Mid-term Examination The cultivation unit shall organize a mid-term assessment defense meeting to conduct a mid-term assessment of the ideological and political, curriculum, and scientific research capabilities of the master's students. Those who have not passed the assessment will start the early warning mechanism, and those who have not passed the mid-term assessment for the second time will be dismissed. 2. The Scientific Research Training In principle, master students should participate in at least one subject research under the guidance of a supervisor and experience basic research and practice training.
VII Thesis 1. Thesis Topic The topic should be closely combined with the needs of the development of the discipline and the national economic and social construction. It requires a certain theoretical innovation and application value and is approved by the supervisor. 2. Opening Report After the topic is selected, the student shall draw up a writing plan. At the end of the fourth semester or the beginning of the fifth semester, the opening report should be conducted in the grade or steering group (including no less than 3 teachers with the supervisor and no less than 2 associate professors). After the discussion and adoption by the steering group, the collection of materials, thematic research and the writing of the thesis can be formally carried out. 3. Paper Writing After the opening report is completed, it should enter the paper writing stage under the guidance of the supervisor for a period of not less than one year. After the dissertation is completed and reviewed by the steering group, the thesis should be submitted to 2 reviewers for review one month before the thesis defense. The reviewer must be a peer expert with a professor, associate professor or equivalent title. Only the thesis with review opinions of Qualified and above are eligible to enter the defense section of the thesis. Quality requirements of the thesis: Master's thesis should meet the quality requirements in the following five aspects. (1) The title of the master's thesis has a clear research background and should have certain theoretical significance or application value. (2) Literature review should clearly describe and analyze the engineering and technical issues or research topics involved in the topic, and the literature review is appropriate; (3) The master's thesis should comprehensively apply basic theories, scientific methods, expertise and technical means to analyze and solve the scientific research problems or practical problems. The thesis should have new insights, correct basic views, sufficient arguments, reliable data, sufficient research or experimental work; (4) The master's thesis should reflect that the master's degree candidates have mastered the basic theories, special knowledge, scientific research methods and experimental skills in this research direction, and have the ability to independently conduct scientific research or undertake engineering technology; (5) The master's thesis writing requirements should be clear in concept, reasonable in structure, clear in hierarchy, logical in logic, fluent in science and technology, and in line with scientific writing standards. 4. Publication The master's degree candidates of this subject should complete the course study and complete the credits during their studies; complete the practice of the internship; participate in at least one subject research under the guidance of the supervisor; publish at least 1 professional paper or obtain corresponding research results, and the student should be the first author (or the supervisor is the first author and the student is the second author) and signed by the Wuhan University as the first completion unit. 5. Thesis Defense The thesis defense is conducted in May of the sixth semester. The thesis defense committee consists of 5 members (the chairman of the defense committee should be a professor). With the approval of more than two-thirds (including two-thirds) of all members, the defense of the thesis is passed.
Program Schedule
*The above information is for reference only. |