Class

Teaching and Guiding through lectures.

(F054) Information Security


In this course, the main purpose of security is to consider the topic of information protection/information security as a flow for students in the cybersecurity department, and to develop a person-centered macro view and have a vision, not an approach as a technology. The goal is to provide students in the software department and other IT-related departments whose main purpose is not security, with an introduction to the major and an understanding of cybersecurity in general before taking courses in cybersecurity majors.


(F022) Digital Forensics


In this course, covers security systems based on software, security technology for web based operating system platforms and wireless communication softwares, and application services and contents security. Students will improve overall basic and application ability for software security by studying software security technology and issues in embedded Linux, mobile operating systems like Android, applications on NFC and Wifi, clients and mobile Web, and mobile devices. This Lab covers software security systems experiment, security experiments for web based operating system platforms and wireless communication softwares, and application services and contents security experiments. Students will improve design and application ability for software security by experimenting on software security technology and issues in embedded Linux, mobile operating systems like Android, applications on NFC and Wifi, clients and mobile Web, and mobile devices.


(F033) Cyber Security Capstone Design


In this course, comprehensively utilizes the major knowledge and design skills gained in the undergraduate course and evaluates learning outcomes. It focuses on acquiring the ability to participate as a core development manpower in the industry after graduation while experiencing the development process such as problem definition, component design, implementation, and evaluation. In particular, students improve their collaboration skills through team-level projects and learn creative problem solving methods using TRIZ. Through this course, students will develop their skills that can be applied directly to the field and gain extensive experience to prepare for work in the field.


(F030) Undergraduate Research I


In this course, each student conducts graduate-level research while being supervised by a professor who provides a research topic and having a weekly meeting. It is required to survey prior art of the topic, analyze it, derive a new method, and verify the proposed one by experimental results. Final results should be presented in the final workshop as well as in the final report. It is recommended to submit a paper to any international/domestic conference.



In this course, deals with information security career design and career path. It is intended to provide guidelines for preparing for the selection, comparison, and activities of the subject you need in earnest. To this end, special lectures on career guidance are conducted in cooperation with the University Job Center, and at the same time, special lectures are conducted by recruiting department professors and external experts in consideration of the characteristics of the department. Finally, it invites graduates to share their career exploration and design experiences in university.


Advanced Information Security


In this course deals with fundamental security concepts, techniques and services. Thus this course will provide a comprehensive introduction and study into a broad selection of contemporary information security issues, concepts and policies. Through out this Lab, students will covers basic lectures on Linux Security, Web Security, Network Security and Digital Forensics

Lab 1 : Linux Basics (Ubuntu)

  • Installation Of Linux (Ubuntu) on VMware
  • Introduction to Linux
  • Basic Linux Commands

Lab 2 : OWASP Vulnerabilities with WebGoat

  • What is OWASP and Top ten Vulnerabilities
  • OWASP Top Ten Vulnerabilities Test Bed : WebGoat
  • Installation of WebGoat
  • How to use WebGoat
  • Hands on Practice - Buffer Overflow

Lab 3 : Linux Kernel Module & LSM (Under Construction)

  • What is Linux Kernel Module
  • How to Compile Linux Kernel
  • Introduction to LSM

Lab 4 : Network Packet Capture : Wireshark

  • Introduction to Wireshark
  • How to Capture Packets
  • Introducing Filtering Feature
  • How to use Statistics Feature of Wireshark

Lab 5 : OS Fingerprinting

  • What is Operating System Fingerprinting
  • OS Fingerprinting Techniques
  • How to use p0f (OS Fingerprinting Tool)

Lab 6 : Intrusion Detection System

  • What is Intrusion Detection System (IDS)
  • Introducing Intrusion Detecting Techniques
  • How to use Snort (IDS Tool)

Lab 7 : DataMining Tool : WEKA

  • What is WEKA
  • How to use Datamining Techniques
  • How to use WEKA for each Techniques

Lab 8 : Memory Forensics

  • Introduction to Memory Forensics
  • Memory Forensic Process
  • Capture and Analyze Memory Dump

Lab 9 : Forensic Framework : Encase

  • What is Encase
  • How to use Encase
  • Hands on Practice

Lab 10 : Steganography

  • What is Steganography
  • How to Conceal Data
  • How to Use Steganography Tool
  • Case Study
  • Problem from Cryptography Contest (Stegano Problem)

Lab 11 : Web Browser Forensics

  • What is Web Browser Forensics
  • Web Forensic Tool Experiment