Seoul, South Korea
Area of Study
Information Sciences, Information Technologies
Taught In English
Course Level Recommendations
ISA offers course level recommendations in an effort to facilitate the determination of course levels by credential evaluators.We advice each institution to have their own credentials evaluator make the final decision regrading course levels.
Recommended U.S. Semester Credits3
Recommended U.S. Quarter Units4
Hours & Credits
The objectives of this class are to study principles, mechanisms, and implementations of computer security.
We will discuss various attack techniques, how to defend against them, and more importantly, how to design a system to withstand them. Topics include malicious codes, intrusion detection and responses, access control, secure programming, elementary cryptography and its applications.
Stalling and Brown, "Computer Security: Principles and Practice," 2nd Ed, Prentice Hall, Nov. 2011
Courses and course hours of instruction are subject to change.
Eligibility for courses may be subject to a placement exam and/or pre-requisites.
Credits earned vary according to the policies of the students' home institutions. According to ISA policy and possible visa requirements, students must maintain full-time enrollment status, as determined by their home institutions, for the duration of the program.
Please reference fall and spring course lists as not all courses are taught during both semesters.
Availability of courses is based on enrollment numbers. All students should seek pre-approval for alternate courses in the event of last minute class cancellations