Mainly study computer hardware foundation, computer network technology, programming foundation, database technology, Web application development, information security standards and regulations, information security technology and implementation, operating system security, network equipment configuration and security, information security product configuration and application and other courses.
I. Information Technology Security Application Specialty
1, professional basic courses: computer hardware foundation, computer network technology, programming foundation, database technology, Web application development, information security standards and regulations, information security technology and implementation.
2. Professional core courses: operating system security, network equipment configuration and security, information security product configuration and application, data storage and disaster recovery, Web application security and protection, electronic data forensics technology application, information security risk assessment.
Second, the training objectives
This major cultivates all-round development of morality, intelligence, physique and aesthetics, and has a solid scientific and cultural foundation and knowledge of network security, computer network, database, programming and related laws and regulations, and has the abilities of data storage and disaster tolerance, network security infiltration and network security protection. , with craftsman spirit and information literacy, can engage in network security management, network security operation and maintenance, data backup and recovery.
Third, the employment direction and prospects
1, information security engineer
As an information security engineer, you can be responsible for designing, implementing and maintaining information security measures, including network security, data encryption, firewall and intrusion detection system. With the increasing demand of enterprises and organizations for information security, the employment demand of information security engineers is also increasing.
2. Securities analysts
Security analysts are responsible for analyzing and evaluating the security risks of information systems and providing solutions and suggestions. They can be employed by the enterprise's information security team, security consulting company or security service provider.
3. Security Advisor
As a security consultant, you can provide information security strategy, risk assessment and compliance consulting services for enterprises. Security consultants can be employed by security consulting companies, IT service companies or independent consulting companies.