Distinctive Features of Curriculum and Course Listing

Distinctive features of our course

Our education is designed to provide a wide range of knowledge and skills in various fields related to information science, security technology, management and operation, legal system, and information ethics, in addtion to research guidance in accordance with the background of individuals to meet a large variety of social needs and situations.

Information security technologies and knowledge are based on IT-related interdisciplinary science rather than an independent discipline. In other words, related fields widely range over subjects from fundamental science such as electromagnetism and mathematical logic, to applied science such as computing technologies, operating systems, software engineerings, network engineerings, communication protocols, access controls, operation techniques, management techniques, organizational theories, laws, and ethics. Therefore, the curriculum is structured by four perspectives: technologies, managements and operations, legal systems, and information ethics. Additionally, highly detailed research guidance is provided to individuals depending on their background and career path.

Furthermore, master's program aims to enrich knowledge bases, requiring students to complete two compulsory subjects to learn a common image and to develop a broad vision about an overall picture of information security, and encouraging them to take basic classes of research writing and computer science. The doctral program provides a flexible study framework so that the students are encouraged to attend a part of the master's program to reinforce technical knowkedge for their research interest.

Course Listing


Division Title R/S Credit Required Credits
Two-year Master's Program One-year Master's Program Doctoral Program
Common Subjects Information Security Presentation Exercise I R2 2442-
Current Topics in Information Security R2
Cryptography, Authentication, and Social Systems S2
Cryptographic Protocol S2
Algorithms S2
Basic Number Theory S2
Theory of Cryptography S2
Computer Algebra S2
Individual Identification and Privacy Protection S2
Internet Technology S2
Illegal Access Technique S2
Network System Design and Operation Management S2
Secure System Architecture S2
Information Devices Technology S2
Information Systems Design S2
Operating Systems S2
Secure Programming and Secure Operating Systems S2
Programming S2
Software Design S2
Hands-on Hacking (Practical session of network security) S2
Information Security Management System S2
System Audit and Information Security Audit S2
Security Management and Business Administration S2
Risk Management S2
Organizational Behavior and Information Security S2
Statistical Research Methods S2
Law and Ethics in Information Security S2
Introduction to Legal Study S2
Intellectual Property System S2
International Standards and Guidelines S2
Legal Cases in Information Security S2
Presentations for Professionals S2
Statistical Risk Management S2
Economics of Risk S2
Risk Control and Mass Media S2
Information Security Presentation Exercise II S2
Special Lecture (Security Auditing) S2
Special Lecture (Information Security Operation Literacy) S2
Special Lecture (Ethical Hacking ⁄ Malware Analysis) S2
Special Lecture (Advanced Network Security Technologies) S2
Special Lecture (Secure Society Platform) S2
Special Exercise (Information Security Practice I) S2
Special Exercise (Information Security Practice II) S2
Research Guidance Research Guidances R6 6--
Project Research Guidance R4 -4-
Doctor's Special Subjects Research Guidance for Doctral Students R6 --8
Information Security Exercise for Doctral Students R2
Special Lecture of Information Security Techniques S2
Special Lecture of Information Security Managements S2

R = Required Subject
S = Specific Subject

Graduation Requirements

Two-year Master's Program

  • Term of study: two years or more (One year or more with the faculty council is approval)
  • Required credits: 30 credits or more
  • Master's thesis judgment and final examination

One-year Master's Program

  • Term of study: one year or more
  • Required credits: 46 credits or more
  • Research paper and final examination

Doctoral Program

  • Term of study: Three years or more (One year or more with the faculty council is approval)
  • Required credits: 8 credits or more
  • Doctral dissertation judgment and final examination
Copyright © INSTITUTE of INFORMATION SECURITY. All rights Reserved.