Àü°ø¾È³»

Çѳ²´ëÇб³ ±³À°´ëÇпø¿¡ ¿À½Å°ÍÀ» ȯ¿µÇÕ´Ï´Ù.

  • Ȩ
  • Àü°ø¾È³»
  • ÀüÀÚ°è»ê±³À°Àü°ø
  • ±³°ú¸ñ ¼Ò°³

±³°ú¸ñ ¼Ò°³

°ú¸ñ¸í / ÇØ¼³ ÇÐÁ¡

ÄÄÇ»Åͱ³À°·Ð(Theory of Computer Education)

Çö´ë»ýȰ¿¡ À־ ÄÄÇ»ÅÍÀÇ Çʿ伺À» ÀνÄÇϸç Áß¡¤°íµîÇб³¿¡¼­ÀÇ Àü»ê±³À°ÀÇ Çʿ伺¿¡ ´ëÇØ¼­ ÀÌÇØÇϰí, ÀÌ·¯ÇÑ Àü»ê±³À° ¹æ¹ý¿¡ ´ëÇØ¼­ ¿¬±¸ÇÑ´Ù.

2ÇÐÁ¡

ÄÄÇ»ÅÍ³í¸®¹× ³í¼ú(theories of teaching logic and logical writing based on computer)

Áß. °íµîÇб³ÀÇ Àϼ± ÇöÀå¿¡¼­ ½ÃÇàµÇ´Â ÄÄÇ»ÅÍ ³í¸® ¹× ³í¼ú±³¿íÀÇ ³»¿ëÀ» °ËÅäÇϰí, ÀûÇÕÇÑ ÄÄÇ»ÅÍ ±³À°¹æ¹ý°ú ±³°ú°úÁ¤À» ¸ð»öÇÑ´Ù.

2ÇÐÁ¡

ÄÄÇ»Åͱ³À翬±¸ ¹× Áöµµ¹ý(Method and Materials in Teaching of Computer)

Àü»ê°³·Ð¿¡ ´ëÇÑ ÀÌÇØ¿Í ±³´Ü¿¡¼­ ÇлýÀ» °¡¸£Ä¡´Â ŵµ ¹× ±³¼ö¹æ¹ý¿¡ ´ëÇÑ ´É·ÂÀ» °®Ãßµµ·Ï ÇÑ´Ù.

2ÇÐÁ¡

Àü»ê±³À°ÀúÀ۽ýºÅÛ(Computer Education Authoring System)

¸ÖƼ¹Ìµð¾î ÇÁ·Î±×·¥ÀÌ °¡´ÉÇϰí, °ÔÀÓ ÇÁ·Î±×·¥, ¹®Àå ÆíÁý±â, CAI ÇÁ·Î±×·¥ µîÀ» Æ÷ÇÔÇÏ´Â ¿©·¯ ºÐ¾ßÀÇ ÇÁ·Î±×·¥ °³¹ß ±â¹ý¿¡ ´ëÇÑ ¹æ¹ýÀ» ÀÍÈù´Ù.

2ÇÐÁ¡

¾Ë°í¸®ÁòºÐ¼® ¹× ¼³°è(Advanced Algorithm Analysis and Design)

ÄÄÇ»ÅÍÀÇ °í±Þ ÀÚ·áÀÌ·Ð ¹× Ư¼öÇÑ ¾Ë°í¸®ÁòÀÇ °³¹ß ¹× ºÐ¼®¿¡ ´ëÇÑ ¿¬±¸¸¦ ÇÑ´Ù. Algorithm design¿¡¼­ÀÇ ±âº»Àû ±â¹ýÀÎ divide-and-conquer, The greedy method,dynamic programming µîÀ» ¼Ò°³Çϸç, ¿©·¯ ÄÄÇ»ÅÍ ÀÀ¿ëºÐ¾ß¿¡¼­ÀÇ »ç·Ê¿¬±¸¸¦ ÅëÇÏ¿© ÀÌ·¯ÇÑ ±â¹ýµéÀ» ÀÍÈ÷°í ¶ÇÇÑ °¢ ¾Ë°í¸®ÁòÀÇ time ¹× space complexity¸¦ ºÐ¼®ÇÑ´Ù.

2ÇÐÁ¡

¿ÀÅ丶ŸÀÌ·Ð(Topics in Automata Theory)

Unrestrict Grammer, Context-sensitive Grammer, Context- free Grammer, Regular-Grammer µîÀÇ Language ExpressionÀ» Turing Machine, Linear bounded Automata, Push down Automata, Finite Automata µîÀ» ÅëÇØ ÀνÄÇÏ´Â ¹æ¹ýÀ» °íÂûÇÑ´Ù.

2ÇÐÁ¡

ÀΰøÁö´ÉƯ·Ð(Advanced Artificial Intelligence)

ÀΰøÁö´ÉÀÇ ±âº»ÀÌ·Ð ¹× Ã߷йæ¹ý µîÀ» °íÂûÇÏ°í ¼öÇÐÀû Á¤ÀǸ¦ ÄÄÇ»ÅÍ·Î Áõ¸íÇÏ´Â ºÐ¾ß·Î½á °ÔÀÓÀÇ ÃÖÀûÀÇ ¼ö´ÜÀ¸·Î Ž»öÇÏ´Â ¹æ¹ý, ·Î¹öÆ®»ç¹°ÀÇ ¿µ»ó ¹× À½¼º½ÅÈ£, ±âŸÀÇ knowledge engineering¿¡ °ü·ÃµÇ´Â ºÐ¾ß¸¦ ´Ù·é´Ù.

2ÇÐÁ¡

½Ã½ºÅÛÇÁ·Î±×·¡¹Ö( System Programming)

½Ã½ºÅÛÇÁ·Î±×·¡¹ÖÀ» ÀÌÇØÇϰí ÄÄÇ»ÅÍÇϵå¿þ¾î¿Í ¼ÒÇÁÆ®¿þ¾î°£ÀÇ ¿¬°£°ü°è¸¦ ÀÌÇØÇÑ´Ù. ÄÄÇ»ÅͽýºÅÛ°ú °ü·ÃµÈ Á¦¹Ý±â´ÉÀ» ¼öÇàÇÏ´Â ÇÁ·Î±×·¥µéÀÇ ±âº»±¸¼º°ú µ¿ÀÛÀ» ÇнÀÇÏ¿© ÄÄÇ»ÅÍÇϵå¿þ¾î¿Í À̸¦ ¿î¿µÇÏ´Â ¼ÒÇÁÆ®¿þ¾î¿ÍÀÇ »óÈ£µ¿ÀÛ°ü°è¸¦ ÀÌÇØÇÏ´Â µ¥ ÀÖ´Ù.

2ÇÐÁ¡

°í±ÞÇÁ·Î±×·¡¹Ö¾ð¾î(Theory of Advanced Programming Language)

Programming LanguageÀÇ ¼³Ä¡»ó ¹®Á¦Á¡À» °íÂûÇϰí Abstac- tion, Applicative Mode°ú Data Flow Model ¹× Parallel Processing¿¡ °üÇØ¼­ ¿¬±¸ÇÑ´Ù. º´·Ä·Î ¼öÇàµÇ´Â º¹¼ö°³ÀÇ ÇÁ·Î¼¼½º¸¦ Æ÷ÇÔÇÏ´Â ÇÁ·Î±×·¥ ±¸¼º±â¹ýÀ» ¿¬±¸ÇÑ´Ù. ƯÈ÷ ¸í½ÃÀûÀÎ º´Ç༺, ÇÁ·Î¼¼½º°£ÀÇ Åë½Å ¹× µ¿±âÈ­ µî¿¡ ´ëÇØ ¸í·ÉÇü ÇÁ·Î±×·¥ ¾ð¾î¿¡ ÁßÁ¡À» µÐ´Ù.

2ÇÐÁ¡

ºÐ»ê½Ã½ºÅÛ(Distributed Computing)

°è»ê±â½Ã½ºÅÛµéÀ» ºÐ»ê½ÃÄÑ ÀÛµ¿½Ãų ¶§ÀÇ ³×Æ®¿÷, ¿î¿µÃ¼Á¦, ½Ã½ºÅÛÇÁ·Î±×·¡¹Ö ¹× µ¥ÀÌÅͺ£À̽º °ü¸®½Ã½ºÅÛ¿¡ °üÇÏ¿© ¿¬±¸ÇÑ´Ù.

2ÇÐÁ¡

ÄÄÆÄÀÏ·¯Æ¯·Ð(Topics in Compiler)

Lexical Analysis, Context-free Grammar, Top-Down Syntax Analysis, Bottom-Up Syntax Analysis, Code Generation. ÇÁ·Î±×·¡¹Ö ¾ð¾îÀÇ grammar, ¿À·ù¼öÁ¤, Áß°£¾ð¾î¿¡ ´ëÇØ ´Ù·é´Ù.

2ÇÐÁ¡

ÄÄÇ»ÅÍ³×Æ®¿öũƯ·Ð(Advanced Computer Network)

ÄÄÇ»Å͸Á ±¸Á¶, ȸ·Î¸Á Topology, ¹°¸® °èÃþ, µ¥ÀÌÅ͸µÅ© °èÃþ, ³×Æ®¿öÅ© °èÃþ, ¼¼¼Ç °èÃþ, Æ®·»½ºÆ÷Æ® °èÃþ, Ç¥Çö °èÃþ, ÀÀ¿ë °èÃþ µî ÄÄÇ»ÅÍ Åë½Å¸ÁÀÇ È¿À²ÀûÀÎ ±¸Ãà°ú »óÈ£Á¢¼ÓÀÇ ¿ëÀ̼ºÀ» ÀüÁ¦·Î ±¹Á¦Ç¥ÁØÈ­±â±¸ÀÎ ISO¿¡¼­ Á¦Á¤ÇÑ OSI(Open Systems Interconnection)ÂüÁ¶ ¸ðµ¨ÀÇ 7 layer¸ðµ¨°ú °¢ÃþÀÇ ³í¸®±¸Á¶ ¹× ÇÁ·ÎÅäÄÝ »ç¾ç°ú ±¸Çö¹æ¹ý¿¡ ´ëÇÏ¿© ¿¬±¸ÇÑ´Ù.

2ÇÐÁ¡

¿î¿µÃ¼Á¦±³À°Æ¯·Ð(Advanced Operating System Education)

Control Process, Concurrent Process, Scheduling Algorithms¹®Á¦µéÀÇ È®·ü¸ðÇü°ú Resource Management¿¡ °üÇÑ Topics¸¦ ¿¬±¸ÇÑ´Ù.

2ÇÐÁ¡

¼ÒÇÁÆ®¿þ¾î°øÇÐÆ¯·Ð(Advanced Software Engineering)

¼ÒÇÁÆ®¿þ¾î °³¹ß¿¡ µû¸¥ ƯÁ¤ÇÑ ¹æ¹ý°ú µµ±¸ÀÇ »ç¿ë¹æ¹ý µîÀ» ¼Ò°³ÇÔÀ¸·Î½á °ü·Ã ±â¼úÀ» È¿°úÀûÀ¸·Î Ȱ¿ëÇϵµ·Ï À¯µµÇÑ´Ù.

2ÇÐÁ¡

½Ã½ºÅۺм®±³À°·Ð(System Analysis)

Àü»êÈ­½Ã½ºÅÛÀ» À§ÇÑ ½Ã½ºÅÛ°³¹ß°ú Ȱ¿ë¿¡ ´ëÇÑ Àü¹ÝÀûÀÎ °íÂû°ú ¼¼ºÎ»çÇ׿¡ ´ëÇÑ ¿¬±¸ÇÑ´Ù.

2ÇÐÁ¡

°æ¿µÁ¤º¸½Ã½ºÅÛ±³À°·Ð(Management Information System Education)

±â¾÷ÀÇ Àü»êÈ­Á¤º¸¸¦ ±ÙÀ¸·Î °æ¿µÀÇ ÃÑüÀûÀÎ ÀÇ»ç°áÁ¤À» Áö¿øÇϰí È¿À²ÀûÀÎ °ü¸®ÀÇ Ãø¸éÀ» ¿¬±¸ÇÑ´Ù.

2ÇÐÁ¡

µ¥ÀÌÅͺ£À̽º±³À°Æ¯·Ð(Advanced Database Management System Education)

Database AyatemÀÇ °³³ä, Physical Data Organization, Network Model, DBTG,Proposl, Hierarchica Model, Relational Model, Relational Query Language µîÀ» ¿¬±¸ÇÑ´Ù.

2ÇÐÁ¡

°è»ê±â±¸Á¶±³À°·Ð(Computer Architecture Education)

ÄÄÇ»ÅÍÇϵå¿þ¾î¿Í ±âº»ÀÌ µÇ´Â °¢Á¾ µðÁöÅÐ ±â´É°ú ÄÄÇ»ÅÍ ³»¿¡¼­ÀÇ µ¥ÀÌÅÍ Ç¥Çö¹æ¹ýÀ» ÀÍÈ÷°í Á¦¾î³í¸® ¹× ¹ö½º±¸¼º, ¿¬»ê ¾Ë°í¸®Áò, ÀÔÃâ·Â ¹× ±â¾ïÀåÄ¡ µîÀ» ¼÷ÁöÇϸç, ÄÄÇ»ÅÍ ¼³°è´É·Â µîÀ» °®Ãßµµ·Ï ÇÑ´Ù.

2ÇÐÁ¡

¸¶ÀÌÅ©·ÎÇÁ·Î¼¼¼­±³À°·Ð (Micro Processor Education)

IBM-PCÀÇ CPLÀÎ 80386, 80486, Chip, Buily-in Intel 80960 Risc Local Processor, One-Chip Micro-ControllerÀÎ i8-96 ChipÀÇ ³»ºÎ±¸Á¶ ¹× ÀÌ·¯ÇÑ ÇÁ·Î¼¼¼­µéÀÇ ÀÀ¿ë ¹× ÁÖº¯ÀåÄ¡ ȸ·ÎµéÀÇ ¼³°è¹æ¹ý¿¡ ´ëÇØ ¿¬±¸ÇÑ´Ù.

2ÇÐÁ¡

ÄÄÇ»Åͱ׷¡ÇȽº±³À°·Ð(Computer Graphics Education)

ÀÌ °úÁ¤Àº ´ëÇüÈ­ ±×·¡ÇÈ ÀåÄ¡³ª ½Ã½ºÅÛÀÇ ¸ñÀû, ÇüÅÂ¿Í Æ¯Â¡ÀÇ ¹¦»ç, ±×·¡ÇÈ ÁßÁ¡ÀÇ Çϵå¿þ¾î, ¼ÒÇÁÆ®¿þ¾î µ¥ÀÌÅÍ ±¸Á¶³ª ½Ã½ºÅÛ ±¸Á¶¿¡ °üÇÑ ¼±º°µÈ ÁÖÁ¦ÀÇ ³íÀÇ, Àû´çÇÑ 2Â÷¿ø°ú 3Â÷¿ø ¼öÇÐ ±¸Á¶Àû ¹æ¹ý°ú ½É¸®ÇÐÀû °í·Á¿Í ´õºÒ¾î Scalling Translation, Rotating, Clipping, Windowing°ú Hidden Line Romoval°ú °°ÀÌ Áß¿äÇÑ ±â¹ýÀÇ Ç¥Çö, À¯¿ëÇÑ ±×·¡ÇÈ ÀåÄ¡¸¦ Æ÷ÇÔÇÑ ÀÀ¿ë·ÂÀÌ Æ÷ÇԵȴÙ.

2ÇÐÁ¡

Àü»êÅë°è(Computer stochastics)

°¢Á¾ ¼³¹®Á¶»ç ¹× ¼³¹® µ¥ÀÌÅ͵éÀÇ Ã³¸® ¹× µ¥ÀÌÅÍ ¸¶À̴׿¡ ÇÊ¿äÇÑ ±âÃÊ Åë°èÀÌ·Ð, °¢Á¾ ºÐÆ÷ÇÔ¼ö, ÀÌ»ê È®·ü ºÐÆ÷, Åë°èÀû ÃßÁ¤, °¡¼³°ú °ËÁ¤, ºÐ»ê ºÐ¼®, Ä«ÀÌÀڽ Å×½ºÆ® µî¿¡ ´ëÇØ ¹è¿î´Ù.

2ÇÐÁ¡

µ¥ÀÌÅͱ¸Á¶(Data structure)

ÇÁ·Î±×·¥Àº ÀڷᱸÁ¶, ¾Ë°í¸®Áò ¹× ¾ð¾î·Î ±¸¼ºµÇ¸ç, ÀڷᱸÁ¶´Â °ÇÃà¿¡¼­ °ÇÃàÀÚÀç¿Í °°Àº ¿ªÇÒÀ» ÇÑ´Ù. Áï, Á¤º¸½Ã½ºÅÛÀ» È¿°úÀûÀ¸·Î °³¹ßÇÏ°í ¿ì¼öÇÑ ½Ã½ºÅÛÀ» ±¸ÃàÇϱâÀ§Çؼ­´Â ÀڷᱸÁ¶°¡ Áß¿äÇÏ´Ù. º» °ú¸ñ¿¡¼­´Â ÀڷᱸÁ¶ÀÇ °³³ä°ú ¿¹ ¹× ÀÀ¿ë»ç·Ê¸¦ ÇнÀÇÑ´Ù.

2ÇÐÁ¡

º¸¾È°øÇÐ(Security engineering)

º¸¾È°øÇÐÀº ÃÖÀûÀÇ º¸¾È±â¼ú, ´ëÀÀÃ¥, ±â´É, ÅëÁ¦ ¹æ¹ýÀ» ÀÌ¿ëÇÏ¿© º¸È£ÇÒ ÀÚ»êÀ» ÃÖÀûÀ¸·Î º¸È£ÇϱâÀ§ÇÑ ¹°¸®Àû, °ü¸®Àû ¹× ±â¼úÀû ¹æ¹ýÀ» ÀǹÌÇÑ´Ù. ÀÚ»êÀÇ ºÐ·ù, ÀÚ»êÀÇ °¡Ä¡Æò°¡, À§ÇèºÐ¼®, ½ÃÇè ¹× ÀÎÁõ, Ç¥ÁØÈ­ µî¿¡ °üÇÑ ±â¼úÀ» ´Ù·é´Ù. Á¤º¸º¸È£ºÐ¾ßÀÇ ±âº» Çй®À̶ó ÇÒ ¼ö ÀÖ´Ù.

2ÇÐÁ¡

µ¥ÀÌÅÍÅë½ÅƯ·Ð(Advavced data communication)

º» °ú¸ñÀº µ¥ÀÌÅÍÅë½Å, ³×Æ®¿öÅ©, ÀÎÅͳÝ, ÇÁ·ÎÅäÄÝ ¹× °ü·Ã Ç¥ÁØ¿¡ ´ëÇØ ³íÀÇÇÏ°í ³×Æ®¿öÅ©°£ µ¥ÀÌÅÍ Åë½Å¿¡ ´ëÇÑ ³ÐÀº ÀǹÌÀÇ Á¤ÀÌ¿¡ ´ëÇØ °øºÎÇÑ´Ù.

2ÇÐÁ¡

¹«¼±Åë½Å¸ÁƯ·Ð(Advavced wireless network)

¹«¼±Åë½ÅÀ» À§ÇÑ ±â¼úÀûÀÎ ºÎºÐ°ú ¹«¼±Åë½Å¿¡¼­ ¹ß»ýÇÒ ¼ö ÀÖ´Â ¹®Á¦Á¡À» ³íÀÇÇÏ°í ±×ÇØ°á¹æ¾È¿¡ ´ëÇØ¼­ Åä·ÐÇÑ´Ù.

2ÇÐÁ¡

µ¥ÀÌÅͺ£À̽º(Database)

ÄÄÇ»ÅÍ¿¡ Á¸ÀçÇÏ´Â µ¥ÀÌÅ͸¦ ¾î¶»°Ô ¸ðµ¨¸µÇÏ°í ±×¿¡ µû¸¥ µ¥ÀÌÅÍ ¾ð¾î¿Í °ü¸® ±â´É ±×¸®°í ±¸Çö¿¡ ´ëÇÑ °Í¿¡ ´ëÇØ ±âº»ÀûÀ¸·Î ÇÊ¿äÇÑ Áö½ÄÀ» ¹è¿î´Ù.

2ÇÐÁ¡

½Ã½ºÅÛº¸¾È(System security)

È£½ºÆ® ½Ã½ºÅÛ(Host System)ÀÇ Ãë¾àÁ¡ ºÐ¼®°ú À̸¦ ÀÌ¿ëÇÏ´Â ´Ù¾çÇÑ °ø°Ý ¹æ¹ý¿¡ ´ëÇØ ¿¬±¸Çϰí, ´ëóÇÏ´Â ¹æ¹ýÀ» ¹è¿î´Ù.

2ÇÐÁ¡

³×Æ®¿öÅ©ÇÁ·Î±×·¡¹Ö(Network programming)

È£½ºÆ® ÄÄÇ»Å͵éÀ» ¿¬°áÇÏ¿© ¼­·Î Åë½ÅÇÏ°Ô ÇÏ´Â Çñ׷¥ ¹æ¹ýÀÇ ±âº»ÀÎ ¼ÒÄÏ ÇÁ·Î±×·¥ ¿ø¸®¸¦ ÀÌÇØÇϰí, ½ÇÁ¦ ¼ÒÄÏ Çñ׷¥À» ÀÛ¼º¹ýÀ» ¹è¿ö ½Ç¹«¿¡ Àû¿ëÄÉ ÇÑ´Ù.

2ÇÐÁ¡

³×Æ®¿öÅ©º¸¾È(Network security)

³×Æ®¿öÅ© ½Ã½ºÅÛ(Network System)¿¡¼­ ¹ß»ýÇÏ´Â ´Ù¾çÇÑ À¯, ¹«¼± Ãë¾àÁ¡ ºÐ¼®°ú À̸¦ ÀÌ¿ëÇÏ´Â ´Ù¾çÇÑ °ø°Ý ¿ø¸®, ´ëó ¹æ¹ýÀ» ¹è¿î´Ù.

2ÇÐÁ¡

RFI / DUSN°ú º¸¾È(RFI / DUSN and security)

RFID¿Í USN(Ubifuitous Sensor Network)ÀÇ ¿ø¸®¸¦ ¹è¿ì°í RFID¿Í USN¿¡ °¡Àå ÇÊ¿äÇÑ º¸¾È Àû¿ë ±â¹ýÀ» °øºÎÇÑ´Ù.

2ÇÐÁ¡

µðÁöÅÐÆ÷·»Á÷(Digital forensics)

³×Æ®¿öÅ©³ª È£½ºÆ® ÄÄÇ»ÅÍ·Î ¿î¿µµÇ´Â ȯ°æ¿¡¼­ ¹üÁË Áõ°Å¸¦ È®º¸Çϱâ À§ÇÑ À̷аú ´Ù¾çÇÑ ¹æ¹ý¿¡ ´ëÇØ ¹è¿î´Ù. Æ÷·»Á÷½º µµ±¸¸¦ »ç¿ëÇÏ¿© Áõ°ÅÀÇ °´°üÀûÀÌ¸ç °øÁ¤ÇÑ È®º¸ ¹æ¹ýµµ °°ÀÌ °øºÎÇÑ´Ù.

2ÇÐÁ¡

À¥±â¹Ý±³À°½Ã½ºÅÛ(Web-based Education System)

ÀÎÅͳݰú À¥Àº Çö´ëÀÇ ±³À°¸Åü°¡ µÇ¾ú´Ù. º» °­ÀÇ¿¡¼­´Â ÀÎÅͳݰú À¥À» ±â¹ÝÀ¸·Î ÇÏ´Â ±³À°½Ã½ºÅÛÀÇ ±¸Á¶¸¦ ÀÌÇØÇÏ°í º¸´Ù È¿°úÀûÀÎ À¥±â¹Ý ±³À°½Ã½ºÅÛÀ» °³¹ßÇÒ ¼ö ÀÖ´Â ´É·ÂÀ» ¹è¾çÇÑ´Ù.

2ÇÐÁ¡

¸ÖƼ¹Ìµð¾îȰ¿ë±³À°(Multimedia based education)

¸ÖƼ¹Ìµð¾î´Â ÄÄÇ»Åͱ³À° ¶Ç´Â ÄÄÇ»Å͸¦ Ȱ¿ëÇÑ ±³À°¿¡¼­ ÇʼöÀûÀÌ´Ù. º» °­ÀÇ¿¡¼­´Â ¿µ»ó, À½Çâ ¹× È­»ó µîÀÇ ¸ÖƼ¹Ìµð¾î ¸Åü¿Í ÀúÀÛµµ±¸¸¦ Ȱ¿ëÇÏ´Â ¹æ¹ýÀ» ´Ù·é´Ù. À̷μ­, ±³À°¿ë ¸ÖƼ¹Ìµð¾îÄÁÅÙÃ÷¸¦ °³¹ßÇÒ ¼ö ÀÖµµ·Ï ÇÑ´Ù.

2ÇÐÁ¡

±³À°ÇÁ·ÎÁ§Æ®°ü¸®·Ð(Educational Project Management)

±³À°µµ ÇϳªÀÇ °úÁ¦(ÇÁ·ÎÁ§Æ®)ÀÌ´Ù. º» °­ÀÇ¿¡¼­´Â ÃÖ¼ÒÀÇ ³ë·Â, ½Ã°£ ¹× ºñ¿ëÀ» ÅõÀÔÇÏ¿© ÃÖ´ëÀÇ ±³À°È¿°ú¸¦ °ÅµÎµµ·Ï ÇÏ´Â ÇÁ·ÎÁ§Æ®°ü¸® ±â¼úÀ» ´Ù·é´Ù. À̸¦ À§ÇØ ¿¹»ê°ü¸®, ½Ã°£ °ü¸®, ÀÎÀû°ü¸® ¹× Àåºñ°ü¸® ±â¼úÀ» »ó¼¼ÇÏ°Ô ´Ù·é´Ù.

2ÇÐÁ¡

±³À°¿ëÄÁÅÙÃ÷°³¹ß(Education Contents Development)

ÀúÀÛµµ±¸ÀÇ Á¾·ù¿Í Ư¼ºÀ» ÀÌÇØÇϰí À̸¦ ÀÌ¿ëÇÏ¿© ±³À°¿ëÄÁÅÙÃ÷¸¦ °³¹ßÇÏ´Â ¹æ¹ýÀ» ´Ù·é´Ù. º» °ú¸ñÀ» ÅëÇØ ÀúÀÛµµ±¸¸¦ ÀÚÀ¯·Ó°Ô Ȱ¿ëÇϰí ÄÁÅÙÃ÷ÀÇ ÀúÀ۴ܰ踦 ½ÀµæÇÑ´Ù.

2ÇÐÁ¡

Á¤º¸º¸È£ °³·Ð(Introduction to Information Security)

Á¤º¸º¸È£¿¡ °ü·ÃµÈ ¾ÏÈ£ ±â¼ú, ½Ã½ºÅÛ ¹× ³×Æ®¿öÅ© º¸¾È ±â¼ú, ÀÀ¿ë ¼­ºñ½º º¸È£ ±â¼ú¿¡ »ç¿ëµÇ´Â ±â¼ú, ¹ý¡¤Á¦µµ, Á¤º¸Åë½ÅÀ±¸® µî Á¤º¸º¸È£ Àü¹Ý¿¡ °ÉÄ£ ±âº» °³³äÀ» ÇнÀÇÑ´Ù.

2ÇÐÁ¡

Çö´ë ¾ÏÈ£ÇÐ ±âÃÊ (Fundamentals of Modern Cryptology)

ÀüÅëÀûÀÎ ¾ÏÈ£ÇÐÀÇ ±â¹ÝÀÌ µÇ´Â °íÀü ¹× Çö´ë ¾ÏÈ£ÇÐÀÇ À̷еéÀ» ÇнÀÇÏ°í ¾Ïȣȭ ¹× º¹È£È­ °úÁ¤, ±âº» ¿ë¾î, ºí·Ï ¾ÏÈ£, ½ºÆ®¸² ¾ÏÈ£, °ø°³Å°¿Í ºñ¹ÐŰ, ÇØ½¬ ÇÔ¼ö, ÀüÀÚ¼­¸í, ¾ÏÈ£ ÀÌ·ÐÀÇ ÀÀ¿ë µîÀ» ÇнÀÇÑ´Ù. ¶Ç, ÀÌµé ¾ÏÈ£ ÀÌ·Ð µîÀÌ ÀÎÅÍ³Ý µî¿¡¼­ Ȱ¿ëµÇ´Â »ç·Ê µî¿¡ ´ëÇÏ¿© ¿¬±¸ÇÑ´Ù.

2ÇÐÁ¡

ħÀÔ Å½Áö ±â¼ú(Intrusion Detection Technology)

ÄÄÇ»ÅÍ ½Ã½ºÅÛ¿¡ ºñÀΰ¡ÀÚÀÇ Ä§ÀÔÀÌ ¹ß»ýÇÏ¿´À» ¶§ À̸¦ È¿°úÀûÀ¸·Î ŽÁöÇÒ ¼ö ÀÖ´Â ±â¼ú°ú ÄÄÇ»ÅÍÀÇ °¢Á¾ ¼ÒÇÁÆ®¿þ¾î/Çϵå¿þ¾î °áÇÔÀ» ŽÁöÇÏ´Â ¹æ¹ýÀ» ½ÀµæÇÑ´Ù. À̸¦ À§ÇÏ¿© TCP/IP, Packet ±¸Á¶ ¹× ÀÎÅÍÆäÀ̽ºÀÇ ÀÌÇØ, ħÀÔÂ÷´Ü½Ã½ºÅÛÀÇ ±¸Á¶ ¹× ±¸ÇöÀ» À§ÇÑ ¿ä¼Ò ±â¼ú, ħÀÔŽÁö½Ã½ºÅÛÀÇ ¿£Áø¿¡ ´ëÇÑ ÀÌ·ÐÀû ¹è°æ ¹× ±¸Çö ±â¹ý µîÀ» ÇнÀÇÑ´Ù.

2ÇÐÁ¡

ÇØÅ· ¹× ¹ÙÀÌ·¯½º (Hacking &Virus)

ÄÄÇ»ÅÍ ½Ã½ºÅÛÀÇ Ãë¾à¼º°ú ÇØÅ·°úÀÇ °³³äÀ» Á¤¸³Çϰí ÇØÅ· µµ±¸ÀÇ ºÐ¼®°ú ¹æÁö ¹æ¾È, ¹ÙÀÌ·¯½ºÀÇ Á¾·ù ¹× ´ëó ±â¹ý, ¹ÙÀÌ·¯½ºÀÇ ÇÇÇØ ¹æÁö ±â¼ú¿¡ ´ëÇÏ¿© ÇнÀÇÏ°í ¸ðÀÇ ÇØÅ· ½Ç½ÀÀ» ¼öÇàÇÑ´Ù.

2ÇÐÁ¡

ħÀÔ ´ëÀÀ ÅëÇÕ ±â¼ú (Intrusion Response and Security Management)

ÇØÄ¿·ÎºÎÅÍÀÇ Ä§ÀÔÀ» È¿°úÀûÀ¸·Î ´ëóÇϱâ À§ÇÑ µµ±¸ ¹× ÇÙ½É ±â¼úÀ» ÇнÀÇÑ´Ù. ħÀÔ Â÷´Ü ½Ã½ºÅÛ, ħÀÔ Å½Áö ½Ã½ºÅÛ, ħÀÔ ÃßÀû ½Ã½ºÅÛ ¹× °¡»ó »ç¼³ Åë½Å¸Á¿¡ ´ëÇÑ »ó¿ëÈ­µÈ Á¦Ç°°ú ÁÖ¿ä ±â¼úÀ» ºÐ¼®Çϰí ÅëÇÕ º¸¾È °üÁ¦ ½Ã½ºÅÛ(ESM)¿¡ ´ëÇÏ¿© ¿¬±¸ÇÑ´Ù. ¶ÇÇÑ Ä§ÀÔ ¹ß»ý ½Ã È¿°úÀûÀ¸·Î ¿î¿µÇÒ ¼ö ÀÖ´Â ´ëÀÀü°è ±¸¼º ¹× Á¤º¸º¸È£ °ü¸® ½Ã½ºÅÛ¿¡ ´ëÇÏ¿© ÇнÀÇÑ´Ù.

2ÇÐÁ¡

°´Ã¼ÁöÇâÇÁ·Î±×·¡¹Ö (Object-oriented Programming)

Java, C++ µî°ú °°Àº °´Ã¼ÁöÇâÇÁ·Î±×·¡¹Ö¾ð¾î¸¦ ÀÌ¿ëÇÑ Å¬·¡½º ¹× È®ÀåŬ·¡½ºÀÇ ¼³°è ¹× ´ÙÇü¼º(polymorphism) °ü·Ã ±â¹ýÀ» ÀÍÈù´Ù. ÀÚ·áÇü ½Ã½ºÅÛ, Á¦¾î±¸¹®, ÀÎÅÍÆäÀ̽º, ¿¹¿Üó¸®, ¸ÖƼ ½º·¹µå ÇÁ·Î±×·¡¹Ö °³³äµéÀÌ ¾î¶»°Ô °í ½Å·Úµµ ¼ÒÇÁÆ®¿þ¾î°³¹ß¿¡ ÀÀ¿ëµÇ´Â°¡¸¦ ºÐ¼®ÇÑ´Ù.

2ÇÐÁ¡

Àü»ê±³À° ¿¬±¸ ¹æ¹ý·Ð( the way for Research of computational education)

ºñ³í¹® Á¹¾÷ÀÚÀÇ Á¹¾÷À» À§ÇÑ Çʼö °ú¸ñÀ¸·Î, Á¹¾÷À» À§ÇÑ ³í¹® Áß½ÉÀÇ Çо÷º¸´Ù ±³À°¿¡ ÁßÁ¡À» µÎ¾î ¾ç¼ºÇϱâ À§ÇÑ ½Å¼³µÈ °ú¸ñÀ¸·Î ÀÌ °ú¸ñÀ» À̼öÇϰí ÃÖÁ¾ Çб⿡ Á¹¾÷º¸°í¼­¸¦ ÀÛ¼ºÇÏ¿© Á¦ÃâÇÑ´Ù.

2ÇÐÁ¡

Á¤º¸Åë½Å À±¸® ±³À°·Ð(Moral Education of Information Communication)

¿À´Ã³¯ ÀÎÅͳÝÀÌ ¸¸µé¾î ³½ »çÀ̹ö °ø°£Àº »çȸÀû ½ÇÀç°¨À» ÀúÇϽÃÄÑ ÁÜÀ¸·Î½á ³ª¸£½Ã½ÃÁòÀûÀÎ ÅðÇàÀ» ºÎÃßŰ´Â ¼Ó¼ºÀ» °®°í Àֱ⿡, ÀÏ»óÀÇ µµ´öÀûÀÎ Àڱ⠱ÔÁ¦°¡ »ç½Ç»ó ¾î·Á¿î ½ÇÁ¤ÀÌ´Ù. ÀÌ·¯ÇÑ ½Ã±â¿¡ Á¤º¸Åë½Å À±¸® ±³À° Çʿ伺ÀÌ ´ëµÎÇϴ¹٠ÀÌ °ú¸ñÀ» ½Å¼³ÇÏ¿© À±¸® ±³À°À» ÇÔ¾ç½ÃŲ´Ù.

2ÇÐÁ¡

ÀÎÅÍ³Ý È°¿ë Ư·Ð(Internet practical using)

¿À´Ã³¯ ÀÎÅͳÝÀÌ º¸ÆíÈ­µÇ¾ú°í, ÀÎÅͳÝÀ» ÅëÇÏ¿© ±³À° Ȱµ¿¿¡ »ç¿ëÇÒ ¼ö ÀÖ´Â ´Ù¾çÇÑ ±â´Éµé¿¡ ´ëÇØ¼­ ¿¬±¸Çϰí Ȱ¿ëÇÑ´Ù.

2ÇÐÁ¡

À¯ºñÄõÅͽº ÄÄÇ»ÆÃ(Ubiquitous Computing)

Á¤º¸½Ã½ºÅÛÀ» ÅëÇØ À¯ºñÄõÅͽº °³³ä°ú ÆÐ·¯´ÙÀÓÀ» ±¸ÇöÇÏ´Â ±â¼úÀ» ´Ù·é´Ù. À¯ºñÄõÅͽº »çȸ, À¯ºñÄõÅͽº¸¦ À§ÇÑ ÀÎÇÁ¶ó ¹× ±×¸®µå ÄÄÇ»ÆÃ µîÀÇ ÁÖÁ¦¸¦ ÁÖ·Î ´Ù·é´Ù. Áï, º» °ú¸ñÀº À¯ºñÄõÅͽºÀÇ ÀÀ¿ë Ãø¸éÀ» ´Ù·é´Ù. ±âÁ¸ÀÇ ÄÄÇ»ÅÍ Çϵå¿þ¾î, ¼ÒÇÁÆ®¿þ¾î, Á¤º¸Åë½Å, º¸¾È±â¼ú, Àΰ£°øÇÐ µîÀÇ ±â¼úÀÌ È¥ÇÕµÈ Á¾ÇÕ±â¼úÀÌ´Ù. º» °ú¸ñÀ» ÅëÇØ ȯÀÚ°ü¸®, ±³Åë°ü¸®½Ã½ºÅÛ µî À¯ºñÄõÅͽº °³³äÀ» °¡Áø »õ·Î¿î ÀÀ¿ë½Ã½ºÅÛÀ» ¿¬±¸ ¹× °³¹ßÇÑ´Ù.

2ÇÐÁ¡

³í¹®¿¬±¸¥°(Individual Research ¥°)

³í¹® Áغñ¸¦ À§ÇØ ³í¹®Á¹¾÷ÀÚ´Â 3Çб⠰úÁ¤¿¡, ºñ³í¹®Á¹¾÷ÀÚ´Â 4Çб⠰úÁ¤¿¡ À̼öÇÑ´Ù.

3ÇÐÁ¡

³í¹®¿¬±¸¥±(Individual Research ¥±)

³í¹® Áغñ¸¦ À§ÇØ ³í¹®Á¹¾÷ÀÚ´Â 4Çб⠰úÁ¤¿¡, ºñ³í¹®Á¹¾÷ÀÚ´Â 5Çб⠰úÁ¤¿¡ À̼öÇÑ´Ù.

3ÇÐÁ¡

ÀüÈ­(Á¶±³½Ç) : 042-629-7677