2018-2019-1 The teaching process of "Introduction to information Security speciality"

Source: Internet
Author: User
Tags hosting

The teaching process of "Introduction to information Security speciality"

Directory
    • Assessment method
    • Teaching process
      • No. 01 Week learning tasks and requirements
      • No. 02 Week learning tasks and requirements
      • No. 03 Week learning tasks and requirements
      • No. 04 Week learning tasks and requirements
      • No. 05 Week learning tasks and requirements
      • No. 06 Week learning tasks and requirements
      • No. 07 Week learning tasks and requirements
      • No. 08 Week learning tasks and requirements
      • No. 09 Week learning tasks and requirements
      • 10th Week learning tasks and requirements
      • 11th Week learning tasks and requirements
      • 12th Week learning tasks and requirements
      • 13th Week learning tasks and requirements
      • 14th Week learning tasks and requirements
      • 15th Week learning tasks and requirements
    • Individual projects
    • Learning Resources

Assessment method

Total score 100 points, final exam 60 points, peacetime score 40 points

Normal grades require self-learning a programming language (20 points)
Other 20 divided into under-class testing and practical work

Back to Catalog

Course Basics
    • Read "Learning with a blog park" and build a personal technology blog

    • Follow the class blog "2018-2019-1 Information Security Professional Introduction (Beijing Electronic Technology Institute)".

    • Read "Using Open source Chinese managed code" and finish your homework (learn Python by yourself).

    • Textbook Learning Guide:
      • Introduction to Computer Science
      • Teaching Materials Learning Guide

Learning Lab Building Practice Tutorial:

    • Getting Started with Linux basics

Back to Catalog

Learning methods of teaching process
    1. Progress is important: pay attention to the frontload, must keep up with the weekly progress, the textbook reading and summing up, teaching material exercises, quiz groups, projects. I and the teaching assistants will take each classmate seriously, please don't give up because of the difficulty, insist on down, will find own incredible.

    2. Question and answer is very important: meet the knowledge difficulties, please ask a lot of questions, this is your right to be responsible for your own obligations. Questions and answers to the course discussion group

    3. Practice is very important: solve the book exercises, practical teaching material examples, complete individual and team projects, only really digested the course content. You can learn in practice through the curriculum of the lab building or the virtual machines that you install yourself.

    4. The study summary, the experiment report is very important: summarizes the study and the practice the question, obtains the teacher and the schoolmate's feedback, is the progress shortcut. After the completion of the study in the blog Park in the study process through the blog (essay) published, blog title "Study Number" information Security Professional Introduction "The X-week study Summary"

The summary template (Markdown) is as follows:

# 2018-2019-1, "An Introduction to Information security" chapter X Week study Summary # # Learning content Summary as simple as possible summary of this week study content try not to transcription, waste time to understand on the past, do not understand, learning has experience of the record # # Problems and solutions in teaching materials learning (a template: I read this paragraph of text (quoted text) and have this problem (ask a question). I checked the information, there are these statements (quote), according to my practice, I get these experiences (describe my experience). But I still do not understand, my confusion is (explain confusion). "or" I oppose the author's point of view (presenting the author's point of view, his own point of view, and the reason). )-Problem 1:xxxxxx-problem 1 Solution: xxxxxx-problem 2:xxxxxx-Problem 2 solution: xxxxxx-... # # # # # # # # # # # # # # # # # # # # # Problems and resolution in code debugging-Problem 1:xxxxxx-problem 1 Solution: xxxxxx-problem 2:xxxxxx- Problem 2 Solution: xxxxxx-# # # # [Code Hosting] (Code Cloud Learning Project Link) (statistics.sh script running results) # # last week's quiz summary-wrong title 1 and reason, understanding the situation-wrong title 2 and reason, understanding the situation-... # Other (sentiment, thinking, etc.,            Optional) xxxxxx## Learning progress Bar | | Lines of code (new/cumulative) | Blog volume (Add/accumulate) | Learning time (NEW/cumulative) | Important Growth | | --------   | :----------------:|:----------------:|:---------------:  |:-----:|| Target |   5000 Rows | 30 Articles |       400 hours | || First week |   200/200 | 2/2 |       20/20 | || Second week |   300/500 | 2/4 |       18/38 | || Third week |   500/1000 | 3/7 |       22/60 | || Week Four |   300/1300 | 2/9 | 30/90             | | Try recording "Planned Learning Time" and "actual learning time" to see if you can improve your planning skills by the end of the semester. This work is very important and useful in learning. Time-consuming estimates of the formula: y=x+x/n, y=x-x/n, the number of training, X, Y is close. Reference: [Why is it so difficult to estimate a software engineering application] (http://www.cnblogs.com/xinz/archive/2011/04/05/2005978.html), [Software engineering estimation Method] (http:// www.cnblogs.com/xinz/archive/2011/04/06/2007294.html)-Plan study time: XX hours-Actual study time: XX hours-Improve the situation: (see more of the software engineer's ability self-evaluation form of modern software engineering courseware ] (http://www.cnblogs.com/xinz/p/3852177.html) # # References-[Learning Guide for in-depth understanding of computer systems V3] ([http://www.cnblogs.com/rocedu/p/  5826467.html])-...

The results of the summary rendered in the above template with Markdown are as follows:

The blog to be submitted with the job, as shown in:

Back to Catalog

First week learning guide learning goals
    1. Familiar with the development environment under Linux system
    2. Familiar with the basic operation of VI
    3. Familiarity with the fundamentals of the GCC compiler
    4. Familiar with the common options for using the GCC compiler
    5. Proficiency in GDB debugging techniques
    6. Familiarity with makefile fundamentals and grammatical norms
    7. Mastering the generation and invocation methods of static and dynamic libraries
    8. Understand the principle of "high cohesion, low coupling" of module decomposition in C program
    9. Understanding the concept of links
Learning Resources
    • Teaching Materials: Chapter I, seventh chapter
    • "In-depth understanding of computer system V3" Learning Guide

    • "Embedded Linux application Development Standard Tutorial" chapter III 3.1-3.5

    • Laboratory Building Course Materials: Experiment two or eight, course invitation code: W7FQKW4Y

    • Instructional Video: Refer to the tenth video

    • Video:

    • Vim Editor

    • A concise tutorial for GDB

    • LINXU System Programming: Experiment 2, 3, 4

    • Read "Anti-cheating": at any time to find students have plagiarism work, copying the code, instant course total of 0

Learning tasks
    • Must learn: The first chapter of the teaching materials, the seventh chapter (seventh chapter content can "embedded Linux application Development Standard Tutorial" chapter III 3.1-3.5), like lectures can refer to the blue ink Cloud class video, complete the blue ink cloud class in the test.

    • Learning content: Learn about other content in the resources according to your own situation

    • Laboratory Building Course Materials: Experiment Two, course invitation code: W7FQKW4Y

    • To host the code in the study, the Code link in the blog

    • Refer to the above Learning summary template, the learning process through the blog (essay) published, blog title "2018-2019-1" Information security system design fundamentals of the first week of learning summary ", blog (essay) to be submitted through the assignment, as of Sunday 23:59.

      • A quick glance through the textbook, each chapter of the textbook presents at least one problem that you do not understand or most want to solve and answer these questions at the end of the semester
      • Improve learning efficiency, improve the efficiency of blogging: as little as possible to extract the contents of the book, mainly written with doubts and the content of the harvest
      • Deadline: This Sunday 24:00, not on time to send a blog to buckle 1 points, excellent blog plus 1 points
      • Do not press the above template written to rewrite, otherwise it will buckle 1 points
      • Non-plagiarism, violators total

Back to Catalog

Second week

Back to Catalog

Third week

Back to Catalog

Week Four

Back to Catalog

Week Five

Back to Catalog

Week Six

Back to Catalog

Seventh Week

Back to Catalog

Eighth Week

Back to Catalog

Nineth Week

Back to Catalog

Tenth Week

Back to Catalog

11th Week

Back to Catalog

12th Week

Back to Catalog

13th Week

Back to Catalog

14th Week

Back to Catalog

15th Week requirements
    • Course Summary: This summary written good will be selected out into a blog book, we write carefully, the selected will send you a copy.
    • The link in the text should be equipped with two-dimensional code, you can use the QQ tool or the function of the blog park, click on their own the bottom of each article icon has two-dimensional code:

Post a blog post
  • Study number "The foundation of Information security system Design" Course Summary

    • Weekly Job link rollup (in order)

      • No. 0 Week Assignment: brief content, QR code
      • First week homework: brief content, QR code
      • Second week assignment: brief content, QR code
      • ...
    • Experiment Report link Summary (in order)

      • Experiment one experiment name: brief content, two-dimensional code
      • Experiment two experiment name: brief content, two-dimensional code
      • ...
    • Code hosting link and QR code:
      • git log--pretty=format: Results of "%h-%an,%ar:%s"
      • Code Volume Rollup submission support for statistics.sh
      • Is code-driven learning done?
      • Add code, Pity Dorado code is the best way to understand, refer to the wisdom of programming, talk about your experience
      • What lessons do you have in practice?
    • Overall evaluation of the 1th week in the work of their own question is not to seize the focus of learning
    • Answer the questions you asked in your 1th week's homework.
    • What items have you been added to, talk about your experience
      • Excellent work (give link and QR code)
      • Summary (give link and QR code)
      • Project (give link and QR code)
      • Tutorials (Give links and QR codes)
      • Competition
      • ...
    • Do you have any items to be deducted and talk about your lessons
      • No hands-on practice
      • Late delivery of homework
      • No acceptance code
      • ...
    • Lessons learned and deficiencies
      • Own harvest (input, efficiency, effect, etc.)
      • Where you need to improve.
      • If you have a pair, write about the help you have provided or what help you have received, and provide advice to the teacher.
    • Advice for you and your younger brother to learn at the beginning of school
      • If you re-learn the course, how can you learn better
    • Questionnaire Survey
      • How long do you spend on average per week in this course?
      • Do you improve your weekly learning efficiency?
      • Are you satisfied with your learning effect?
      • Will you continue at least one blog post at the end of the course? (If I can do it, I'll put your blog into a book for you to commemorate when I graduate)
      • What do you think the teacher of this class should continue to do?
      • What do you think the teacher of this class should stop doing?
      • What do you think the teacher of this course should start to do new things?
    • Other free Play
    • Give your summary of the link and QR code

      • such as this article link and QR code: http://www.cnblogs.com/rocedu/p/5826112.html

Back to Catalog

Textbooks and references
    • Introduction to Computer Science
    • Guiding professional norms of information security speciality in colleges and universities
    • Linux Basics ()
    • Method of construction (electronic version)
    • Graphic cipher Technology
    • Programmer must Read List 1.0
MOOC & Videos Other

Back to Catalog

Welcome to the "rocedu" public number (on the phone long by the two-dimensional code)

To do middle school, to do the common progress in practice!

    • Original address: https://www.cnblogs.com/rocedu/p/9577842.html

    • Recommended Sites: Blog Park, Sina Weibo, scallop back words, dky back word group, Youdao Yun notes, watercress reading

    • Copyright Disclaimer: Free Reprint-Non-commercial-non-derivative-retain attribution | Creative Commons by-nc-nd 3.0

If you think this article is helpful to you, please click on the bottom left corner of " good text to top " and " collect this article"

2018-2019-1 The teaching process of "Introduction to information Security speciality"

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.