The teaching process of "Introduction to information Security speciality"
Directory
- Assessment method
- Teaching process
- No. 01 Week learning tasks and requirements
- No. 02 Week learning tasks and requirements
- No. 03 Week learning tasks and requirements
- No. 04 Week learning tasks and requirements
- No. 05 Week learning tasks and requirements
- No. 06 Week learning tasks and requirements
- No. 07 Week learning tasks and requirements
- No. 08 Week learning tasks and requirements
- No. 09 Week learning tasks and requirements
- 10th Week learning tasks and requirements
- 11th Week learning tasks and requirements
- 12th Week learning tasks and requirements
- 13th Week learning tasks and requirements
- 14th Week learning tasks and requirements
- 15th Week learning tasks and requirements
- Individual projects
- Learning Resources
Assessment method
Total score 100 points, final exam 60 points, peacetime score 40 points
Normal grades require self-learning a programming language (20 points)
Other 20 divided into under-class testing and practical work
Back to Catalog
Course Basics
Read "Learning with a blog park" and build a personal technology blog
Follow the class blog "2018-2019-1 Information Security Professional Introduction (Beijing Electronic Technology Institute)".
Read "Using Open source Chinese managed code" and finish your homework (learn Python by yourself).
- Textbook Learning Guide:
- Introduction to Computer Science
- Teaching Materials Learning Guide
Learning Lab Building Practice Tutorial:
- Getting Started with Linux basics
Back to Catalog
Learning methods of teaching process
Progress is important: pay attention to the frontload, must keep up with the weekly progress, the textbook reading and summing up, teaching material exercises, quiz groups, projects. I and the teaching assistants will take each classmate seriously, please don't give up because of the difficulty, insist on down, will find own incredible.
Question and answer is very important: meet the knowledge difficulties, please ask a lot of questions, this is your right to be responsible for your own obligations. Questions and answers to the course discussion group
Practice is very important: solve the book exercises, practical teaching material examples, complete individual and team projects, only really digested the course content. You can learn in practice through the curriculum of the lab building or the virtual machines that you install yourself.
The study summary, the experiment report is very important: summarizes the study and the practice the question, obtains the teacher and the schoolmate's feedback, is the progress shortcut. After the completion of the study in the blog Park in the study process through the blog (essay) published, blog title "Study Number" information Security Professional Introduction "The X-week study Summary"
The summary template (Markdown) is as follows:
# 2018-2019-1, "An Introduction to Information security" chapter X Week study Summary # # Learning content Summary as simple as possible summary of this week study content try not to transcription, waste time to understand on the past, do not understand, learning has experience of the record # # Problems and solutions in teaching materials learning (a template: I read this paragraph of text (quoted text) and have this problem (ask a question). I checked the information, there are these statements (quote), according to my practice, I get these experiences (describe my experience). But I still do not understand, my confusion is (explain confusion). "or" I oppose the author's point of view (presenting the author's point of view, his own point of view, and the reason). )-Problem 1:xxxxxx-problem 1 Solution: xxxxxx-problem 2:xxxxxx-Problem 2 solution: xxxxxx-... # # # # # # # # # # # # # # # # # # # # # Problems and resolution in code debugging-Problem 1:xxxxxx-problem 1 Solution: xxxxxx-problem 2:xxxxxx- Problem 2 Solution: xxxxxx-# # # # [Code Hosting] (Code Cloud Learning Project Link) (statistics.sh script running results) # # last week's quiz summary-wrong title 1 and reason, understanding the situation-wrong title 2 and reason, understanding the situation-... # Other (sentiment, thinking, etc., Optional) xxxxxx## Learning progress Bar | | Lines of code (new/cumulative) | Blog volume (Add/accumulate) | Learning time (NEW/cumulative) | Important Growth | | -------- | :----------------:|:----------------:|:---------------: |:-----:|| Target | 5000 Rows | 30 Articles | 400 hours | || First week | 200/200 | 2/2 | 20/20 | || Second week | 300/500 | 2/4 | 18/38 | || Third week | 500/1000 | 3/7 | 22/60 | || Week Four | 300/1300 | 2/9 | 30/90 | | Try recording "Planned Learning Time" and "actual learning time" to see if you can improve your planning skills by the end of the semester. This work is very important and useful in learning. Time-consuming estimates of the formula: y=x+x/n, y=x-x/n, the number of training, X, Y is close. Reference: [Why is it so difficult to estimate a software engineering application] (http://www.cnblogs.com/xinz/archive/2011/04/05/2005978.html), [Software engineering estimation Method] (http:// www.cnblogs.com/xinz/archive/2011/04/06/2007294.html)-Plan study time: XX hours-Actual study time: XX hours-Improve the situation: (see more of the software engineer's ability self-evaluation form of modern software engineering courseware ] (http://www.cnblogs.com/xinz/p/3852177.html) # # References-[Learning Guide for in-depth understanding of computer systems V3] ([http://www.cnblogs.com/rocedu/p/ 5826467.html])-...
The results of the summary rendered in the above template with Markdown are as follows:
The blog to be submitted with the job, as shown in:
Back to Catalog
First week learning guide learning goals
- Familiar with the development environment under Linux system
- Familiar with the basic operation of VI
- Familiarity with the fundamentals of the GCC compiler
- Familiar with the common options for using the GCC compiler
- Proficiency in GDB debugging techniques
- Familiarity with makefile fundamentals and grammatical norms
- Mastering the generation and invocation methods of static and dynamic libraries
- Understand the principle of "high cohesion, low coupling" of module decomposition in C program
- Understanding the concept of links
Learning Resources
- Teaching Materials: Chapter I, seventh chapter
"In-depth understanding of computer system V3" Learning Guide
"Embedded Linux application Development Standard Tutorial" chapter III 3.1-3.5
Laboratory Building Course Materials: Experiment two or eight, course invitation code: W7FQKW4Y
Instructional Video: Refer to the tenth video
Video:
Vim Editor
A concise tutorial for GDB
LINXU System Programming: Experiment 2, 3, 4
Read "Anti-cheating": at any time to find students have plagiarism work, copying the code, instant course total of 0
Learning tasks
Must learn: The first chapter of the teaching materials, the seventh chapter (seventh chapter content can "embedded Linux application Development Standard Tutorial" chapter III 3.1-3.5), like lectures can refer to the blue ink Cloud class video, complete the blue ink cloud class in the test.
Learning content: Learn about other content in the resources according to your own situation
Laboratory Building Course Materials: Experiment Two, course invitation code: W7FQKW4Y
To host the code in the study, the Code link in the blog
Refer to the above Learning summary template, the learning process through the blog (essay) published, blog title "2018-2019-1" Information security system design fundamentals of the first week of learning summary ", blog (essay) to be submitted through the assignment, as of Sunday 23:59.
- A quick glance through the textbook, each chapter of the textbook presents at least one problem that you do not understand or most want to solve and answer these questions at the end of the semester
- Improve learning efficiency, improve the efficiency of blogging: as little as possible to extract the contents of the book, mainly written with doubts and the content of the harvest
- Deadline: This Sunday 24:00, not on time to send a blog to buckle 1 points, excellent blog plus 1 points
- Do not press the above template written to rewrite, otherwise it will buckle 1 points
- Non-plagiarism, violators total
Back to Catalog
Second week
Back to Catalog
Third week
Back to Catalog
Week Four
Back to Catalog
Week Five
Back to Catalog
Week Six
Back to Catalog
Seventh Week
Back to Catalog
Eighth Week
Back to Catalog
Nineth Week
Back to Catalog
Tenth Week
Back to Catalog
11th Week
Back to Catalog
12th Week
Back to Catalog
13th Week
Back to Catalog
14th Week
Back to Catalog
15th Week requirements
- Course Summary: This summary written good will be selected out into a blog book, we write carefully, the selected will send you a copy.
- The link in the text should be equipped with two-dimensional code, you can use the QQ tool or the function of the blog park, click on their own the bottom of each article icon has two-dimensional code:
Post a blog post
Back to Catalog
Textbooks and references
- Introduction to Computer Science
- Guiding professional norms of information security speciality in colleges and universities
- Linux Basics ()
- Method of construction (electronic version)
- Graphic cipher Technology
- Programmer must Read List 1.0
MOOC & Videos Other
Back to Catalog
Welcome to the "rocedu" public number (on the phone long by the two-dimensional code)
To do middle school, to do the common progress in practice!
Original address: https://www.cnblogs.com/rocedu/p/9577842.html
Recommended Sites: Blog Park, Sina Weibo, scallop back words, dky back word group, Youdao Yun notes, watercress reading
Copyright Disclaimer: Free Reprint-Non-commercial-non-derivative-retain attribution | Creative Commons by-nc-nd 3.0
If you think this article is helpful to you, please click on the bottom left corner of " good text to top " and " collect this article"
2018-2019-1 The teaching process of "Introduction to information Security speciality"