Please wait a minute...
Computer & Telecommunication  2015, Vol. 1 Issue (5): 19-21    DOI:
Current Issue | Archive | Adv Search |
Design and Research on Information Security Course Experiment Teaching
Zhang Tao,Yin Mengjia,Chen Xiaowen
Hubei Engineering University
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  Experiment teaching should be integrated in new knowledge, new technology and new experiment teaching methods. Based on the practice, this paper summaries and studies on the experimental teaching of Information Security course, analyzes the targets of experiment teaching; then designs the concrete experimental contents. It makes students to carry on the experiments in different levels and different directions. Through the experiments, students improves the practical ability and masters relevant theoretical knowledge.
Key wordsinformation security      experiment teaching      experiment design     
Published: 01 January 1900
ZTFLH:  G642  

Cite this article:

Zhang Tao, Yin Mengjia, Chen Xiaowen. Design and Research on Information Security Course Experiment Teaching. Computer & Telecommunication, 2015, 1(5): 19-21.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2015/V1/I5/19

[1] YANG Ye. Research on the Information Security and Management Major Personnel Training Based on“1+X”Certificate System[J]. 电脑与电信, 2021, 1(6): 6-8.
[2] KUANG Hui. Research on Information Security of Computer Network in 5G Communication Era[J]. 电脑与电信, 2020, 1(8): 33-.
[3] ZHANG Shi-jun. Research on the EarlyWarning and Control System of Information Security Incident Based onWebsite[J]. 电脑与电信, 2017, 1(12): 50-52.
[4] Zhao Xiaomeng, Zhou Junjie. Management System of Mobile Payment Based on Short-range Visible Light Communication[J]. 电脑与电信, 2017, 1(10): 10-13.
[5] Bai Yu. Analysis on Network Security and Information Encryption Technology[J]. 电脑与电信, 2016, 1(8): 53-54.
[6] Xu Haidong. Research and Suggestion on Data Privacy Protection in Cloud Computing[J]. 电脑与电信, 2016, 1(8): 112-113.
[7] Lai Jinzhi. Research on Information Security Protection System of Campus Network in Higher Vocational Colleges[J]. 电脑与电信, 2016, 1(7): 65-67.
[8] Chen Zhangrong. Research on the Computer Information Security Technology and Its Protection[J]. 电脑与电信, 2016, 1(7): 68-70.
[9] Zheng Rui, Yang GuiFu, Wang Dong. A Brief Talk on the Application of Project Teaching and Simulator in Computer Network Teaching[J]. 电脑与电信, 2016, 1(6): 40-42.
[10] Yu Xiangqian. Research on the Tertiary Hospital Informatization Level Protection Plan[J]. 电脑与电信, 2016, 1(6): 65-66.
[11] Zhong Gengfang. Study on the Enterprise Mobile Application Security Scheme[J]. 电脑与电信, 2015, 1(8): 64-66.
[12] Li Yingjie. The Application of VPN Technology in Computer Network Information Security[J]. 电脑与电信, 2015, 1(5): 27-28.
[13] Zhang Zheng. Study on the Control of Modern Enterprise Information Security Ri[J]. 电脑与电信, 2015, 1(4): 74-76.
[14] Cai Zhifeng. Research on the Computer Network Information Security and Protection Strategy in Colleges and Universities[J]. 电脑与电信, 2015, 1(10): 23-25.
[15] Guan Chengbin Wang Jie Zhang Fubao Song Jie. Application of Matlab in Digital Signal Processing Experiment Teaching[J]. , 2011, 1(11): 0-0.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd