Academic Year |
2025Year |
School/Graduate School |
School of Informatics and Data Science |
Lecture Code |
KA238001 |
Subject Classification |
Specialized Education |
Subject Name |
情報科学演習IV(計算機科学プログラム) |
Subject Name (Katakana) |
ジョウホウカガクエンシュウ4 |
Subject Name in English |
Informatics and Data Science Exercise IV |
Instructor |
KONDO TOHRU,ZHENG JUNJUN,DING YEPENG |
Instructor (Katakana) |
コンドウ トオル,テイ シュンシュン,テイ ヨウホウ |
Campus |
Higashi-Hiroshima |
Semester/Term |
3rd-Year, Second Semester, 4Term |
Days, Periods, and Classrooms |
(4T) Fri5-7:IMC-Main 2F Seminar Rm |
Lesson Style |
Seminar |
Lesson Style (More Details) |
Face-to-face |
Exercise |
Credits |
1.0 |
Class Hours/Week |
3 |
Language of Instruction |
B
:
Japanese/English |
Course Level |
3
:
Undergraduate High-Intermediate
|
Course Area(Area) |
25
:
Science and Technology |
Course Area(Discipline) |
02
:
Information Science |
Eligible Students |
|
Keywords |
Cybersecurity, Software Engineering |
Special Subject for Teacher Education |
|
Special Subject |
|
Class Status within Educational Program (Applicable only to targeted subjects for undergraduate students) | This course belongs to the specialized education subjects of the Department of Information Science. By using the knowledge of security and software acquired in previous classes to solve problems, students will not only deepen their understanding of these concepts but also develop problem-solving skills. |
---|
Criterion referenced Evaluation (Applicable only to targeted subjects for undergraduate students) | Computer Science Program (Abilities and Skills) ・A. Information infrastructure development technology, information processing technology, technology that analyzes data and creates new added value. ・B. Ability to identify new problems independently and solve them through quantitative and logical thinking based on data, multifaceted perspectives, and advanced information processing and analysis. ・D3. Knowledge of hardware and software and programming ability to process data efficiently.
Data Science Program (Knowledge and Understanding) ・D1. Knowledge and ability to understand the theoretical framework of statistics and data analysis and to analyze qualitative/quantitative information of big data accurately and efficiently. (Abilities and Skills) ・A. Information infrastructure development technology, information processing technology, technology that analyzes data and creates new added value. ・B. Ability to identify new problems independently and solve them through quantitative and logical thinking based on data, multifaceted perspectives, and advanced information processing and analysis.
Intelligence Science Program (Abilities and Skills) ・A. Information infrastructure development technology, information processing technology, technology that analyzes data and creates new added value. ・B. Ability to identify new problems independently and solve them through quantitative and logical thinking based on data, multifaceted perspectives, and advanced information processing and analysis. (Comprehensive Abilities) ・D3. Ability to grasp complexly intertwined social needs and issues from a bird's-eye view and solve issues with a multifaceted perspective and analytical ability based on a wide range of knowledge in intelligent science. |
Class Objectives /Class Outline |
This exercise will includes two themes based on the knowledge learned through Informatics and data science, Exercises I-III. The goal is to acquire the ability to find a solution to a given exercise or problem, address it, and report the results. |
Class Schedule |
Lesson1 Guidance
Lesson2 to Lesson7 Hands on exercises on two different topics, three weeks each.
* Topic1 Cybersecurity Exercises Review basic knowledge of security related to OS, networks, and the web, and practice attack and defense techniques using systems with vulnerabilities. 1. OS Security 2. Network Security 3. Web Security
* Topic2 Software Development Learn about version control, deployment techniques using containers, and other aspects of software development. 1. Version Control 2. Container Technology 3. Web Application Development |
Text/Reference Books,etc. |
handouts |
PC or AV used in Class,etc. |
|
(More Details) |
handouts, PC (including BYOD) |
Learning techniques to be incorporated |
|
Suggestions on Preparation and Review |
(Topic 1) Cybersecurity Exercises 1. Research the basic commands for Linux and Windows. 2. Review the basic operations of Wireshark. 3. Study the basic knowledge of HTML and JavaScript, especially DOM manipulation and escaping special characters.
(Topic 2) Software Development 1. Research the basic Git commands in the provided materials in advance. 2. Research the overview of Docker in the provided materials in advance. 3. Research the basic concepts of web applications (the roles of frontend, backend, and databases) and REST APIs in the provided materials in advance. |
Requirements |
- Submit assignments for all themes by the deadline. - Comply with all laws and university regulations related to information security. - Review the basics of Python programming. - Review the basics of databases. - Since exercises will be conducted in pairs or groups, actively engage in communication. |
Grading Method |
Evaluation based on a comprehensive assessment of each exercise (60 points or higher) and the exam results (60 points or higher). |
Practical Experience |
|
Summary of Practical Experience and Class Contents based on it |
|
Message |
|
Other |
|
Please fill in the class improvement questionnaire which is carried out on all classes. Instructors will reflect on your feedback and utilize the information for improving their teaching. |