1, can be engaged in computer security system work in government agencies, public security taxation, social security transportation, national security departments, military, banks, financial institutions, securities companies, communication companies and e-commerce companies: mainly responsible for operating system, database, network, anti-virus, access control, encryption, authentication and other security work.
2. You can engage in the research and analysis of cryptographic technology in scientific research institutes, research institutions, information security product research and development enterprises such as Chianxin, Anheng, Lv Meng and other software development and electronic information-related units, and verify cryptographic algorithms in theory and practice in combination with the actual needs of the field, and give specific solutions.
3. Can be engaged in education and teaching research in colleges and universities and academy of sciences: mainly responsible for the explanation and teaching, subject research and teaching research of cryptography related courses.
4. You can engage in secure multi-party computing and homomorphic encryption in Huawei, Ali, Baidu, antivirus software, communication equipment vendors, communication operators, telecom enterprises, etc. : Mainly responsible for the design of cryptographic algorithms and protocols, research and development of cryptographic products and systems, security evaluation and testing of cryptographic systems, privacy computing, multi-party computing MPC, joint statistics, joint query, joint user-defined computing and anti-malicious attacks.
5. You can engage in the popularization and application of encryption technology and information security testing in cipher machine manufacturing enterprises, IT fields and manufacturing enterprises: the research and development of encryption technology is mainly responsible for the design and analysis of cryptographic algorithms, the application and management of passwords and related work of security protection, and the information security testing is mainly responsible for password testing, parameter testing and level protection testing.
6. Can be engaged in password management in computer technology enterprises, technology companies and security engineering centers, mainly responsible for the operation and maintenance management of password keys, security gateways, security chips, password platforms, system authentication, computer applications and information security.
Training objectives:
This major adheres to the principle of moral education, aiming at cultivating patriotic, enterprising, innovative and speculative talents with solid basic knowledge of mathematics, physics and network security. Professional graduates should master the comprehensive knowledge of cryptography theory and technology, password management, password application, password evaluation and so on.
Have the corresponding scientific literacy, practical ability, innovative ability and systematic thinking ability, and have a high industrial perspective and international perspective. Can be engaged in password evaluation, password management, password system design and research and development, can also be engaged in computer science and technology application related neighborhood work.