Cybercrime affects almost all countries. In order to face it, well-trained specialists in advanced computer technologies are needed. The three participating Partner Countries - Vietnam, Kazakhstan, and Moldova - suffer from a shortage of highly qualified graduates (managers, technicians, and engineers) properly trained to address this major threat for companies. The need for university education aimed at training specialists in this field is, thus, very strong. Equally needed are academic and professional staff that can develop and deliver professional and continuing education to keep professionals abreast of the latest developments in this constantly evolving field. The LMPI project responds to these needs, by focusing on curriculum development in the area of computer systems and network security.
A survey of 500 companies will analyze the needs in basic and specific skills in businesses and therefore the training needs and specialization required for the Bachelor’s and Master’s degrees. It will then list them, break them down into the semester’s curriculum and different teaching units. The teaching units would be practical work, work laboratory, personal work and allocation of ECTS credits. It will then be possible to design the courses contents and educational resources in each of the three countries and to set up a center of excellence in each of the three leading universities (resource center and technology platform equipped by the project).
|
Subject |
Curriculum |
|||
|
Credits |
Lecture |
Lab |
Exercise |
|
|
(Hours) |
(Hours) |
(Hours) |
||
A |
General Knowledge |
9 |
|
|
|
1 |
Innovation and Entrepreneurship |
3 |
30 |
|
30 |
2 |
Leadership Management |
3 |
30 |
|
30 |
3 |
Advanced Philosophy |
3 |
30 |
|
30 |
B |
Compulsory Knowledge |
27 |
|
|
|
1 |
3 |
45 |
|
15 |
|
2 |
Advanced Computer Architecture |
3 |
45 |
|
15 |
3 |
3 |
45 |
|
15 |
|
4 |
3 |
45 |
|
15 |
|
5 |
3 |
45 |
|
15 |
|
6 |
3 |
45 |
|
15 |
|
7 |
3 |
45 |
|
15 |
|
8 |
Computer Network Security Assessment |
3 |
45 |
|
15 |
9 |
3 |
45 |
|
15 |
|
C |
Selective Knowledge |
15 |
|
|
|
1 |
Malware Analysis |
3 |
45 |
|
15 |
2 |
3 |
45 |
|
15 |
|
3 |
3 |
45 |
|
15 |
|
4 |
3 |
45 |
|
15 |
|
5 |
3 |
45 |
|
15 |
|
6 |
3 |
45 |
|
15 |
|
7 |
3 |
45 |
|
15 |
|
8 |
3 |
45 |
|
15 |
|
D |
10 |
|
|
|
|
|
Total |
61 |
|
|
|