SEMESTER | KODE / CODE | MATA KULIAH / COURSE | SKS |
---|---|---|---|
1 | CS1001 | Aritificial Intelligence | 3 |
CS1002 | Computer and Network Security | 3 | |
CS1003 | Advanced Database | 3 | |
CS1004 | Software Engineering for Business | 3 | |
CS1005 | Research Methodology | 3 | |
TOTAL SKS/KREDIT | 15 | ||
2 | CS1206 | Mobile Computing | 3 |
CS1207 | Design Analysis Big Data | 3 | |
CS1208 | Signal Processing | 3 | |
CS1209 | Computational Intelligence | 3 | |
CS1210 | Cyber-Security | 3 | |
TOTAL SKS/KREDIT | 15 | ||
3 | CS2215 | Thesis I | 6 |
Choice of Artificial Intelligence Concentration | |||
AI2111 | Applied Machine Learning & Pattern Recognition | 3 | |
AI2112 | Deep Learning for Visual Recognition | 3 | |
AI2113 | Knowledge Representation and Reasoning | 3 | |
AI2114 | Natural Language Processing | 3 | |
Choice of Cyber Security Concentration | |||
IS2111 | Network Penetration Testing | 3 | |
IS2112 | Threat Analysis/Security Analysis (Malware Analysis & Reverse Engineering) | 3 | |
IS2113 | Cryptography and its Applications | 3 | |
IS2114 | Information Security Management (Monitoring) | 3 | |
TOTAL SKS/KREDIT | 18 | ||
4 | CS2116 | Thesis II | 6 |
TOTAL SKS/KREDIT | 6 | ||
45 |
Majoring AI
Smt | Kode MK/ Blok | Nama MK/Blok1 | Bobot sks2 |
---|---|---|---|
I | Artificial Intelligence | 3 | |
Computer and Network Security | 3 | ||
Advanced Database (Big Data) | 3 | ||
Cyber-Security | 3 | ||
Research Methodology | 3 | ||
Sub total Smt I | 15 | ||
II | Mobile Computing | 3 | |
Knowledge Representation and reasoning | 3 | ||
Applied Machine Learning & Pattern Recognition | 3 | ||
Natural Language Processing | 3 | ||
Computational Intelligence | 3 | ||
Sub total Smt II | 15 | ||
III | Deep Learning for Visual Recognition | 3 | |
Thesis-1 | 6 | ||
Sub total Smt III | 9 | ||
IV | Thesis-2 | 6 | |
Sub total Smt IV | 6 | ||
Total sks | 45 |
Majoring Cybersecurity
Smt | Kode MK/ Blok | Nama MK/Blok1 | Bobot sks2 |
---|---|---|---|
I | Artificial Intelligence | 3 | |
Computer and Network Security | 3 | ||
Advanced Database (Big Data) | 3 | ||
Cyber-Security | 3 | ||
Research Methodology | 3 | ||
Sub total Smt I | 15 | ||
II | Mobile Computing | 3 | |
Network Penetration Testing | 3 | ||
Cryptography and its Applications | 3 | ||
Computational Intelligence | 3 | ||
Information Security Management | 3 | ||
Sub total Smt II | 15 | ||
III | Threat Analysis/Security Analysis (Malware Analysis & Reverse Engineering) | 3 | |
Thesis-1 | 6 | ||
Sub total Smt III | 9 | ||
IV | Thesis-2 | 6 | |
Sub total Smt IV | 6 | ||
Total sks | 45 |