KONG Chun Ho, Hopkin
BSc (Hons) in Information
Security graduate
As one of the first graduates of the Bachelor of Science Degree in Information Security (INS) who pursues further studies in PolyU after graduation, I am grateful for being equipped with abundant knowledge and skills through studying for the INS degree. The INS programme did not only allow us to have an understanding on various Information Security topics, for example, Forensics, Cryptography, Penetration Testing, etc., but also provided resources, like the Information Security Laboratory with state-of-the-art Information Security hardware and software including firewalls and network switches, for students to perform real-life intrusion simulations.
These knowledge and skills have not just facilitated my path to research new security technologies in my Master of Philosophy (MPhil) study, but also enabled me to make contributions to current students of the programme by teaching them with novel teaching methodologies. The image above is exactly an example. It was taken in an event during which I gave a talk to Information Security industry members on the topic of “PolyU Teachings on the Internet of Things (IoT) Security” using our newly developed IoT Penetration Testing Kit offered in our courses.
Yuen Chun Ming, Nelson
BSc (Hons) in Information
Security graduate
I am pleased to be among the first batch of graduates of the BSc(Hons) in Information Security degree programme. Through this programme, I have learnt a lot of useful knowledge and skills in different areas of information security such as network security, digital forensic, encryption, database, operation system and so on. Now I have high awareness of security threats of systems and understand how to prevent them.
This degree programme is very practical which provides opportunities for students to apply and demonstrate security technique. For example, the integrated project lets us build a social website like Instagram which puts strong emphasis on information security.
EIE Department has set up an information security laboratory to facilitate our learning. The laboratory includes PCs and servers with strong capacity and therefore we do not need to worry about the power of the hardware when we perform some attack and defense deployments such as DDoS attacks.