AEPH
Home > Occupation and Professional Education > Vol. 2 No. 10 (OPE 2025) >
Reconstruction and Optimization of the Cyberspace Security Curriculum System Based on the Ternary Integration of Ideological and Political Education, Science and Education, and Practice
DOI: https://doi.org/10.62381/O252A05
Author(s)
Wei Xu, Hua Li*
Affiliation(s)
School of Artificial Intelligence, Yulin Normal University, Yulin, Guangxi, China *Corresponding Author
Abstract
Under the wave of digitization, the importance of cybersecurity in cyberspace is becoming increasingly prominent, and the demand for professional talents in this field is becoming more urgent in society. The requirements for talent quality are also showing a diversified trend. However, there are some shortcomings in the current curriculum system of cybersecurity majors, such as insufficient integration of moral education elements, inadequate coordination mechanism between scientific research and teaching, and weak links in cultivating students' practical abilities. This article deeply analyzes the necessity of reconstructing and optimizing the curriculum system of cyberspace security based on the integration of moral education, science and education, and practice. Elaborate on the specific ideas of reconstruction and practical optimization strategies, in order to build a more scientific and reasonable curriculum system for the field of cybersecurity, and provide practical talent training reference plans that can be referenced by other universities.
Keywords
Cyberspace Security; Curriculum System; Triple Fusion; Refactoring Optimization
References
[1] Haodong Lu, Liqin Qian, Minjia Shi. An infinite family of binary cyclic codes and two infinite families of ternary cyclic codes with good parameters. Cryptography and Communications, 2025, 17(5):1407-1425. [2] Banjar A, Dawood H, Zeb J B. Sports video summarization using acoustic symmetric ternary codes and SVM. Applied acoustics, 2024, 216(Jan.): 109795.1-109795.10. [3] Zhang L, Wang G, You X, et al. Research on Basic Concept and Conceptual Model of Cyberspace Map. Journal of Geomatics, 2023, 15(2): 45-53. [4] Zhang L, Wang G, You X, et al. Research on the Cyberspace Map and Its Conceptual Model. ISPRS International Journal of Geo-Information, 2023, 12(9):16. [5] Yang Y, Wu B, Zhao K, et al. Tweet Stance Detection: A Two-stage DC-BILSTM Model Based on Semantic Attention//2020 IEEE Fifth International Conference on Data Science in Cyberspace (DSC). IEEE, 2020. [6] Shi X, Liu Y. Network Big Data: Current Status and Future Trends// 2017 IEEE International Conference on Big Data. 2017: 1230-1235. [7] Tengfei W, Renfeng M A, Bo H, et al. The Theoretical Perspective of the Production of Space of Old Industrial Districts based on Creative Fix: A Case of Creative 1956 Industrial Park. Modern Urban Research, 2019. [8] Ma J, Li Z, Bi Y,et al. Training of Outstanding Talents in Cyberspace Security under the Background of Digital Intelligence. Advances in Intelligent Systems Research, 2024:112-120. [9] Hai-Lun L, Yuan-Zhuo W, Yan-Tao J, et al. Network Big Data Oriented Knowledge Fusion Methods: A Survey. Chinese Journal of Computers, 2017. [10] Abiteboul S. Issues in ethical data management//International Symposium. 2017:1-1. [11] Yu-Long Z, Jin Y E. Research on DDo S attack detection and judgment based on stream eigenvalues of software defined networks. Journal of Guangxi University (Natural Science Edition), 2017.
Copyright @ 2020-2035 Academic Education Publishing House All Rights Reserved