ECTS - Cyber Security
Cyber Security (CMPE535) Course Detail
Course Name | Course Code | Season | Lecture Hours | Application Hours | Lab Hours | Credit | ECTS |
---|---|---|---|---|---|---|---|
Cyber Security | CMPE535 | Area Elective | 3 | 0 | 0 | 3 | 5 |
Pre-requisite Course(s) |
---|
N/A |
Course Language | English |
---|---|
Course Type | Elective Courses |
Course Level | Ph.D. |
Mode of Delivery | Face To Face |
Learning and Teaching Strategies | Lecture. |
Course Lecturer(s) |
|
Course Objectives | The objective of the course is - to introduce current state of the art, historical background, basic terminology and essential technologies in cyber security domain - to elucidate legal, ethical, political and economical influences of cyber and information war |
Course Learning Outcomes |
The students who succeeded in this course;
|
Course Content | Basic concepts in cyber space and security, cyber crime, IT law, computer law and cyber law, computer forensics, information security and assurance, computer and network security, cyber warfare, international standards on cyber security. |
Weekly Subjects and Releated Preparation Studies
Week | Subjects | Preparation |
---|---|---|
1 | Introduction: the cyber security challenge | Lecture notes |
2 | Technology and policy background - History of the Internet - National and International Legal regulations - Owner of the cyber space | Lecture notes |
3 | Cyber crime -1 - Cyber crime - Traditional computer crime: Early hackers - Cotemporary computer crime - Identity theft and identity fraud. | Lecture notes + Other sources-2 |
4 | Cyber crime -2 - Terrorism and organized crime in cyber space - Governmental and legal issues. | Lecture notes + Other sources-2 |
5 | IT law, Cyber law, Computer law-1 | Lecture notes |
6 | IT law, Cyber law, Computer law-2 | Lecture notes |
7 | Computer Forensics - Terminology - Computer related evidence - Searching and seizing - Evidence processing and report preparation | Lecture notes + Other sources-2 |
8 | Information security and assurance - Risk management - Evaluation and mitigation - Security education and awareness training. - Personnel security - Physical security | Lecture notes + Other sources-3 |
9 | Computer and network security-1 - Cryptology - Data integrity - Mutual trust and user authentication - Application security (email, web, IP-sec) - Security on network (VPN, VLAN) | Lecture notes + Other sources-1 |
10 | Computer and network security-2 - Attack types and security risks - Counter measures - Principles and Practical security applications | Lecture notes + Other sources-1 |
11 | Cyber Warfare | Lecture notes + Other sources-3 |
12 | ISO/IEC-27032 Cyber security guidelines | Lecture notes |
13 | Assignment reports and presentations | None |
14 | Contemporary topics in cyber security. | Lecture notes |
15 | Review | |
16 | Review |
Sources
Other Sources | 1. Cryptography and Network Security: Principles and Practice, William Stallings, Prentice Hall. |
---|---|
2. Computer Forensics and Cyber Crime, Marjie T. Britz, Pearson. | |
3. Defending Your Digital Assets Against Hackers, Crackers Spies and Thieves, Randall K. Nicolas, Daniel J. Ryan, Julie J.C.H. Ryan. | |
4. Cyber War: The Next Threat to National Security and What to Do About It, Richard O. Clarke, Harper Collins | |
5. Cybersecurity and Cyberwar: What Everyone Needs to Know, P.W. Singer, Allan Freidman, Oxford University Press. |
Evaluation System
Requirements | Number | Percentage of Grade |
---|---|---|
Attendance/Participation | - | - |
Laboratory | - | - |
Application | - | - |
Field Work | - | - |
Special Course Internship | - | - |
Quizzes/Studio Critics | - | - |
Homework Assignments | - | - |
Presentation | - | - |
Project | 2 | 30 |
Report | - | - |
Seminar | - | - |
Midterms Exams/Midterms Jury | 1 | 30 |
Final Exam/Final Jury | 1 | 40 |
Toplam | 4 | 100 |
Percentage of Semester Work | 60 |
---|---|
Percentage of Final Work | 40 |
Total | 100 |
Course Category
Core Courses | X |
---|---|
Major Area Courses | |
Supportive Courses | |
Media and Managment Skills Courses | |
Transferable Skill Courses |
The Relation Between Course Learning Competencies and Program Qualifications
# | Program Qualifications / Competencies | Level of Contribution | ||||
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | ||
1 | Ability to carry out advanced research activities, both individual and as a member of a team | |||||
2 | Ability to evaluate research topics and comment with scientific reasoning | |||||
3 | Ability to initiate and create new methodologies, implement them on novel research areas and topics | |||||
4 | Ability to produce experimental and/or analytical data in systematic manner, discuss and evaluate data to lead scintific conclusions | |||||
5 | Ability to apply scientific philosophy on analysis, modelling and design of engineering systems | |||||
6 | Ability to synthesis available knowledge on his/her domain to initiate, to carry, complete and present novel research at international level | |||||
7 | Contribute scientific and technological advancements on engineering domain of his/her interest area | |||||
8 | Contribute industrial and scientific advancements to improve the society through research activities |
ECTS/Workload Table
Activities | Number | Duration (Hours) | Total Workload |
---|---|---|---|
Course Hours (Including Exam Week: 16 x Total Hours) | 16 | 3 | 48 |
Laboratory | |||
Application | |||
Special Course Internship | |||
Field Work | |||
Study Hours Out of Class | 16 | 2 | 32 |
Presentation/Seminar Prepration | |||
Project | |||
Report | |||
Homework Assignments | 2 | 8 | 16 |
Quizzes/Studio Critics | |||
Prepration of Midterm Exams/Midterm Jury | 1 | 10 | 10 |
Prepration of Final Exams/Final Jury | 1 | 20 | 20 |
Total Workload | 126 |