Cyber Security (CMPE535) Course Detail

Course Name Course Code Season Lecture Hours Application Hours Lab Hours Credit ECTS
Cyber Security CMPE535 Area Elective 3 0 0 3 5
Pre-requisite Course(s)
N/A
Course Language English
Course Type Computer Engineering Elective Courses
Course Level Ph.D.
Mode of Delivery Face To Face
Learning and Teaching Strategies Lecture.
Course Coordinator
Course Lecturer(s)
Course Assistants
Course Objectives The objective of the course is - to introduce current state of the art, historical background, basic terminology and essential technologies in cyber security domain - to elucidate legal, ethical, political and economical influences of cyber and information war
Course Learning Outcomes The students who succeeded in this course;
  • Express the concepts in cyber security domain.
  • Discuss the security technologies in cyber space.
  • Describe the involvement of IT law, international standards and counter measures in cyber security
  • Recall basic knowledge of the computer crime and network security
Course Content Basic concepts in cyber space and security, cyber crime, IT law, computer law and cyber law, computer forensics, information security and assurance, computer and network security, cyber warfare, international standards on cyber security.

Weekly Subjects and Releated Preparation Studies

Week Subjects Preparation
1 Introduction: the cyber security challenge Lecture notes
2 Technology and policy background - History of the Internet - National and International Legal regulations - Owner of the cyber space Lecture notes
3 Cyber crime -1 - Cyber crime - Traditional computer crime: Early hackers - Cotemporary computer crime - Identity theft and identity fraud. Lecture notes + Other sources-2
4 Cyber crime -2 - Terrorism and organized crime in cyber space - Governmental and legal issues. Lecture notes + Other sources-2
5 IT law, Cyber law, Computer law-1 Lecture notes
6 IT law, Cyber law, Computer law-2 Lecture notes
7 Computer Forensics - Terminology - Computer related evidence - Searching and seizing - Evidence processing and report preparation Lecture notes + Other sources-2
8 Information security and assurance - Risk management - Evaluation and mitigation - Security education and awareness training. - Personnel security - Physical security Lecture notes + Other sources-3
9 Computer and network security-1 - Cryptology - Data integrity - Mutual trust and user authentication - Application security (email, web, IP-sec) - Security on network (VPN, VLAN) Lecture notes + Other sources-1
10 Computer and network security-2 - Attack types and security risks - Counter measures - Principles and Practical security applications Lecture notes + Other sources-1
11 Cyber Warfare Lecture notes + Other sources-3
12 ISO/IEC-27032 Cyber security guidelines Lecture notes
13 Assignment reports and presentations None
14 Contemporary topics in cyber security. Lecture notes
15 Review
16 Review

Sources

Other Sources 1. Cryptography and Network Security: Principles and Practice, William Stallings, Prentice Hall.
2. Computer Forensics and Cyber Crime, Marjie T. Britz, Pearson.
3. Defending Your Digital Assets Against Hackers, Crackers Spies and Thieves, Randall K. Nicolas, Daniel J. Ryan, Julie J.C.H. Ryan.
4. Cyber War: The Next Threat to National Security and What to Do About It, Richard O. Clarke, Harper Collins
5. Cybersecurity and Cyberwar: What Everyone Needs to Know, P.W. Singer, Allan Freidman, Oxford University Press.

Evaluation System

Requirements Number Percentage of Grade
Attendance/Participation - -
Laboratory - -
Application - -
Field Work - -
Special Course Internship - -
Quizzes/Studio Critics - -
Homework Assignments - -
Presentation - -
Project 2 30
Report - -
Seminar - -
Midterms Exams/Midterms Jury 1 30
Final Exam/Final Jury 1 40
Toplam 4 100
Percentage of Semester Work 60
Percentage of Final Work 40
Total 100

Course Category

Core Courses
Major Area Courses
Supportive Courses X
Media and Managment Skills Courses
Transferable Skill Courses

The Relation Between Course Learning Competencies and Program Qualifications

# Program Qualifications / Competencies Level of Contribution
1 2 3 4 5
1 To become familiar with the state-of-the art and the literature in the software engineering research domain X
2 An ability to conduct world-class research in software engineering and publish scholarly articles in top conferences and journals in the area
3 Be able to conduct quantitative and qualitative studies in software engineering X
4 Acquire skills needed to bridge software engineering academia and industry and to develop and apply scientific software engineering approaches to solve real-world problems X
5 An ability to access information in order to follow recent developments in science and technology and to perform scientific research or implement a project in the software engineering domain.
6 An understanding of professional, legal, ethical and social issues and responsibilities related to Software Engineering. X
7 Skills in project and risk management, awareness about importance of entrepreneurship, innovation and long-term development, and recognition of international standards of excellence for software engineering practices standards and methodologies.
8 An understanding about the impact of Software Engineering solutions in a global, environmental, societal and legal context while making decisions.
9 Promote the development, adoption and sustained use of standards of excellence for software engineering practices.

ECTS/Workload Table

Activities Number Duration (Hours) Total Workload
Course Hours (Including Exam Week: 16 x Total Hours) 16 3 48
Laboratory
Application
Special Course Internship
Field Work
Study Hours Out of Class 16 2 32
Presentation/Seminar Prepration
Project
Report
Homework Assignments 2 8 16
Quizzes/Studio Critics
Prepration of Midterm Exams/Midterm Jury 1 10 10
Prepration of Final Exams/Final Jury 1 20 20
Total Workload 126