ECTS - Computer Security
Computer Security (ISE426) Course Detail
Course Name | Course Code | Season | Lecture Hours | Application Hours | Lab Hours | Credit | ECTS |
---|---|---|---|---|---|---|---|
Computer Security | ISE426 | Area Elective | 3 | 0 | 0 | 3 | 5 |
Pre-requisite Course(s) |
---|
N/A |
Course Language | English |
---|---|
Course Type | Technical Elective Courses |
Course Level | Bachelor’s Degree (First Cycle) |
Mode of Delivery | Face To Face |
Learning and Teaching Strategies | Lecture. |
Course Lecturer(s) |
|
Course Objectives | The objective of this course is to teach the students how to protect vital data from various types of attacks on the Internet. It also aims at teaching the theoretical aspects of security along with the practical applications using data security tools. |
Course Learning Outcomes |
The students who succeeded in this course;
|
Course Content | Cryptographic tools, user authentication, access control, intrusion detection, malicious software, denial-of-service attacks, firewalls, trusted computing, buffer overflow, software security, Windows security, Linux security. |
Weekly Subjects and Releated Preparation Studies
Week | Subjects | Preparation |
---|---|---|
1 | Overview | Chapter 1 (main text) |
2 | Overview | Chapter 1 |
3 | Cryptographic Tools | Chapter 2 |
4 | Cryptographic Tools | Chapter 2 |
5 | User Authentication | Chapter 3 |
6 | Access Control | Chapter 4 |
7 | Database Security | Chapter 5 |
8 | Midterm | |
9 | Malicious Software | Chapter 6 |
10 | Denial-of-Service Attacks | Chapter 7 |
11 | Intrusion Detection | Chapter 8 |
12 | Firewalls and Intrusion Prevention Systems | Chapter 9 |
13 | Operating system Security | Chapter 12 |
14 | Cloud and IoT Security | Chapter 13 |
15 | Final Examination Period | |
16 | Final Examination Period |
Sources
Course Book | 1. Computer Security: Principles and Practice, William Stallings; Lawrie Brown, Prentice-Hall, 2008. |
---|---|
Other Sources | 2. Network Security: Private Communication in a Public World. Kaufman, C.;R. Perlman; and M. Speciner, Prentice Hall, 2008 |
3. Security in Computing, Charles P. Pfleeger; Shari Lawrence Pfleeger., Prentice Hall, 2006 | |
4. Introduction to Computer Security, Matt Bishop, Addison-Wesley Professional. 2004 | |
5. Computer Security: Art and Science, Matt Bishop, Addison-Wesley Professional. 2002 | |
6. Cryptography and Network Security, William Stallings, 5th Edition, Prentice Hall, Due out November 2009 |
Evaluation System
Requirements | Number | Percentage of Grade |
---|---|---|
Attendance/Participation | - | - |
Laboratory | - | - |
Application | - | - |
Field Work | - | - |
Special Course Internship | - | - |
Quizzes/Studio Critics | - | - |
Homework Assignments | 4 | 30 |
Presentation | - | - |
Project | - | - |
Report | - | - |
Seminar | - | - |
Midterms Exams/Midterms Jury | 1 | 30 |
Final Exam/Final Jury | 1 | 40 |
Toplam | 6 | 100 |
Percentage of Semester Work | 65 |
---|---|
Percentage of Final Work | 35 |
Total | 100 |
Course Category
Core Courses | |
---|---|
Major Area Courses | X |
Supportive Courses | |
Media and Managment Skills Courses | |
Transferable Skill Courses |
The Relation Between Course Learning Competencies and Program Qualifications
# | Program Qualifications / Competencies | Level of Contribution | ||||
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | ||
1 | Adequate knowledge in mathematics, science and subjects specific to the software engineering discipline; the ability to apply theoretical and practical knowledge of these areas to complex engineering problems. | X | ||||
2 | The ability to identify, define, formulate and solve complex engineering problems; selecting and applying proper analysis and modeling techniques for this purpose. | X | ||||
3 | The ability to design a complex system, process, device or product under realistic constraints and conditions to meet specific requirements; the ability to apply modern design methods for this purpose. | |||||
4 | The ability to develop, select and utilize modern techniques and tools essential for the analysis and determination of complex problems in software engineering applications; the ability to utilize information technologies effectively. | X | ||||
5 | The ability to gather data, analyze and interpret results for the investigation of complex engineering problems or research topics specific to the software engineering discipline. | X | ||||
6 | The ability to work effectively in inter/inner disciplinary teams; ability to work individually. | |||||
7 | Effective oral and written communication skills in Turkish; the ability to write effective reports and comprehend written reports, to prepare design and production reports, to make effective presentations, to give and receive clear and understandable instructions. | |||||
8 | The knowledge of at least one foreign language; the ability to write effective reports and comprehend written reports, to prepare design and production reports, to make effective presentations, to give and receive clear and understandable instructions. | |||||
9 | Recognition of the need for lifelong learning; the ability to access information and follow recent developments in science and technology with continuous self-development | |||||
10 | The ability to behave according to ethical principles, awareness of professional and ethical responsibility. | |||||
11 | Knowledge of the standards utilized in software engineering applications. | |||||
12 | Knowledge on business practices such as project management, risk management and change management. | |||||
13 | Awareness about entrepreneurship, and innovation. | |||||
14 | Knowledge on sustainable development. | |||||
15 | Knowledge of the effects of software engineering applications on the universal and social dimensions of health, environment, and safety. | X | ||||
16 | Awareness of the legal consequences of engineering solutions. | |||||
17 | An ability to apply algorithmic principles, mathematical foundations, and computer science theory in the modeling and design of computer-based systems with the trade-offs involved in design choices. | X | ||||
18 | The ability to apply engineering approach to the development of software systems by analyzing, designing, implementing, verifying, validating and maintaining software systems. |
ECTS/Workload Table
Activities | Number | Duration (Hours) | Total Workload |
---|---|---|---|
Course Hours (Including Exam Week: 16 x Total Hours) | 16 | 3 | 48 |
Laboratory | |||
Application | |||
Special Course Internship | |||
Field Work | |||
Study Hours Out of Class | 16 | 2 | 32 |
Presentation/Seminar Prepration | |||
Project | |||
Report | |||
Homework Assignments | 4 | 5 | 20 |
Quizzes/Studio Critics | |||
Prepration of Midterm Exams/Midterm Jury | 1 | 20 | 20 |
Prepration of Final Exams/Final Jury | 1 | 30 | 30 |
Total Workload | 150 |