ECTS - Internet Security and Ethical Hacking

Internet Security and Ethical Hacking (ISE543) Course Detail

Course Name Course Code Season Lecture Hours Application Hours Lab Hours Credit ECTS
Internet Security and Ethical Hacking ISE543 Area Elective 3 0 0 3 5
Pre-requisite Course(s)
N/A
Course Language English
Course Type Information Systems Engineering Elective Courses
Course Level Natural & Applied Sciences Master's Degree
Mode of Delivery
Learning and Teaching Strategies .
Course Coordinator
Course Lecturer(s)
Course Assistants
Course Objectives The objective of this course is to provide the basics to the theory and the practice of cryptography and network security as well as ethical hacking.
Course Learning Outcomes The students who succeeded in this course;
  • Recognize the principles and practice of cryptography and network security
  • Apply principals of Internet security techniques to avoid security violations
  • Avare of security related issues.
Course Content Data encryption techniques and algorithms; public-key encryption, hash functions; digital signatures, authentication; network security; web security; system security, intruders, viruses, firewalls; the algorithms and data security tools; ethical hacking.

Weekly Subjects and Releated Preparation Studies

Week Subjects Preparation
1 Introduction Chapter 1
2 Classical Encryption Techniques Chapter 2
3 Bloch Chipper and Data Encryption Standards Chapter 3
4 Finite Fields and Advanced Encryption Standards Chapter 4,5
5 Confidentiality Using Conventional Encryption Chapter 7
6 Public-Key Cryptography Chapter 9,10
7 Message Authentication and Hash Functions Chapter 11
8 Hash and Mac Algorithms Chapter 12
9 Digital Signatures and Authentication Protocols. Chapter 13
10 Authentication Applications, Electronic Mail Security Chapter 14,15
11 IP Security, Web Security Chapter 16, 17
12 Intruders, Malicious Software, Firewalls Chapter 18,19,20
13 Introduction to Etichal Hacking Britz Chapter 1
14 Traditional and Contemporary Computer Crimes Britz Chapter 3,4
15 Final Examination Period Review of topics
16 Final Examination Period Review of topics

Sources

Course Book 1. Cryptography and Network Security: Principles and Practice, W. Stallings, 4/E, Prentice-Hall, 2005. ISBN: 0131873164
Other Sources 2. Marjie T. Britz, Computer Forensics and Cyber Crime: An Introduction, Prentice-Hall, 2008, ISBN:0132447495
3. Ferrell, O. C., Fraedrich, J., Ferrell, L., Business Ethics: Ethical Decision Making and Cases, 7th Ed., Houghton Mifflin, 2008
4. Defending Your Digital Assets Against Hackers, Crackers, Spies and Thieves. R.Nichols, D. Ryan, and J. Ryan. McGraw-Hill, 2000
5. Beauchamp, T. L., Bowie, N., and Arnold, D., Ethical Theory and Business, Pearson/Prentice-Hall, 2004
6. Network Security: A Beginner’s Guide. Eric Maiwald. McGraw_Hill. 2001
7. Wode Trappe, Lawrence Washington, Introduction to cryptography with coding theory, 2 Edition, 2006
8. Schultz, R. A., Contemporary Issues in Ethics and Information Technology, IRM Press, 2005
9. http://www.ieee-security.org
10. http://csrc.nist.gov
11. http://sans.org

Evaluation System

Requirements Number Percentage of Grade
Attendance/Participation - -
Laboratory - -
Application - -
Field Work - -
Special Course Internship - -
Quizzes/Studio Critics - -
Homework Assignments 3 30
Presentation - -
Project - -
Report - -
Seminar - -
Midterms Exams/Midterms Jury 1 30
Final Exam/Final Jury 1 40
Toplam 5 100
Percentage of Semester Work
Percentage of Final Work 100
Total 100

Course Category

Core Courses
Major Area Courses
Supportive Courses X
Media and Managment Skills Courses
Transferable Skill Courses

The Relation Between Course Learning Competencies and Program Qualifications

# Program Qualifications / Competencies Level of Contribution
1 2 3 4 5
1 An ability to apply advanced knowledge of computing and/or informatics to solve software engineering problems.
2 Develop solutions using different technologies, software architectures and life-cycle approaches.
3 An ability to design, implement and evaluate a software system, component, process or program by using modern techniques and engineering tools required for software engineering practices.
4 An ability to gather/acquire, analyze, interpret data and make decisions to understand software requirements.
5 Skills of effective oral and written communication and critical thinking about a wide range of issues arising in the context of working constructively on software projects. X
6 An ability to access information in order to follow recent developments in science and technology and to perform scientific research or implement a project in the software engineering domain. X
7 An understanding of professional, legal, ethical and social issues and responsibilities related to Software Engineering. X
8 Skills in project and risk management, awareness about importance of entrepreneurship, innovation and long-term development, and recognition of international standards of excellence for software engineering practices standards and methodologies. X
9 An understanding about the impact of Software Engineering solutions in a global, environmental, societal and legal context while making decisions. X
10 Promote the development, adoption and sustained use of standards of excellence for software engineering practices. X

ECTS/Workload Table

Activities Number Duration (Hours) Total Workload
Course Hours (Including Exam Week: 16 x Total Hours)
Laboratory
Application
Special Course Internship
Field Work
Study Hours Out of Class 16 5 80
Presentation/Seminar Prepration
Project
Report
Homework Assignments 3 15 45
Quizzes/Studio Critics
Prepration of Midterm Exams/Midterm Jury 1 20 20
Prepration of Final Exams/Final Jury 1 30 30
Total Workload 175