ECTS - Internet Security and Ethical Hacking
Internet Security and Ethical Hacking (ISE543) Course Detail
Course Name | Course Code | Season | Lecture Hours | Application Hours | Lab Hours | Credit | ECTS |
---|---|---|---|---|---|---|---|
Internet Security and Ethical Hacking | ISE543 | Area Elective | 3 | 0 | 0 | 3 | 5 |
Pre-requisite Course(s) |
---|
N/A |
Course Language | English |
---|---|
Course Type | Elective Courses |
Course Level | Natural & Applied Sciences Master's Degree |
Mode of Delivery | |
Learning and Teaching Strategies | . |
Course Lecturer(s) |
|
Course Objectives | The objective of this course is to provide the basics to the theory and the practice of cryptography and network security as well as ethical hacking. |
Course Learning Outcomes |
The students who succeeded in this course;
|
Course Content | Data encryption techniques and algorithms; public-key encryption, hash functions; digital signatures, authentication; network security; web security; system security, intruders, viruses, firewalls; the algorithms and data security tools; ethical hacking. |
Weekly Subjects and Releated Preparation Studies
Week | Subjects | Preparation |
---|---|---|
1 | Introduction | Chapter 1 |
2 | Classical Encryption Techniques | Chapter 2 |
3 | Bloch Chipper and Data Encryption Standards | Chapter 3 |
4 | Finite Fields and Advanced Encryption Standards | Chapter 4,5 |
5 | Confidentiality Using Conventional Encryption | Chapter 7 |
6 | Public-Key Cryptography | Chapter 9,10 |
7 | Message Authentication and Hash Functions | Chapter 11 |
8 | Hash and Mac Algorithms | Chapter 12 |
9 | Digital Signatures and Authentication Protocols. | Chapter 13 |
10 | Authentication Applications, Electronic Mail Security | Chapter 14,15 |
11 | IP Security, Web Security | Chapter 16, 17 |
12 | Intruders, Malicious Software, Firewalls | Chapter 18,19,20 |
13 | Introduction to Etichal Hacking | Britz Chapter 1 |
14 | Traditional and Contemporary Computer Crimes | Britz Chapter 3,4 |
15 | Final Examination Period | Review of topics |
16 | Final Examination Period | Review of topics |
Sources
Course Book | 1. Cryptography and Network Security: Principles and Practice, W. Stallings, 4/E, Prentice-Hall, 2005. ISBN: 0131873164 |
---|---|
Other Sources | 2. Marjie T. Britz, Computer Forensics and Cyber Crime: An Introduction, Prentice-Hall, 2008, ISBN:0132447495 |
3. Ferrell, O. C., Fraedrich, J., Ferrell, L., Business Ethics: Ethical Decision Making and Cases, 7th Ed., Houghton Mifflin, 2008 | |
4. Defending Your Digital Assets Against Hackers, Crackers, Spies and Thieves. R.Nichols, D. Ryan, and J. Ryan. McGraw-Hill, 2000 | |
5. Beauchamp, T. L., Bowie, N., and Arnold, D., Ethical Theory and Business, Pearson/Prentice-Hall, 2004 | |
6. Network Security: A Beginner’s Guide. Eric Maiwald. McGraw_Hill. 2001 | |
7. Wode Trappe, Lawrence Washington, Introduction to cryptography with coding theory, 2 Edition, 2006 | |
8. Schultz, R. A., Contemporary Issues in Ethics and Information Technology, IRM Press, 2005 | |
9. http://www.ieee-security.org | |
10. http://csrc.nist.gov | |
11. http://sans.org |
Evaluation System
Requirements | Number | Percentage of Grade |
---|---|---|
Attendance/Participation | - | - |
Laboratory | - | - |
Application | - | - |
Field Work | - | - |
Special Course Internship | - | - |
Quizzes/Studio Critics | - | - |
Homework Assignments | 3 | 30 |
Presentation | - | - |
Project | - | - |
Report | - | - |
Seminar | - | - |
Midterms Exams/Midterms Jury | 1 | 30 |
Final Exam/Final Jury | 1 | 40 |
Toplam | 5 | 100 |
Percentage of Semester Work | |
---|---|
Percentage of Final Work | 100 |
Total | 100 |
Course Category
Core Courses | X |
---|---|
Major Area Courses | |
Supportive Courses | |
Media and Managment Skills Courses | |
Transferable Skill Courses |
The Relation Between Course Learning Competencies and Program Qualifications
# | Program Qualifications / Competencies | Level of Contribution | ||||
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | ||
1 | Ability to apply knowledge on Mathematics, Science and Engineering to advanced systems. | |||||
2 | Implementing long-term research and development studies in major areas of Electrical and Electronics Engineering. | |||||
3 | Ability to use modern engineering tools, techniques and facilities in design and other engineering applications. | X | ||||
4 | Graduating researchers active on innovation and entrepreneurship. | |||||
5 | Ability to report and present research results effectively. | |||||
6 | Increasing the performance on accessing information resources and on following recent developments in science and technology. | |||||
7 | An understanding of professional and ethical responsibility. | |||||
8 | Increasing the performance on effective communications in both Turkish and English. | |||||
9 | Increasing the performance on project management. | |||||
10 | Ability to work successfully at project teams in interdisciplinary fields. | X |
ECTS/Workload Table
Activities | Number | Duration (Hours) | Total Workload |
---|---|---|---|
Course Hours (Including Exam Week: 16 x Total Hours) | |||
Laboratory | |||
Application | |||
Special Course Internship | |||
Field Work | |||
Study Hours Out of Class | 16 | 5 | 80 |
Presentation/Seminar Prepration | |||
Project | |||
Report | |||
Homework Assignments | 3 | 15 | 45 |
Quizzes/Studio Critics | |||
Prepration of Midterm Exams/Midterm Jury | 1 | 20 | 20 |
Prepration of Final Exams/Final Jury | 1 | 30 | 30 |
Total Workload | 175 |