ECTS - Computer and Network Security
Computer and Network Security (CMPE533) Course Detail
Course Name | Course Code | Season | Lecture Hours | Application Hours | Lab Hours | Credit | ECTS |
---|---|---|---|---|---|---|---|
Computer and Network Security | CMPE533 | Area Elective | 3 | 0 | 0 | 3 | 5 |
Pre-requisite Course(s) |
---|
N/A |
Course Language | English |
---|---|
Course Type | Elective Courses |
Course Level | Natural & Applied Sciences Master's Degree |
Mode of Delivery | Face To Face |
Learning and Teaching Strategies | Lecture. |
Course Lecturer(s) |
|
Course Objectives | The objective of this course is to teach the theoretical aspects of computer and network security along with the practical applications using data security tools. |
Course Learning Outcomes |
The students who succeeded in this course;
|
Course Content | Encryption techniques and algorithms, public-key encryption, hash functions, digital signatures, authentication, network security, web security, operating system security (Unix and Windows), Bell-LaPadulla model, software and database security. |
Weekly Subjects and Releated Preparation Studies
Week | Subjects | Preparation |
---|---|---|
1 | Introduction and History of Computer Security | Chapter 1 (main text) |
2 | Foundations of Computer Security | Chapter 3 |
3 | Identification and Authentication. Access Control | Chapters 4,5 |
4 | Unix Security | Chapter 7 |
5 | Windows Security | Chapter 8 |
6 | Database Security | Chapter 9 |
7 | Software Security | Chapter 10 |
8 | Security Models. Bell–LaPadula Model | Chapters 11,12 |
9 | Security Evaluation | Chapter 13 |
10 | Cryptography | Chapter 14 |
11 | Key Establishment | Chapter 15 |
12 | Communications Security. Network Security | Chapters 16,17 |
13 | Web Security | Chapter 18 |
14 | New Access Control Paradigms | Chapter 20 |
15 | Review | |
16 | Review |
Sources
Course Book | 1. Cryptography and Network Security: Principles and Practice, W. Stallings, 4/E,Prentice-Hall, 2006. |
---|---|
Other Sources | 3. Defending Your Digital Assets Against Hackers, Crackers, Spies and Thieves. R.Nichols, D. Ryan, and J. Ryan. McGraw-Hill, 2000. |
4. Network Security: A Beginner’s Guide. Eric Maiwald. , McGraw_Hill. 2001. | |
5. VPNs: A Beginner’s Guide, J. Mairs.,McGraw Hill/Osborne,2002. | |
6. Wade Trappe, Lawrence Washington, Introduction to Cryptography with Coding Theory, 2/E, Pearson International Edition, 2006. | |
7. http://www.ieee-security.org/index.html | |
8. http://csrc.nist.gov/ | |
9. http://sans.org/ | |
10. http://www.rsasecurity.com/rsalabs/ | |
11. http://www.ietf.cnri.reston.va.us/html.charters/pkix-charter.html |
Evaluation System
Requirements | Number | Percentage of Grade |
---|---|---|
Attendance/Participation | - | - |
Laboratory | - | - |
Application | - | - |
Field Work | - | - |
Special Course Internship | - | - |
Quizzes/Studio Critics | - | - |
Homework Assignments | 2 | 25 |
Presentation | - | - |
Project | - | - |
Report | - | - |
Seminar | - | - |
Midterms Exams/Midterms Jury | 1 | 35 |
Final Exam/Final Jury | 1 | 40 |
Toplam | 4 | 100 |
Percentage of Semester Work | 60 |
---|---|
Percentage of Final Work | 40 |
Total | 100 |
Course Category
Core Courses | X |
---|---|
Major Area Courses | |
Supportive Courses | |
Media and Managment Skills Courses | |
Transferable Skill Courses |
The Relation Between Course Learning Competencies and Program Qualifications
# | Program Qualifications / Competencies | Level of Contribution | ||||
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | ||
1 | An ability to apply knowledge of mathematics, science, and engineering. | X | ||||
2 | An ability to design and conduct experiments, as well as to analyse and interpret data. | X | ||||
3 | An ability to design a system, component, or process to meet desired needs. | X | ||||
4 | An ability to function on multi-disciplinary domains. | X | ||||
5 | An ability to identify, formulate, and solve engineering problems. | X | ||||
6 | An understanding of professional and ethical responsibility. | X | ||||
7 | An ability to communicate effectively. | X | ||||
8 | Recognition of the need for, and an ability to engage in life-long learning. | X | ||||
9 | A knowledge of contemporary issues. | X | ||||
10 | An ability to use the techniques, skills, and modern engineering tools necessary for engineering practice. | X | ||||
11 | Skills in project management and recognition of international standards and methodologies | X | ||||
12 | An ability to produce engineering products or prototypes that solve real-life problems. | X | ||||
13 | Skills that contribute to professional knowledge. | X | ||||
14 | An ability to make methodological scientific research. | X | ||||
15 | An ability to produce, report and present an original or known scientific body of knowledge. | X | ||||
16 | An ability to defend an originally produced idea. | X |
ECTS/Workload Table
Activities | Number | Duration (Hours) | Total Workload |
---|---|---|---|
Course Hours (Including Exam Week: 16 x Total Hours) | 16 | 3 | 48 |
Laboratory | |||
Application | |||
Special Course Internship | |||
Field Work | |||
Study Hours Out of Class | 16 | 2 | 32 |
Presentation/Seminar Prepration | |||
Project | |||
Report | |||
Homework Assignments | 2 | 8 | 16 |
Quizzes/Studio Critics | |||
Prepration of Midterm Exams/Midterm Jury | 1 | 10 | 10 |
Prepration of Final Exams/Final Jury | 1 | 20 | 20 |
Total Workload | 126 |