ECTS - Internet Security and Ethical Hacking
Internet Security and Ethical Hacking (ISE543) Course Detail
| Course Name | Course Code | Season | Lecture Hours | Application Hours | Lab Hours | Credit | ECTS |
|---|---|---|---|---|---|---|---|
| Internet Security and Ethical Hacking | ISE543 | Area Elective | 3 | 0 | 0 | 3 | 5 |
| Pre-requisite Course(s) |
|---|
| N/A |
| Course Language | English |
|---|---|
| Course Type | Elective Courses |
| Course Level | Natural & Applied Sciences Master's Degree |
| Mode of Delivery | Face To Face |
| Learning and Teaching Strategies | Lecture. |
| Course Lecturer(s) |
|
| Course Objectives | The objective of this course is to provide the basics to the theory and the practice of cryptography and network security as well as ethical hacking. |
| Course Learning Outcomes |
The students who succeeded in this course;
|
| Course Content | Data encryption techniques and algorithms; public-key encryption, hash functions; digital signatures, authentication; network security; web security; system security, intruders, viruses, firewalls; the algorithms and data security tools; ethical hacking. |
Weekly Subjects and Releated Preparation Studies
| Week | Subjects | Preparation |
|---|---|---|
| 1 | Introduction | Chapter 1 |
| 2 | Classical Encryption Techniques | Chapter 2 |
| 3 | Bloch Chipper and Data Encryption Standards | Chapter 3 |
| 4 | Finite Fields and Advanced Encryption Standards | Chapter 4,5 |
| 5 | Confidentiality Using Conventional Encryption | Chapter 7 |
| 6 | Public-Key Cryptography | Chapter 9,10 |
| 7 | Message Authentication and Hash Functions | Chapter 11 |
| 8 | Hash and Mac Algorithms | Chapter 12 |
| 9 | Digital Signatures and Authentication Protocols. | Chapter 13 |
| 10 | Authentication Applications, Electronic Mail Security | Chapter 14,15 |
| 11 | IP Security, Web Security | Chapter 16, 17 |
| 12 | Intruders, Malicious Software, Firewalls | Chapter 18,19,20 |
| 13 | Introduction to Etichal Hacking | Britz Chapter 1 |
| 14 | Traditional and Contemporary Computer Crimes | Britz Chapter 3,4 |
| 15 | Final Examination Period | Review of topics |
| 16 | Final Examination Period | Review of topics |
Sources
| Course Book | 1. Cryptography and Network Security: Principles and Practice, W. Stallings, 4/E, Prentice-Hall, 2005. ISBN: 0131873164 |
|---|---|
| Other Sources | 2. Marjie T. Britz, Computer Forensics and Cyber Crime: An Introduction, Prentice-Hall, 2008, ISBN:0132447495 |
| 3. Ferrell, O. C., Fraedrich, J., Ferrell, L., Business Ethics: Ethical Decision Making and Cases, 7th Ed., Houghton Mifflin, 2008 | |
| 4. Defending Your Digital Assets Against Hackers, Crackers, Spies and Thieves. R.Nichols, D. Ryan, and J. Ryan. McGraw-Hill, 2000 | |
| 5. Beauchamp, T. L., Bowie, N., and Arnold, D., Ethical Theory and Business, Pearson/Prentice-Hall, 2004 | |
| 6. Network Security: A Beginner’s Guide. Eric Maiwald. McGraw_Hill. 2001 | |
| 7. Wode Trappe, Lawrence Washington, Introduction to cryptography with coding theory, 2 Edition, 2006 | |
| 8. Schultz, R. A., Contemporary Issues in Ethics and Information Technology, IRM Press, 2005 | |
| 9. http://www.ieee-security.org | |
| 10. http://csrc.nist.gov | |
| 11. http://sans.org |
Evaluation System
| Requirements | Number | Percentage of Grade |
|---|---|---|
| Attendance/Participation | - | - |
| Laboratory | - | - |
| Application | - | - |
| Field Work | - | - |
| Special Course Internship | - | - |
| Quizzes/Studio Critics | - | - |
| Homework Assignments | 3 | 30 |
| Presentation | - | - |
| Project | - | - |
| Report | - | - |
| Seminar | - | - |
| Midterms Exams/Midterms Jury | 1 | 30 |
| Final Exam/Final Jury | 1 | 40 |
| Toplam | 5 | 100 |
| Percentage of Semester Work | |
|---|---|
| Percentage of Final Work | 100 |
| Total | 100 |
Course Category
| Core Courses | X |
|---|---|
| Major Area Courses | |
| Supportive Courses | |
| Media and Managment Skills Courses | |
| Transferable Skill Courses |
The Relation Between Course Learning Competencies and Program Qualifications
| # | Program Qualifications / Competencies | Level of Contribution | ||||
|---|---|---|---|---|---|---|
| 1 | 2 | 3 | 4 | 5 | ||
| 1 | Applies knowledge of mathematics, science, and engineering. | |||||
| 2 | Designs and conducts experiments, analyzes and interprets experimental results. | |||||
| 3 | Designs a system, component, or process to meet specified requirements. | |||||
| 4 | Works effectively in interdisciplinary fields. | |||||
| 5 | Identifies, formulates, and solves engineering problems. | X | ||||
| 6 | Has awareness of professional and ethical responsibility. | |||||
| 7 | Communicates effectively. | |||||
| 8 | Recognizes the need for lifelong learning and engages in it. | |||||
| 9 | Has knowledge of contemporary issues. | X | ||||
| 10 | Uses modern tools, techniques, and skills necessary for engineering applications. | X | ||||
| 11 | Has knowledge of project management skills and international standards and methodologies. | |||||
| 12 | Develops engineering products and prototypes for real-life problems. | X | ||||
| 13 | Contributes to professional knowledge. | |||||
| 14 | Conducts methodological and scientific research. | |||||
| 15 | Produces, reports, and presents a scientific work based on original or existing knowledge. | |||||
| 16 | Defends the original idea generated. | |||||
ECTS/Workload Table
| Activities | Number | Duration (Hours) | Total Workload |
|---|---|---|---|
| Course Hours (Including Exam Week: 16 x Total Hours) | |||
| Laboratory | |||
| Application | |||
| Special Course Internship | |||
| Field Work | |||
| Study Hours Out of Class | 16 | 5 | 80 |
| Presentation/Seminar Prepration | |||
| Project | |||
| Report | |||
| Homework Assignments | 3 | 15 | 45 |
| Quizzes/Studio Critics | |||
| Prepration of Midterm Exams/Midterm Jury | 1 | 20 | 20 |
| Prepration of Final Exams/Final Jury | 1 | 30 | 30 |
| Total Workload | 175 | ||
