ECTS - Computer and Network Security
Computer and Network Security (CMPE533) Course Detail
| Course Name | Course Code | Season | Lecture Hours | Application Hours | Lab Hours | Credit | ECTS | 
|---|---|---|---|---|---|---|---|
| Computer and Network Security | CMPE533 | Area Elective | 3 | 0 | 0 | 3 | 5 | 
| Pre-requisite Course(s) | 
|---|
| N/A | 
| Course Language | English | 
|---|---|
| Course Type | Elective Courses | 
| Course Level | Natural & Applied Sciences Master's Degree | 
| Mode of Delivery | Face To Face | 
| Learning and Teaching Strategies | Lecture. | 
| Course Lecturer(s) |  | 
| Course Objectives | The objective of this course is to teach the theoretical aspects of computer and network security along with the practical applications using data security tools. | 
| Course Learning Outcomes | The students who succeeded in this course; 
 | 
| Course Content | Encryption techniques and algorithms, public-key encryption, hash functions, digital signatures, authentication, network security, web security, operating system security (Unix and Windows), Bell-LaPadulla model, software and database security. | 
Weekly Subjects and Releated Preparation Studies
| Week | Subjects | Preparation | 
|---|---|---|
| 1 | Introduction and History of Computer Security | Chapter 1 (main text) | 
| 2 | Foundations of Computer Security | Chapter 3 | 
| 3 | Identification and Authentication. Access Control | Chapters 4,5 | 
| 4 | Unix Security | Chapter 7 | 
| 5 | Windows Security | Chapter 8 | 
| 6 | Database Security | Chapter 9 | 
| 7 | Software Security | Chapter 10 | 
| 8 | Security Models. Bell–LaPadula Model | Chapters 11,12 | 
| 9 | Security Evaluation | Chapter 13 | 
| 10 | Cryptography | Chapter 14 | 
| 11 | Key Establishment | Chapter 15 | 
| 12 | Communications Security. Network Security | Chapters 16,17 | 
| 13 | Web Security | Chapter 18 | 
| 14 | New Access Control Paradigms | Chapter 20 | 
| 15 | Review | |
| 16 | Review | 
Sources
| Course Book | 1. Cryptography and Network Security: Principles and Practice, W. Stallings, 4/E,Prentice-Hall, 2006. | 
|---|---|
| Other Sources | 3. Defending Your Digital Assets Against Hackers, Crackers, Spies and Thieves. R.Nichols, D. Ryan, and J. Ryan. McGraw-Hill, 2000. | 
| 4. Network Security: A Beginner’s Guide. Eric Maiwald. , McGraw_Hill. 2001. | |
| 5. VPNs: A Beginner’s Guide, J. Mairs.,McGraw Hill/Osborne,2002. | |
| 6. Wade Trappe, Lawrence Washington, Introduction to Cryptography with Coding Theory, 2/E, Pearson International Edition, 2006. | |
| 7. http://www.ieee-security.org/index.html | |
| 8. http://csrc.nist.gov/ | |
| 9. http://sans.org/ | |
| 10. http://www.rsasecurity.com/rsalabs/ | |
| 11. http://www.ietf.cnri.reston.va.us/html.charters/pkix-charter.html | 
Evaluation System
| Requirements | Number | Percentage of Grade | 
|---|---|---|
| Attendance/Participation | - | - | 
| Laboratory | - | - | 
| Application | - | - | 
| Field Work | - | - | 
| Special Course Internship | - | - | 
| Quizzes/Studio Critics | - | - | 
| Homework Assignments | 2 | 25 | 
| Presentation | - | - | 
| Project | - | - | 
| Report | - | - | 
| Seminar | - | - | 
| Midterms Exams/Midterms Jury | 1 | 35 | 
| Final Exam/Final Jury | 1 | 40 | 
| Toplam | 4 | 100 | 
| Percentage of Semester Work | 60 | 
|---|---|
| Percentage of Final Work | 40 | 
| Total | 100 | 
Course Category
| Core Courses | |
|---|---|
| Major Area Courses | X | 
| Supportive Courses | |
| Media and Managment Skills Courses | |
| Transferable Skill Courses | 
The Relation Between Course Learning Competencies and Program Qualifications
| # | Program Qualifications / Competencies | Level of Contribution | ||||
|---|---|---|---|---|---|---|
| 1 | 2 | 3 | 4 | 5 | ||
| 1 | Applies knowledge of mathematics, science, and engineering | X | ||||
| 2 | Designs and conducts experiments, analyzes and interprets experimental results. | X | ||||
| 3 | Designs a system, component, or process to meet specified requirements. | X | ||||
| 4 | Works effectively in interdisciplinary fields. | X | ||||
| 5 | Identifies, formulates, and solves engineering problems. | X | ||||
| 6 | Has awareness of professional and ethical responsibility. | X | ||||
| 7 | Communicates effectively. | X | ||||
| 8 | Recognizes the need for lifelong learning and engages in it. | X | ||||
| 9 | Has knowledge of contemporary issues. | X | ||||
| 10 | Uses modern tools, techniques, and skills necessary for engineering applications. | X | ||||
| 11 | Has knowledge of project management skills and international standards and methodologies. | X | ||||
| 12 | Develops engineering products and prototypes for real-world problems. | X | ||||
| 13 | Contributes to professional knowledge. | X | ||||
| 14 | Conducts methodological and scientific research. | X | ||||
| 15 | Produces, reports, and presents a scientific work based on original or existing knowledge. | X | ||||
| 16 | Defends the original idea generated. | X | ||||
ECTS/Workload Table
| Activities | Number | Duration (Hours) | Total Workload | 
|---|---|---|---|
| Course Hours (Including Exam Week: 16 x Total Hours) | 16 | 3 | 48 | 
| Laboratory | |||
| Application | |||
| Special Course Internship | |||
| Field Work | |||
| Study Hours Out of Class | 16 | 2 | 32 | 
| Presentation/Seminar Prepration | |||
| Project | |||
| Report | |||
| Homework Assignments | 2 | 8 | 16 | 
| Quizzes/Studio Critics | |||
| Prepration of Midterm Exams/Midterm Jury | 1 | 10 | 10 | 
| Prepration of Final Exams/Final Jury | 1 | 20 | 20 | 
| Total Workload | 126 | ||
