ECTS - IT Security
IT Security (ISE542) Course Detail
Course Name | Course Code | Season | Lecture Hours | Application Hours | Lab Hours | Credit | ECTS |
---|---|---|---|---|---|---|---|
IT Security | ISE542 | Area Elective | 3 | 0 | 0 | 3 | 5 |
Pre-requisite Course(s) |
---|
N/A |
Course Language | English |
---|---|
Course Type | Information Systems Engineering Elective Courses |
Course Level | Ph.D. |
Mode of Delivery | Face To Face |
Learning and Teaching Strategies | Lecture. |
Course Lecturer(s) |
|
Course Objectives | The objective of this course is to explain the threats and vulnerabilities present in the existing information systems. The course also introduces how to design and implement secure systems that will address the threats. |
Course Learning Outcomes |
The students who succeeded in this course;
|
Course Content | Introduction to IT security, security plans, security policies, security models: TCSEC, common criteria, ISE/IEC 27000, CIBIT, ITIL; security risk assessment and management; security solutions; IT services and security; personnel security; ethics in IT security. |
Weekly Subjects and Releated Preparation Studies
Week | Subjects | Preparation |
---|---|---|
1 | Introduction to IT security | Chapter 1 |
2 | Planning for security | Chapter 2, 3 |
3 | IT security policy | Chapter 4 |
4 | Developing security program | Chapter 5 |
5 | Security models and practices | Chapter 6, 7 |
6 | Information security management systems | Instructor notes |
7 | Information security management systems | Instructor notes |
8 | Information security management systems | Instructor notes |
9 | Risk management | Chapter 8, 9 |
10 | Risk management | Chapter 8, 9 |
11 | Security solutions | Chapter 10 |
12 | Security solutions | Chapter 10 |
13 | Personnel security | Chapter 11 |
14 | Ethics in IT security | Chapter 12 |
15 | Final Examination Period | Review of topics |
16 | Final Examination Period | Review of topics |
Sources
Course Book | 1. Management of Information Security, M.E.Whitman, H.J.Mattord, Course Technology Cengage Learning, 2010, ISBN: 978-0-8400-3160-0 |
---|---|
Other Sources | 2. Computer forensics and cyber-crime, Britz M., Upper Saddle River, NJ: Prentice Hall, ISBN: 0132447495, 2008. |
3. Introduction to Computer Security, Bishop Matt, Addison-Wesley, Pearson Education, Inc. ISBN: 0-321-24744-2, 2005. | |
4. Cryptography and Network Security: Principles and Practice, W. Stallings, 4/E, Prentice-Hall, 2006. | |
5. Security in Computing (3rd edition), Charles P. Pfleeger and Shari L. Pfleeger, Prentice-Hall, ISBN: 0-13-035548-8, 2003. | |
6. ISO/IEC 27001 Information Technology – Security Techniques – Information Security Management Systems – Requirements, 2005. |
Evaluation System
Requirements | Number | Percentage of Grade |
---|---|---|
Attendance/Participation | - | - |
Laboratory | - | - |
Application | - | - |
Field Work | - | - |
Special Course Internship | - | - |
Quizzes/Studio Critics | - | - |
Homework Assignments | 3 | 30 |
Presentation | - | - |
Project | - | - |
Report | - | - |
Seminar | - | - |
Midterms Exams/Midterms Jury | 1 | 30 |
Final Exam/Final Jury | 1 | 40 |
Toplam | 5 | 100 |
Percentage of Semester Work | |
---|---|
Percentage of Final Work | 100 |
Total | 100 |
Course Category
Core Courses | |
---|---|
Major Area Courses | |
Supportive Courses | X |
Media and Managment Skills Courses | |
Transferable Skill Courses |
The Relation Between Course Learning Competencies and Program Qualifications
# | Program Qualifications / Competencies | Level of Contribution | ||||
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | ||
1 | Comprehends the most advanced technology and literature in the field of software engineering research. | X | ||||
2 | Gains the ability to conduct world-class research in software engineering and publish scholarly articles in top conferences and journals in the area. | |||||
3 | Conducts quantitative and qualitative studies in software engineering. | X | ||||
4 | Develops and applies software engineering approaches to acquire the necessary skills to bridge the gap between academia and industry in the field of software engineering and to solve real-world problems. | X | ||||
5 | Gains the ability to access the necessary information to follow current developments in science and technology, and to conduct scientific research or develop projects in the field of software engineering. | X | ||||
6 | Gains awareness and a sense of responsibility regarding professional, legal, ethical, and social issues in the field of software engineering. | X | ||||
7 | Acquires project and risk management skills; gains awareness of the importance of entrepreneurship, innovation, and sustainable development; adapts international excellence standards for software engineering practices and methodologies. | X | ||||
8 | Gains awareness of the universal, environmental, social, and legal consequences of software engineering practices when making decisions. | X | ||||
9 | Develops, adopts, and supports the sustainable use of excellence standards for software engineering practices. | X |
ECTS/Workload Table
Activities | Number | Duration (Hours) | Total Workload |
---|---|---|---|
Course Hours (Including Exam Week: 16 x Total Hours) | |||
Laboratory | |||
Application | |||
Special Course Internship | |||
Field Work | |||
Study Hours Out of Class | 16 | 5 | 80 |
Presentation/Seminar Prepration | |||
Project | |||
Report | |||
Homework Assignments | 3 | 15 | 45 |
Quizzes/Studio Critics | |||
Prepration of Midterm Exams/Midterm Jury | 1 | 20 | 20 |
Prepration of Final Exams/Final Jury | 1 | 30 | 30 |
Total Workload | 175 |