ECTS - Internet Security and Ethical Hacking

Internet Security and Ethical Hacking (ISE543) Course Detail

Course Name Course Code Season Lecture Hours Application Hours Lab Hours Credit ECTS
Internet Security and Ethical Hacking ISE543 Area Elective 3 0 0 3 5
Pre-requisite Course(s)
N/A
Course Language English
Course Type Information Systems Engineering Elective Courses
Course Level Ph.D.
Mode of Delivery Face To Face
Learning and Teaching Strategies Lecture.
Course Coordinator
Course Lecturer(s)
Course Assistants
Course Objectives The objective of this course is to provide the basics to the theory and the practice of cryptography and network security as well as ethical hacking.
Course Learning Outcomes The students who succeeded in this course;
  • Recognize the principles and practice of cryptography and network security
  • Apply principals of Internet security techniques to avoid security violations
  • Avare of security related issues.
Course Content Data encryption techniques and algorithms; public-key encryption, hash functions; digital signatures, authentication; network security; web security; system security, intruders, viruses, firewalls; the algorithms and data security tools; ethical hacking.

Weekly Subjects and Releated Preparation Studies

Week Subjects Preparation
1 Introduction Chapter 1
2 Classical Encryption Techniques Chapter 2
3 Bloch Chipper and Data Encryption Standards Chapter 3
4 Finite Fields and Advanced Encryption Standards Chapter 4,5
5 Confidentiality Using Conventional Encryption Chapter 7
6 Public-Key Cryptography Chapter 9,10
7 Message Authentication and Hash Functions Chapter 11
8 Hash and Mac Algorithms Chapter 12
9 Digital Signatures and Authentication Protocols. Chapter 13
10 Authentication Applications, Electronic Mail Security Chapter 14,15
11 IP Security, Web Security Chapter 16, 17
12 Intruders, Malicious Software, Firewalls Chapter 18,19,20
13 Introduction to Etichal Hacking Britz Chapter 1
14 Traditional and Contemporary Computer Crimes Britz Chapter 3,4
15 Final Examination Period Review of topics
16 Final Examination Period Review of topics

Sources

Course Book 1. Cryptography and Network Security: Principles and Practice, W. Stallings, 4/E, Prentice-Hall, 2005. ISBN: 0131873164
Other Sources 2. Marjie T. Britz, Computer Forensics and Cyber Crime: An Introduction, Prentice-Hall, 2008, ISBN:0132447495
3. Ferrell, O. C., Fraedrich, J., Ferrell, L., Business Ethics: Ethical Decision Making and Cases, 7th Ed., Houghton Mifflin, 2008
4. Defending Your Digital Assets Against Hackers, Crackers, Spies and Thieves. R.Nichols, D. Ryan, and J. Ryan. McGraw-Hill, 2000
5. Beauchamp, T. L., Bowie, N., and Arnold, D., Ethical Theory and Business, Pearson/Prentice-Hall, 2004
6. Network Security: A Beginner’s Guide. Eric Maiwald. McGraw_Hill. 2001
7. Wode Trappe, Lawrence Washington, Introduction to cryptography with coding theory, 2 Edition, 2006
8. Schultz, R. A., Contemporary Issues in Ethics and Information Technology, IRM Press, 2005
9. http://www.ieee-security.org
10. http://csrc.nist.gov
11. http://sans.org

Evaluation System

Requirements Number Percentage of Grade
Attendance/Participation - -
Laboratory - -
Application - -
Field Work - -
Special Course Internship - -
Quizzes/Studio Critics - -
Homework Assignments 3 30
Presentation - -
Project - -
Report - -
Seminar - -
Midterms Exams/Midterms Jury 1 30
Final Exam/Final Jury 1 40
Toplam 5 100
Percentage of Semester Work
Percentage of Final Work 100
Total 100

Course Category

Core Courses
Major Area Courses
Supportive Courses X
Media and Managment Skills Courses
Transferable Skill Courses

The Relation Between Course Learning Competencies and Program Qualifications

# Program Qualifications / Competencies Level of Contribution
1 2 3 4 5
1 Comprehends the most advanced technology and literature in the field of software engineering research.
2 Gains the ability to conduct world-class research in software engineering and publish scholarly articles in top conferences and journals in the area.
3 Conducts quantitative and qualitative studies in software engineering.
4 Develops and applies software engineering approaches to acquire the necessary skills to bridge the gap between academia and industry in the field of software engineering and to solve real-world problems.
5 Gains the ability to access the necessary information to follow current developments in science and technology, and to conduct scientific research or develop projects in the field of software engineering. X
6 Gains awareness and a sense of responsibility regarding professional, legal, ethical, and social issues in the field of software engineering.
7 Acquires project and risk management skills; gains awareness of the importance of entrepreneurship, innovation, and sustainable development; adapts international excellence standards for software engineering practices and methodologies. X
8 Gains awareness of the universal, environmental, social, and legal consequences of software engineering practices when making decisions. X
9 Develops, adopts, and supports the sustainable use of excellence standards for software engineering practices. X

ECTS/Workload Table

Activities Number Duration (Hours) Total Workload
Course Hours (Including Exam Week: 16 x Total Hours)
Laboratory
Application
Special Course Internship
Field Work
Study Hours Out of Class 16 5 80
Presentation/Seminar Prepration
Project
Report
Homework Assignments 3 15 45
Quizzes/Studio Critics
Prepration of Midterm Exams/Midterm Jury 1 20 20
Prepration of Final Exams/Final Jury 1 30 30
Total Workload 175