Computer Security (ISE426) Course Detail

Course Name Course Code Season Lecture Hours Application Hours Lab Hours Credit ECTS
Computer Security ISE426 8. Semester 3 0 0 3 5
Pre-requisite Course(s)
N/A
Course Language English
Course Type Compulsory Departmental Courses
Course Level Bachelor’s Degree (First Cycle)
Mode of Delivery Face To Face
Learning and Teaching Strategies Lecture.
Course Coordinator
Course Lecturer(s)
Course Assistants
Course Objectives The objective of this course is to teach the students how to protect vital data from various types of attacks on the Internet. It also aims at teaching the theoretical aspects of security along with the practical applications using data security tools.
Course Learning Outcomes The students who succeeded in this course;
  • Explain the basic terms, concepts and objectives of computer security
  • Explain fundamentals of cryptography
  • Discuss user authentication and access control
  • Discuss computer security threats including malicious software and DoS attacks
  • Examine countermeasures such as Antivirus SW, firewalls, IDS, IPS, IPSec
Course Content Cryptographic tools, user authentication, access control, intrusion detection, malicious software, denial-of-service attacks, firewalls, trusted computing, buffer overflow, software security, Windows security, Linux security.

Weekly Subjects and Releated Preparation Studies

Week Subjects Preparation
1 Overview Chapter 1 (main text)
2 Overview Chapter 1
3 Cryptographic Tools Chapter 2
4 Cryptographic Tools Chapter 2
5 User Authentication Chapter 3
6 Access Control Chapter 4
7 Database Security Chapter 5
8 Midterm
9 Malicious Software Chapter 6
10 Denial-of-Service Attacks Chapter 7
11 Intrusion Detection Chapter 8
12 Firewalls and Intrusion Prevention Systems Chapter 9
13 Operating system Security Chapter 12
14 Cloud and IoT Security Chapter 13
15 Final Examination Period
16 Final Examination Period

Sources

Course Book 1. Computer Security: Principles and Practice, William Stallings; Lawrie Brown, Prentice-Hall, 2008.
Other Sources 2. Network Security: Private Communication in a Public World. Kaufman, C.;R. Perlman; and M. Speciner, Prentice Hall, 2008
3. Security in Computing, Charles P. Pfleeger; Shari Lawrence Pfleeger., Prentice Hall, 2006
4. Introduction to Computer Security, Matt Bishop, Addison-Wesley Professional. 2004
5. Computer Security: Art and Science, Matt Bishop, Addison-Wesley Professional. 2002
6. Cryptography and Network Security, William Stallings, 5th Edition, Prentice Hall, Due out November 2009

Evaluation System

Requirements Number Percentage of Grade
Attendance/Participation - -
Laboratory - -
Application - -
Field Work - -
Special Course Internship - -
Quizzes/Studio Critics - -
Homework Assignments 4 30
Presentation - -
Project - -
Report - -
Seminar - -
Midterms Exams/Midterms Jury 1 30
Final Exam/Final Jury 1 40
Toplam 6 100
Percentage of Semester Work 65
Percentage of Final Work 35
Total 100

Course Category

Core Courses X
Major Area Courses
Supportive Courses
Media and Managment Skills Courses
Transferable Skill Courses

The Relation Between Course Learning Competencies and Program Qualifications

# Program Qualifications / Competencies Level of Contribution
1 2 3 4 5
1 Gain sufficient knowledge in mathematics, science and computing; be able to use theoretical and applied knowledge in these areas to solve engineering problems related to information systems. X
2 To be able to identify, define, formulate and solve complex engineering problems; to be able to select and apply appropriate analysis and modeling methods for this purpose.
3 Designs a complex system, process, device or product under realistic constraints and conditions to meet specific requirements; applies modern design methods for this purpose.
4 To be able to develop, select and use modern techniques and tools required for the analysis and solution of complex problems encountered in information systems engineering applications; to be able to use information technologies effectively. X
5 Designs and conducts experiments, collects data, analyzes and interprets results to investigate complex engineering problems or research topics specific to the discipline of information systems engineering. X
6 Can work effectively in disciplinary and multidisciplinary teams; can work individually.
7 a. Communicates effectively both orally and in writing; writes effective reports and understands written reports, prepares design and production reports, makes effective presentations, gives and receives clear and understandable instructions. b. Knows at least one foreign language.
8 To be aware of the necessity of lifelong learning; to be able to access information, to be able to follow developments in science and technology and to be able to renew himself/herself continuously.
9 a. Acts in accordance with the principles of ethics, gains awareness of professional and ethical responsibility. b. Gains knowledge about the standards used in information systems engineering applications.
10 a. Gains knowledge about business life practices such as project management, risk management and change management. b. Gains awareness about entrepreneurship and innovation. c. Gains knowledge about sustainable development.
11 a. To be able to acquire knowledge about the universal and social effects of information systems engineering applications on health, environment and safety and the problems of the era reflected in the field of engineering. b. Gains awareness of the legal consequences of engineering solutions.

ECTS/Workload Table

Activities Number Duration (Hours) Total Workload
Course Hours (Including Exam Week: 16 x Total Hours) 16 3 48
Laboratory
Application
Special Course Internship
Field Work
Study Hours Out of Class 16 2 32
Presentation/Seminar Prepration
Project
Report
Homework Assignments 4 5 20
Quizzes/Studio Critics
Prepration of Midterm Exams/Midterm Jury 1 20 20
Prepration of Final Exams/Final Jury 1 30 30
Total Workload 150