Cyber Security (CMPE535) Course Detail

Course Name Course Code Season Lecture Hours Application Hours Lab Hours Credit ECTS
Cyber Security CMPE535 Area Elective 3 0 0 3 5
Pre-requisite Course(s)
N/A
Course Language English
Course Type Elective Courses Taken From Other Departments
Course Level Natural & Applied Sciences Master's Degree
Mode of Delivery Face To Face
Learning and Teaching Strategies Lecture.
Course Coordinator
Course Lecturer(s)
Course Assistants
Course Objectives The objective of the course is - to introduce current state of the art, historical background, basic terminology and essential technologies in cyber security domain - to elucidate legal, ethical, political and economical influences of cyber and information war
Course Learning Outcomes The students who succeeded in this course;
  • Express the concepts in cyber security domain.
  • Discuss the security technologies in cyber space.
  • Describe the involvement of IT law, international standards and counter measures in cyber security
  • Recall basic knowledge of the computer crime and network security
Course Content Basic concepts in cyber space and security, cyber crime, IT law, computer law and cyber law, computer forensics, information security and assurance, computer and network security, cyber warfare, international standards on cyber security.

Weekly Subjects and Releated Preparation Studies

Week Subjects Preparation
1 Introduction: the cyber security challenge Lecture notes
2 Technology and policy background - History of the Internet - National and International Legal regulations - Owner of the cyber space Lecture notes
3 Cyber crime -1 - Cyber crime - Traditional computer crime: Early hackers - Cotemporary computer crime - Identity theft and identity fraud. Lecture notes + Other sources-2
4 Cyber crime -2 - Terrorism and organized crime in cyber space - Governmental and legal issues. Lecture notes + Other sources-2
5 IT law, Cyber law, Computer law-1 Lecture notes
6 IT law, Cyber law, Computer law-2 Lecture notes
7 Computer Forensics - Terminology - Computer related evidence - Searching and seizing - Evidence processing and report preparation Lecture notes + Other sources-2
8 Information security and assurance - Risk management - Evaluation and mitigation - Security education and awareness training. - Personnel security - Physical security Lecture notes + Other sources-3
9 Computer and network security-1 - Cryptology - Data integrity - Mutual trust and user authentication - Application security (email, web, IP-sec) - Security on network (VPN, VLAN) Lecture notes + Other sources-1
10 Computer and network security-2 - Attack types and security risks - Counter measures - Principles and Practical security applications Lecture notes + Other sources-1
11 Cyber Warfare Lecture notes + Other sources-3
12 ISO/IEC-27032 Cyber security guidelines Lecture notes
13 Assignment reports and presentations None
14 Contemporary topics in cyber security. Lecture notes
15 Review
16 Review

Sources

Other Sources 1. Cryptography and Network Security: Principles and Practice, William Stallings, Prentice Hall.
2. Computer Forensics and Cyber Crime, Marjie T. Britz, Pearson.
3. Defending Your Digital Assets Against Hackers, Crackers Spies and Thieves, Randall K. Nicolas, Daniel J. Ryan, Julie J.C.H. Ryan.
4. Cyber War: The Next Threat to National Security and What to Do About It, Richard O. Clarke, Harper Collins
5. Cybersecurity and Cyberwar: What Everyone Needs to Know, P.W. Singer, Allan Freidman, Oxford University Press.

Evaluation System

Requirements Number Percentage of Grade
Attendance/Participation - -
Laboratory - -
Application - -
Field Work - -
Special Course Internship - -
Quizzes/Studio Critics - -
Homework Assignments - -
Presentation - -
Project 2 30
Report - -
Seminar - -
Midterms Exams/Midterms Jury 1 30
Final Exam/Final Jury 1 40
Toplam 4 100
Percentage of Semester Work 60
Percentage of Final Work 40
Total 100

Course Category

Core Courses
Major Area Courses X
Supportive Courses
Media and Managment Skills Courses
Transferable Skill Courses

The Relation Between Course Learning Competencies and Program Qualifications

# Program Qualifications / Competencies Level of Contribution
1 2 3 4 5
1 To be able to use mathematics, science and engineering knowledge in solving engineering problems related to information systems. X
2 Design and conduct experiments in the field of informatics, analyze and interpret the results of experiments. X
3 Designs an information system, component and process according to the specified requirements. X
4 Can work effectively in disciplinary and multidisciplinary teams.
5 Identify, formulate and solve engineering problems in the field of informatics. X
6 Acts in accordance with professional ethical rules.
7 Communicates effectively both orally and in writing.
8 Gains awareness of the necessity of lifelong learning.
9 Learn about contemporary issues. X
10 To be able to use modern engineering tools, techniques and skills required for engineering practice. X
11 Knows project management methods and recognizes international standards. X
12 Develop informatics-related engineering products and prototypes for real-life problems. X
13 Contributes to professional knowledge.
14 Can do methodological scientific research.
15 Produce, report and present a scientific work based on an original or existing body of knowledge.
16 Can defend the original idea generated.

ECTS/Workload Table

Activities Number Duration (Hours) Total Workload
Course Hours (Including Exam Week: 16 x Total Hours) 16 3 48
Laboratory
Application
Special Course Internship
Field Work
Study Hours Out of Class 16 2 32
Presentation/Seminar Prepration
Project
Report
Homework Assignments 2 8 16
Quizzes/Studio Critics
Prepration of Midterm Exams/Midterm Jury 1 10 10
Prepration of Final Exams/Final Jury 1 20 20
Total Workload 126