ECTS - Cyber Security
Cyber Security (CMPE535) Course Detail
Course Name | Course Code | Season | Lecture Hours | Application Hours | Lab Hours | Credit | ECTS |
---|---|---|---|---|---|---|---|
Cyber Security | CMPE535 | Area Elective | 3 | 0 | 0 | 3 | 5 |
Pre-requisite Course(s) |
---|
N/A |
Course Language | English |
---|---|
Course Type | Elective Courses |
Course Level | Natural & Applied Sciences Master's Degree |
Mode of Delivery | Face To Face |
Learning and Teaching Strategies | Lecture. |
Course Lecturer(s) |
|
Course Objectives | The objective of the course is - to introduce current state of the art, historical background, basic terminology and essential technologies in cyber security domain - to elucidate legal, ethical, political and economical influences of cyber and information war |
Course Learning Outcomes |
The students who succeeded in this course;
|
Course Content | Basic concepts in cyber space and security, cyber crime, IT law, computer law and cyber law, computer forensics, information security and assurance, computer and network security, cyber warfare, international standards on cyber security. |
Weekly Subjects and Releated Preparation Studies
Week | Subjects | Preparation |
---|---|---|
1 | Introduction: the cyber security challenge | Lecture notes |
2 | Technology and policy background - History of the Internet - National and International Legal regulations - Owner of the cyber space | Lecture notes |
3 | Cyber crime -1 - Cyber crime - Traditional computer crime: Early hackers - Cotemporary computer crime - Identity theft and identity fraud. | Lecture notes + Other sources-2 |
4 | Cyber crime -2 - Terrorism and organized crime in cyber space - Governmental and legal issues. | Lecture notes + Other sources-2 |
5 | IT law, Cyber law, Computer law-1 | Lecture notes |
6 | IT law, Cyber law, Computer law-2 | Lecture notes |
7 | Computer Forensics - Terminology - Computer related evidence - Searching and seizing - Evidence processing and report preparation | Lecture notes + Other sources-2 |
8 | Information security and assurance - Risk management - Evaluation and mitigation - Security education and awareness training. - Personnel security - Physical security | Lecture notes + Other sources-3 |
9 | Computer and network security-1 - Cryptology - Data integrity - Mutual trust and user authentication - Application security (email, web, IP-sec) - Security on network (VPN, VLAN) | Lecture notes + Other sources-1 |
10 | Computer and network security-2 - Attack types and security risks - Counter measures - Principles and Practical security applications | Lecture notes + Other sources-1 |
11 | Cyber Warfare | Lecture notes + Other sources-3 |
12 | ISO/IEC-27032 Cyber security guidelines | Lecture notes |
13 | Assignment reports and presentations | None |
14 | Contemporary topics in cyber security. | Lecture notes |
15 | Review | |
16 | Review |
Sources
Other Sources | 1. Cryptography and Network Security: Principles and Practice, William Stallings, Prentice Hall. |
---|---|
2. Computer Forensics and Cyber Crime, Marjie T. Britz, Pearson. | |
3. Defending Your Digital Assets Against Hackers, Crackers Spies and Thieves, Randall K. Nicolas, Daniel J. Ryan, Julie J.C.H. Ryan. | |
4. Cyber War: The Next Threat to National Security and What to Do About It, Richard O. Clarke, Harper Collins | |
5. Cybersecurity and Cyberwar: What Everyone Needs to Know, P.W. Singer, Allan Freidman, Oxford University Press. |
Evaluation System
Requirements | Number | Percentage of Grade |
---|---|---|
Attendance/Participation | - | - |
Laboratory | - | - |
Application | - | - |
Field Work | - | - |
Special Course Internship | - | - |
Quizzes/Studio Critics | - | - |
Homework Assignments | - | - |
Presentation | - | - |
Project | 2 | 30 |
Report | - | - |
Seminar | - | - |
Midterms Exams/Midterms Jury | 1 | 30 |
Final Exam/Final Jury | 1 | 40 |
Toplam | 4 | 100 |
Percentage of Semester Work | 60 |
---|---|
Percentage of Final Work | 40 |
Total | 100 |
Course Category
Core Courses | X |
---|---|
Major Area Courses | |
Supportive Courses | |
Media and Managment Skills Courses | |
Transferable Skill Courses |
The Relation Between Course Learning Competencies and Program Qualifications
# | Program Qualifications / Competencies | Level of Contribution | ||||
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | ||
1 | Applies knowledge of mathematics, science, and engineering. | X | ||||
2 | Designs and conducts experiments, analyzes and interprets experimental results. | X | ||||
3 | Designs a system, component, or process to meet specified requirements. | X | ||||
4 | Works effectively in interdisciplinary fields. | X | ||||
5 | Identifies, formulates, and solves engineering problems. | X | ||||
6 | Has awareness of professional and ethical responsibility. | X | ||||
7 | Communicates effectively. | X | ||||
8 | Recognizes the need for lifelong learning and engages in it. | X | ||||
9 | Has knowledge of contemporary issues. | X | ||||
10 | Uses modern tools, techniques, and skills necessary for engineering applications. | X | ||||
11 | Has knowledge of project management skills and international standards and methodologies. | X | ||||
12 | Develops engineering products and prototypes for real-life problems. | X | ||||
13 | Contributes to professional knowledge. | X | ||||
14 | Conducts methodological and scientific research. | X | ||||
15 | Produces, reports, and presents a scientific work based on original or existing knowledge. | X | ||||
16 | Defends the original idea generated. | X |
ECTS/Workload Table
Activities | Number | Duration (Hours) | Total Workload |
---|---|---|---|
Course Hours (Including Exam Week: 16 x Total Hours) | 16 | 3 | 48 |
Laboratory | |||
Application | |||
Special Course Internship | |||
Field Work | |||
Study Hours Out of Class | 16 | 2 | 32 |
Presentation/Seminar Prepration | |||
Project | |||
Report | |||
Homework Assignments | 2 | 8 | 16 |
Quizzes/Studio Critics | |||
Prepration of Midterm Exams/Midterm Jury | 1 | 10 | 10 |
Prepration of Final Exams/Final Jury | 1 | 20 | 20 |
Total Workload | 126 |