Cyber Security (CMPE535) Course Detail

Course Name Course Code Season Lecture Hours Application Hours Lab Hours Credit ECTS
Cyber Security CMPE535 3 0 0 3 5
Pre-requisite Course(s)
N/A
Course Language English
Course Type N/A
Course Level Natural & Applied Sciences Master's Degree
Mode of Delivery Face To Face
Learning and Teaching Strategies Lecture.
Course Coordinator
Course Lecturer(s)
Course Assistants
Course Objectives The objective of the course is - to introduce current state of the art, historical background, basic terminology and essential technologies in cyber security domain - to elucidate legal, ethical, political and economical influences of cyber and information war
Course Learning Outcomes The students who succeeded in this course;
  • Express the concepts in cyber security domain.
  • Discuss the security technologies in cyber space.
  • Describe the involvement of IT law, international standards and counter measures in cyber security
  • Recall basic knowledge of the computer crime and network security
Course Content Basic concepts in cyber space and security, cyber crime, IT law, computer law and cyber law, computer forensics, information security and assurance, computer and network security, cyber warfare, international standards on cyber security.

Weekly Subjects and Releated Preparation Studies

Week Subjects Preparation
1 Introduction: the cyber security challenge Lecture notes
2 Technology and policy background - History of the Internet - National and International Legal regulations - Owner of the cyber space Lecture notes
3 Cyber crime -1 - Cyber crime - Traditional computer crime: Early hackers - Cotemporary computer crime - Identity theft and identity fraud. Lecture notes + Other sources-2
4 Cyber crime -2 - Terrorism and organized crime in cyber space - Governmental and legal issues. Lecture notes + Other sources-2
5 IT law, Cyber law, Computer law-1 Lecture notes
6 IT law, Cyber law, Computer law-2 Lecture notes
7 Computer Forensics - Terminology - Computer related evidence - Searching and seizing - Evidence processing and report preparation Lecture notes + Other sources-2
8 Information security and assurance - Risk management - Evaluation and mitigation - Security education and awareness training. - Personnel security - Physical security Lecture notes + Other sources-3
9 Computer and network security-1 - Cryptology - Data integrity - Mutual trust and user authentication - Application security (email, web, IP-sec) - Security on network (VPN, VLAN) Lecture notes + Other sources-1
10 Computer and network security-2 - Attack types and security risks - Counter measures - Principles and Practical security applications Lecture notes + Other sources-1
11 Cyber Warfare Lecture notes + Other sources-3
12 ISO/IEC-27032 Cyber security guidelines Lecture notes
13 Assignment reports and presentations None
14 Contemporary topics in cyber security. Lecture notes
15 Review
16 Review

Sources

Other Sources 1. Cryptography and Network Security: Principles and Practice, William Stallings, Prentice Hall.
2. Computer Forensics and Cyber Crime, Marjie T. Britz, Pearson.
3. Defending Your Digital Assets Against Hackers, Crackers Spies and Thieves, Randall K. Nicolas, Daniel J. Ryan, Julie J.C.H. Ryan.
4. Cyber War: The Next Threat to National Security and What to Do About It, Richard O. Clarke, Harper Collins
5. Cybersecurity and Cyberwar: What Everyone Needs to Know, P.W. Singer, Allan Freidman, Oxford University Press.

Evaluation System

Requirements Number Percentage of Grade
Attendance/Participation - -
Laboratory - -
Application - -
Field Work - -
Special Course Internship - -
Quizzes/Studio Critics - -
Homework Assignments - -
Presentation - -
Project 2 30
Report - -
Seminar - -
Midterms Exams/Midterms Jury 1 30
Final Exam/Final Jury 1 40
Toplam 4 100
Percentage of Semester Work 60
Percentage of Final Work 40
Total 100

Course Category

Core Courses X
Major Area Courses
Supportive Courses
Media and Managment Skills Courses
Transferable Skill Courses

The Relation Between Course Learning Competencies and Program Qualifications

# Program Qualifications / Competencies Level of Contribution
1 2 3 4 5
1 An ability to apply knowledge of mathematics, science, and engineering. X
2 An ability to design and conduct experiments, as well as to analyse and interpret data. X
3 An ability to design a system, component, or process to meet desired needs. X
4 An ability to function on multi-disciplinary domains. X
5 An ability to identify, formulate, and solve engineering problems. X
6 An understanding of professional and ethical responsibility. X
7 An ability to communicate effectively. X
8 Recognition of the need for, and an ability to engage in life-long learning. X
9 A knowledge of contemporary issues. X
10 An ability to use the techniques, skills, and modern engineering tools necessary for engineering practice. X
11 Skills in project management and recognition of international standards and methodologies X
12 An ability to produce engineering products or prototypes that solve real-life problems. X
13 Skills that contribute to professional knowledge. X
14 An ability to make methodological scientific research. X
15 An ability to produce, report and present an original or known scientific body of knowledge. X
16 An ability to defend an originally produced idea. X

ECTS/Workload Table

Activities Number Duration (Hours) Total Workload
Course Hours (Including Exam Week: 16 x Total Hours) 16 3 48
Laboratory
Application
Special Course Internship
Field Work
Study Hours Out of Class 16 2 32
Presentation/Seminar Prepration
Project
Report
Homework Assignments 2 8 16
Quizzes/Studio Critics
Prepration of Midterm Exams/Midterm Jury 1 10 10
Prepration of Final Exams/Final Jury 1 20 20
Total Workload 126