ce.cs.ieu.edu.tr
Course Name | |
Code | Semester | Theory (hour/week) | Application/Lab (hour/week) | Local Credits | ECTS |
---|---|---|---|---|---|
Fall/Spring |
Prerequisites |
| ||||||||
Course Language | |||||||||
Course Type | Elective | ||||||||
Course Level | - | ||||||||
Mode of Delivery | - | ||||||||
Teaching Methods and Techniques of the Course | Group WorkProblem Solving | ||||||||
Course Coordinator | - | ||||||||
Course Lecturer(s) | |||||||||
Assistant(s) | - |
Course Objectives | |
Learning Outcomes | The students who succeeded in this course;
|
Course Description |
| Core Courses | X |
Major Area Courses | ||
Supportive Courses | ||
Media and Managment Skills Courses | ||
Transferable Skill Courses |
Week | Subjects | Required Materials |
1 | Fundamental Concepts | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch1.1, pp. 1-14 |
2 | Cryptographic Concepts | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch1.2, pp 19-31 |
3 | Symmetric Cryptography | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch2.1 pp. 53-68 |
4 | Publi-Key Cryptography | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch2.2 pp. 72-81 |
5 | Cryptographic Hash Functions | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch2.3-Ch2.4 pp. 83-88 |
6 | Digital Signatures | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch2.4-Ch2.5, pp. 89-97 |
7 | Operating Systems Security | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch3 pp. 111-157 |
8 | Malicious Software | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch4 pp. 167-208 |
9 | MIDTERM EXAM | |
10 | Network Security | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch5.1-Ch5.2 pp. 215-227 |
11 | Network Security | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch5.3-Ch5. 6 pp. 230-256 |
12 | Network Services & Security | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch6 pp. 261-310 |
13 | Browser Security | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch7 pp. 319-372 |
14 | Security Models & Practice | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch9 pp. 435-474 |
15 | Project Presentations | |
16 | Review of the Semester |
Course Notes/Textbooks | Cryptography and Network Security Fourth Ed., William Stallings,© 2006 | Pearson Prentice Hall | ISBN: 0131873184 |
Suggested Readings/Materials |
Semester Activities | Number | Weigthing |
Participation | 16 | 10 |
Laboratory / Application | ||
Field Work | ||
Quizzes / Studio Critiques | ||
Portfolio | ||
Homework / Assignments | ||
Presentation / Jury | ||
Project | 2 | 60 |
Seminar / Workshop | ||
Oral Exam | ||
Midterm | 1 | 30 |
Final Exam | ||
Total |
Weighting of Semester Activities on the Final Grade | 3 | 60 |
Weighting of End-of-Semester Activities on the Final Grade | 1 | 40 |
Total |
Semester Activities | Number | Duration (Hours) | Workload |
---|---|---|---|
Course Hours (Including exam week: 16 x total hours) | 16 | 1 | 16 |
Laboratory / Application Hours (Including exam week: 16 x total hours) | 16 | 2 | |
Study Hours Out of Class | 10 | 2 | |
Field Work | |||
Quizzes / Studio Critiques | |||
Portfolio | |||
Homework / Assignments | |||
Presentation / Jury | |||
Project | 2 | 27 | |
Seminar / Workshop | |||
Oral Exam | |||
Midterms | 1 | 28 | |
Final Exams | |||
Total | 150 |
# | Program Competencies/Outcomes | * Contribution Level | ||||
1 | 2 | 3 | 4 | 5 | ||
1 | Adequate knowledge in Mathematics, Science and Computer Engineering; ability to use theoretical and applied information in these areas to model and solve Computer Engineering problems | X | ||||
2 | Ability to identify, define, formulate, and solve complex Computer Engineering problems; ability to select and apply proper analysis and modeling methods for this purpose | X | ||||
3 | Ability to design a complex computer based system, process, device or product under realistic constraints and conditions, in such a way as to meet the desired result; ability to apply modern design methods for this purpose | X | ||||
4 | Ability to devise, select, and use modern techniques and tools needed for Computer Engineering practice | X | ||||
5 | Ability to design and conduct experiments, gather data, analyze and interpret results for investigating Computer Engineering problems | X | ||||
6 | Ability to work efficiently in Computer Engineering disciplinary and multi-disciplinary teams; ability to work individually | |||||
7 | Ability to communicate effectively in Turkish, both orally and in writing; knowledge of a minimum of two foreign languages | |||||
8 | Recognition of the need for lifelong learning; ability to access information, to follow developments in science and technology, and to continue to educate him/herself | |||||
9 | Awareness of professional and ethical responsibility | |||||
10 | Information about business life practices such as project management, risk management, and change management; awareness of entrepreneurship, innovation, and sustainable development | |||||
11 | Knowledge about contemporary issues and the global and societal effects of engineering practices on health, environment, and safety; awareness of the legal consequences of Computer Engineering solutions |
*1 Lowest, 2 Low, 3 Average, 4 High, 5 Highest