11111

COURSE INTRODUCTION AND APPLICATION INFORMATION


ce.cs.ieu.edu.tr

Course Name
Code
Semester
Theory
(hour/week)
Application/Lab
(hour/week)
Local Credits
ECTS
Fall/Spring
Prerequisites
 CE 222To succeed (To get a grade of at least DD)
Course Language
Course Type
Elective
Course Level
-
Mode of Delivery -
Teaching Methods and Techniques of the Course Group Work
Problem Solving
Course Coordinator -
Course Lecturer(s)
Assistant(s) -
Course Objectives
Learning Outcomes The students who succeeded in this course;
  • learn threats to computer networks and protection mechanisms and methods need to thwart these threats.
  • understand the theory of fundamental cryptography, encryption, and decryption algorithms,
  • build simple cryptosystems by applying encryption algorithms,
  • comprehend secure identity management (authentication), message authentication, and digital signature techniques.
Course Description

 



Course Category

Core Courses
X
Major Area Courses
Supportive Courses
Media and Managment Skills Courses
Transferable Skill Courses

 

WEEKLY SUBJECTS AND RELATED PREPARATION STUDIES

Week Subjects Required Materials
1 Fundamental Concepts Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch1.1, pp. 1-14
2 Cryptographic Concepts Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch1.2, pp 19-31
3 Symmetric Cryptography Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch2.1 pp. 53-68
4 Publi-Key Cryptography Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch2.2 pp. 72-81
5 Cryptographic Hash Functions Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch2.3-Ch2.4 pp. 83-88
6 Digital Signatures Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch2.4-Ch2.5, pp. 89-97
7 Operating Systems Security Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch3 pp. 111-157
8 Malicious Software Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch4 pp. 167-208
9 MIDTERM EXAM
10 Network Security Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch5.1-Ch5.2 pp. 215-227
11 Network Security Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch5.3-Ch5. 6 pp. 230-256
12 Network Services & Security Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch6 pp. 261-310
13 Browser Security Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch7 pp. 319-372
14 Security Models & Practice Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch9 pp. 435-474
15 Project Presentations
16 Review of the Semester  
Course Notes/Textbooks Cryptography and Network Security Fourth Ed., William Stallings,© 2006 | Pearson Prentice Hall | ISBN: 0131873184
Suggested Readings/Materials

 

EVALUATION SYSTEM

Semester Activities Number Weigthing
Participation
16
10
Laboratory / Application
Field Work
Quizzes / Studio Critiques
Portfolio
Homework / Assignments
Presentation / Jury
Project
2
60
Seminar / Workshop
Oral Exam
Midterm
1
30
Final Exam
Total

Weighting of Semester Activities on the Final Grade
3
60
Weighting of End-of-Semester Activities on the Final Grade
1
40
Total

ECTS / WORKLOAD TABLE

Semester Activities Number Duration (Hours) Workload
Course Hours
(Including exam week: 16 x total hours)
16
1
16
Laboratory / Application Hours
(Including exam week: 16 x total hours)
16
2
Study Hours Out of Class
10
2
Field Work
Quizzes / Studio Critiques
Portfolio
Homework / Assignments
Presentation / Jury
Project
2
27
Seminar / Workshop
Oral Exam
Midterms
1
28
Final Exams
    Total
150

 

COURSE LEARNING OUTCOMES AND PROGRAM QUALIFICATIONS RELATIONSHIP

#
Program Competencies/Outcomes
* Contribution Level
1
2
3
4
5
1

Adequate knowledge in Mathematics, Science and Computer Engineering; ability to use theoretical and applied information in these areas to model and solve Computer Engineering problems

X
2

Ability to identify, define, formulate, and solve complex Computer Engineering problems; ability to select and apply proper analysis and modeling methods for this purpose

X
3

Ability to design a complex computer based system, process, device or product under realistic constraints and conditions, in such a way as to meet the desired result; ability to apply modern design methods for this purpose

X
4

Ability to devise, select, and use modern techniques and tools needed for Computer Engineering practice

X
5

Ability to design and conduct experiments, gather data, analyze and interpret results for investigating Computer Engineering problems

X
6

Ability to work efficiently in Computer Engineering disciplinary and multi-disciplinary teams; ability to work individually

7

Ability to communicate effectively in Turkish, both orally and in writing; knowledge of a minimum of two foreign languages

8

Recognition of the need for lifelong learning; ability to access information, to follow developments in science and technology, and to continue to educate him/herself

9

Awareness of professional and ethical responsibility

10

Information about business life practices such as project management, risk management, and change management; awareness of entrepreneurship, innovation, and sustainable development

11

Knowledge about contemporary issues and the global and societal effects of engineering practices on health, environment, and safety; awareness of the legal consequences of Computer Engineering solutions

*1 Lowest, 2 Low, 3 Average, 4 High, 5 Highest

 

İzmir Ekonomi Üniversitesi | Sakarya Caddesi No:156, 35330 Balçova - İZMİR Tel: +90 232 279 25 25 | webmaster@ieu.edu.tr | YBS 2010