Course Name | Cryptography and Network Security |
Code | Semester | Theory (hour/week) | Application/Lab (hour/week) | Local Credits | ECTS |
---|---|---|---|---|---|
CE 340 | Fall/Spring | 3 | 0 | 3 | 5 |
Prerequisites | None | |||||
Course Language | English | |||||
Course Type | Elective | |||||
Course Level | First Cycle | |||||
Mode of Delivery | - | |||||
Teaching Methods and Techniques of the Course | Group WorkProblem SolvingLecture / Presentation | |||||
Course Coordinator | ||||||
Course Lecturer(s) | ||||||
Assistant(s) | - |
Course Objectives | This course will introduce cryptography theories, algorithms, and systems. It will also consider necessary approaches and techniques to build protection mechanisms in order to secure computer networks |
Learning Outcomes | The students who succeeded in this course;
|
Course Description | To introduce literature and terminology used for cryptography and network security; to acquaint students with the major cryptography algorithms, systems, functions, and development techniques applied to network security mechanisms. |
Related Sustainable Development Goals | |
| Core Courses | X |
Major Area Courses | ||
Supportive Courses | ||
Media and Managment Skills Courses | ||
Transferable Skill Courses |
Week | Subjects | Required Materials |
1 | Fundamental Concepts | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch1.1 pp. 1-14 |
2 | Cryptographic Concepts | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch1.2 pp. 19-31 |
3 | Symmetric Cryptography | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch2.1 pp. 53-68 |
4 | Public-Key Cryptography | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch2.2 pp. 72-81 |
5 | Cryptographic Hash Functions | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch2.3-Ch2.4 pp. 83-88 |
6 | Digital Signatures | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch2.4-Ch2.5 pp. 89-97 |
7 | Operating Systems Security | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch3 pp. 111-157 |
8 | Malicious Software | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch4 pp. 167-208 |
9 | Network Security | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch5.1-Ch5.2 pp. 215-227 |
10 | Network Security | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch5.3-Ch5.6 pp. 230-256 |
11 | Network Services & Security | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch6 pp. 261-310 |
12 | Browser Security | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch7 pp. 319-372 |
13 | Security Models & Practice | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch9 pp. 435-474 |
14 | Project Presentations | - |
15 | Semester Review | |
16 | Final Examination |
Course Notes/Textbooks | Introduction to Computer Security - M. T. Goodrich and R. Tamassia, © 2011 | Pearson Prentice Hall | ISBN-13: 978-0-321-70201-2, ISBN-10: 0-321-70201-8 |
Suggested Readings/Materials |
Semester Activities | Number | Weighting |
Participation | ||
Laboratory / Application | ||
Field Work | ||
Quizzes / Studio Critiques | 4 | 10 |
Portfolio | ||
Homework / Assignments | ||
Presentation / Jury | ||
Project | 2 | 30 |
Seminar / Workshop | ||
Oral Exam | ||
Midterm | 1 | 30 |
Final Exam | 1 | 30 |
Total |
Weighting of Semester Activities on the Final Grade | 7 | 70 |
Weighting of End-of-Semester Activities on the Final Grade | 1 | 30 |
Total |
Semester Activities | Number | Duration (Hours) | Workload |
---|---|---|---|
Course Hours (Including exam week: 16 x total hours) | 16 | 3 | 48 |
Laboratory / Application Hours (Including exam week: 16 x total hours) | 16 | ||
Study Hours Out of Class | 14 | 3 | 42 |
Field Work | |||
Quizzes / Studio Critiques | 4 | 2 | |
Portfolio | |||
Homework / Assignments | |||
Presentation / Jury | |||
Project | 2 | 10 | |
Seminar / Workshop | |||
Oral Exam | |||
Midterms | 1 | 12 | |
Final Exams | 1 | 20 | |
Total | 150 |
# | Program Competencies/Outcomes | * Contribution Level | ||||
1 | 2 | 3 | 4 | 5 | ||
1 | To have adequate knowledge in Mathematics, Science and Industrial Engineering; to be able to use theoretical and applied information in these areas to model and solve Industrial Engineering problems. | X | ||||
2 | To be able to identify, formulate and solve complex Industrial Engineering problems by using state-of-the-art methods, techniques and equipment; to be able to select and apply proper analysis and modeling methods for this purpose. | X | ||||
3 | To be able to analyze a complex system, process, device or product, and to design with realistic limitations to meet the requirements using modern design techniques. | X | ||||
4 | To be able to choose and use the required modern techniques and tools for Industrial Engineering applications; to be able to use information technologies efficiently. | X | ||||
5 | To be able to design and do simulation and/or experiment, collect and analyze data and interpret the results for investigating Industrial Engineering problems and Industrial Engineering related research areas. | X | ||||
6 | To be able to work efficiently in Industrial Engineering disciplinary and multidisciplinary teams; to be able to work individually. | X | ||||
7 | To be able to communicate effectively in Turkish, both orally and in writing; to be able to author and comprehend written reports, to be able to prepare design and implementation reports, to present effectively; to be able to give and receive clear and comprehensible instructions | |||||
8 | To have knowledge about contemporary issues and the global and societal effects of Industrial Engineering practices on health, environment, and safety; to be aware of the legal consequences of Industrial Engineering solutions. | X | ||||
9 | To be aware of professional and ethical responsibility; to have knowledge of the standards used in Industrial Engineering practice. | X | ||||
10 | To have knowledge about business life practices such as project management, risk management, and change management; to be aware of entrepreneurship and innovation; to have knowledge about sustainable development. | X | ||||
11 | To be able to collect data in the area of Industrial Engineering; to be able to communicate with colleagues in a foreign language. | |||||
12 | To be able to speak a second foreign at a medium level of fluency efficiently. | |||||
13 | To recognize the need for lifelong learning; to be able to access information, to be able to stay current with developments in science and technology; to be able to relate the knowledge accumulated throughout the human history to Industrial Engineering. | X |
*1 Lowest, 2 Low, 3 Average, 4 High, 5 Highest