COURSE INTRODUCTION AND APPLICATION INFORMATION


Course Name
Information Security
Code
Semester
Theory
(hour/week)
Application/Lab
(hour/week)
Local Credits
ECTS
CE 607
Fall/Spring
3
0
3
7.5
Prerequisites
None
Course Language
English
Course Type
Elective
Course Level
Third Cycle
Mode of Delivery -
Teaching Methods and Techniques of the Course
Course Coordinator -
Course Lecturer(s) -
Assistant(s) -
Course Objectives The aim of the course is to evaluate the current problems and researches about information security. The course also addresses incident response and provides a technical foundation for working with operating system, network and application security, and cryptography. At the end of the course the students should have the ability to do new researches on this area and the student should try to write an article about his/her study topic as term project.
Learning Outcomes The students who succeeded in this course;
  • will be able to develop an approach for staying current with trends and requisite skills in information security.
  • will be able to extend their technical knowledge and skills in the area of information security
  • will be able to develop a basic understanding of cryptography
  • will be able to develop an understanding of security policies
Course Description The objective of this course is to provide the fundamental concepts of information security, its framework and processes, and to provide insight into abstraction, problem solving and systematic view.
Related Sustainable Development Goals

 



Course Category

Core Courses
Major Area Courses
X
Supportive Courses
Media and Managment Skills Courses
Transferable Skill Courses

 

WEEKLY SUBJECTS AND RELATED PREPARATION STUDIES

Week Subjects Required Materials
1 Introduction
2 Building Secure Organization Computer and Information Security Handbook, Ch.1
3 Introduction to Cryptography Computer and Information Security Handbook, Ch.2
4 Symmetrical and Asymmetrical Cryptosystems
5 Symmetrical and Asymmetrical Cryptosystems
6 Symmetrical and Asymmetrical Cryptosystems
7 Review of the Semester  
8 Review of the Semester  
9 Review of the Semester  
10 Review of the Semester  
11 Review of the Semester  
12 Review of the Semester  
13 Review of the Semester  
14 Course Project completion and presentations. -
15 Course Project completion and presentations. -
16 - -
Course Notes/Textbooks

Principals of Information Security, Whitman and Mattord, 6th Ed., Cengage Learning, 2018.

Suggested Readings/Materials

Computer and Information security Handbook, 3rd Ed., John R. Vacca, Elsevier, 2017
Computer Security: Art and Science, By Matt Bishop, 2002, Addison-Wesley Professional. Security in Computing, 4th Edition, By Charles P. Pfleeger, Shari Lawrence Pfleeger, 2006, Prentice Hall. The Psychology of Security, By Bruce Schneier, January 18, 2008, http://www.schneier.com/essay-155.html. Information Security: Definations, http://www.hancockonline.net/IS-defs.html Information Security: Standards Organizations, http://www.hancockonline.net/IS-std-o.html IEEE Transaction on Information Forensics and Security, http://www.ieee.org/organizations/society/sp/tifs.htm

 

EVALUATION SYSTEM

Semester Activities Number Weigthing
Participation
Laboratory / Application
Field Work
Quizzes / Studio Critiques
Portfolio
Homework / Assignments
Presentation / Jury
Project
1
30
Seminar / Workshop
1
20
Oral Exam
Midterm
Final Exam
1
50
Total

Weighting of Semester Activities on the Final Grade
50
Weighting of End-of-Semester Activities on the Final Grade
50
Total

ECTS / WORKLOAD TABLE

Semester Activities Number Duration (Hours) Workload
Course Hours
(Including exam week: 16 x total hours)
16
3
48
Laboratory / Application Hours
(Including exam week: 16 x total hours)
16
Study Hours Out of Class
15
4
60
Field Work
Quizzes / Studio Critiques
Portfolio
Homework / Assignments
Presentation / Jury
Project
1
55
Seminar / Workshop
Oral Exam
Midterms
Final Exams
1
62
    Total
225

 

COURSE LEARNING OUTCOMES AND PROGRAM QUALIFICATIONS RELATIONSHIP

#
Program Competencies/Outcomes
* Contribution Level
1
2
3
4
5
1 Understands and applies the foundational theories of Computer Engineering in a high level. X
2 Possesses a great depth and breadth of knowledge about Computer Engineering including the latest developments. X
3 Can reach the latest information in Computer Engineering and possesses a high level of proficiency in the methods and abilities necessary to comprehend it and conduct research with it. X
4 Conducts a comprehensive study that introduces innovation to science and technology, develops a new scientific procedure or a technological product/process, or applies a known method in a new field.  X
5 Independently understands, designs, implements and concludes a unique research process in addition to managing it.  X
6 Contributes to science and technology literature by publishing the output of his/her academic studies in respectable academic outlets. X
7 Interprets scientific, technological, social and cultural developments and relates them to the general public with a commitment to scientific objectivity and ethical responsibility. X
8 Performs critical analysis, synthesis and evaluation of ideas and developments in Computer Engineering. X
9 Performs verbal and written communications with professionals as well as broader scientific and social communities in Computer Engineering, by using English at least at the European Language Portfolio C1 General level, performs written, oral and visual communications and discussions in a high level. X
10 Develops strategies, policies and plans about systems and topics that Computer Engineering uses, and interprets the outcomes. X

*1 Lowest, 2 Low, 3 Average, 4 High, 5 Highest