Cryptography protocols, authentication protocols, e-commerce security protocols: design, implementation and analysis, OSI security, models and architectures for network security, email security, email security, IP security, Ipv6, web security, virtual private networks, firewalls, content filtering, denial of service attacks, wireless network security, network security policies, intrusion detection, misuse detection methods, anomaly detection methods, windows and linux security
Kriptografi protokolleri, doğrulama protokolleri, e-ticaret güvenlik protokolleri, güvenlik protokolleri: tasarım, uygulama ve analiz, OSI güvenliği, ağ güvenliği için model ve mimariler, e-posta güvenliği, IP güvenliği, IPv6, web güvenliği, sanal özel ağlar, alev duvarları, içerik filtreleme, hizmet yalanlama saldırıları, kablosuz ağ güvenliği, ağ güvenlik poliçeleri, sistemlere izinsiz girişin algılanması, kötüye kullanma yöntemleri, anomali algılanması, windows ve linux güvenliği.
Vertical Tabs
Course Learning Outcomes
Learning Outcomes | Program Learning Outcomes | Teaching Methods | Assessment Methods | |||
Information Systems graduates know the basic components of operating systems and networks. | 3,6,9 | 1,3,4 | A,B,C | |||
Information Systems graduates know what the basic OS security threats are. | 2,3,6,9 | 1,2,3,4 | A,B,C | |||
Information Systems graduates know what the basic security threats in networks are. | 3,6,9 | 1,3,4 | A,B,C | |||
Knows security protocols and their implementation. | 2,6,9 | 1,3,4 | A,B,C | |||
Knows how to take countermeasures against security threats. | 3,6,9 | 1,3,4 | A,B,C,D | |||
Knows and implements cryptographic measures. | 3,9,6 | 1,2,3,4 | A,B,C,D | |||
Knows and implements authentication measures | 3,9 | 1,2,3,4 | A,B,C,D |
Course Flow
Week | Topics | Study Materials |
1 | Cryptography protocols, Encryption &Decryption Algorithm | ACM 221 |
2 | Lab: İntroduction to PGP software -- Send and receive encrypted e-mails | ACM 361 |
3 | Authentication protocols | ACM 369 |
4 | E-Commerce security protocols: design, implementation and analysis, | ACM 366 |
5 | OSI security, models and architectures for network security, | ACM 361,369 |
6 | E-mail security | ACM 111 |
7 | MIDTERM EXAMINATION | |
8 | IP security, Ipv6 | ACM 111 |
9 | Web security, virtual private networks, firewalls, content filtering, denial of service attacks, | ACM 369 |
10 | Wireless network security, Wireless Topology, Risks and Protections | ACM 363 |
11 | Network security policies, intrusion detection, misuse detection methods, | ACM 361 |
12 | Ip spoofing | ACM 361 |
13 | Windows security | ACM 370 |
14 | Linux Security | ACM 369 |
15 | REVIEW AND MIDTERM EXAMINATION |
Recommended Sources
Textbook |
Guide to Operating Systems Security, Michael Palmer, Publisher: Thomson, 2003 (2004 2nd ed),
ISBN 13: 9780619160401©2004, ISBN 10: 0619160403; Cryptography and Network Security Fourth Ed., William Stallings,© 2006 | Pearson Prentice Hall |ISBN: 0131873184 |
Additional Resources |
Maximum Linux Security (2nd Edition), John Ray, Sams, 2 Pap/Cdr edition, 2001, ISBN10:
0672321343, ISBN13: 9780672321344 Hacking Exposed Windows Server 2003, Joel Scambray & Stuart McClure, McGrawHill Osborne Media, 2006, ISBN10: 0072230614, ISBN13: 9780072230611 |
Material Sharing
Documents | Presentations and Laboratory Sheets |
Assignments | Homework Sheets |
Exams | Old exam questions are furnished |
Assessment
IN-TERM STUDIES | NUMBER | PERCENTAGE |
Mid-terms | 2 | 66 |
Quizzes | 4 | 16 |
Assignment and Labwork | 10 | 18 |
Total | 100 | |
CONTRIBUTION OF FINAL EXAMINATION TO OVERALL GRADE | 40 | |
CONTRIBUTION OF IN-TERM STUDIES TO OVERALL GRADE | 60 | |
Total | 100 |
COURSE CATEGORY | Expertise/Field Courses |
Course’s Contribution to Program
|
ECTS
Activities | Quantity |
Duration (Hour) |
Total Workload (Hour) |
Course Duration (Including the exam week: 16x Total course hours) | 16 | 3 | 48 |
Hours for off-the-classroom study (Pre-study, practice) | 16 | 3 | 48 |
Mid-terms | 2 | 2 | 4 |
Quizzes | 4 | 1 | 4 |
Homework | 10 | 3 | 30 |
Final examination | 2 (Including reparation) | 2 | 4 |
Total Work Load | 138 | ||
Total Work Load / 25 (h) | 5.52 | ||
ECTS Credit of the Course | 6 |