|
BIL4026 | @network security | 3+0+0 | ECTS:4 | Year / Semester | Spring Semester | Level of Course | First Cycle | Status | Elective | Department | DEPARTMENT of COMPUTER ENGINEERING | Prerequisites and co-requisites | None | Mode of Delivery | | Contact Hours | 14 weeks - 3 hours of lectures per week | Lecturer | Prof. Dr. Güzin ULUTAŞ | Co-Lecturer | | Language of instruction | Turkish | Professional practise ( internship ) | None | | The aim of the course: | To obtain information about network security, to learn about possible cyber attacks that may come over the network, and to have information about security protocols and security software developed against them. |
Learning Outcomes | CTPO | TOA | Upon successful completion of the course, the students will be able to : | | | LO - 1 : | | 1,2 | 1,3, | LO - 2 : | | 2 | 1,3, | LO - 3 : | | 2 | 1,3, | CTPO : Contribution to programme outcomes, TOA :Type of assessment (1: written exam, 2: Oral exam, 3: Homework assignment, 4: Laboratory exercise/exam, 5: Seminar / presentation, 6: Term paper), LO : Learning Outcome | |
Within the scope of the course, security problems in computer networks, approaches to ensuring network security, various security protocols and the security mechanisms behind these protocols will be discussed. |
|
Course Syllabus | Week | Subject | Related Notes / Files | Week 1 | Computer Security Concepts, OSI Security Architecture, Security attacks and services, attack surfaces and attack trees | | Week 2 | Cryptographic hash functions | | Week 3 | digital signatures and attack types | | Week 4 | entitiy authenticaiton | | Week 5 | Key management | | Week 6 | Security at the application layer | | Week 7 | security at the transport layer | | Week 8 | security at the network layer | | Week 9 | Midterm exam | | Week 10 | Network access control and cloud security | | Week 11 | Wireless Network Security | | Week 12 | Malicious Software | | Week 13 | Intruders and firewalls | | Week 14 | Invited speaker from the field of network security | | Week 15 | Rule based and AI based Intrusion detection systems | | Week 16 | Talk about the project topic and evaluation | | |
1 | Behrouz Forouzan, Cryptography and Networks Security, McGraw Hill | | |
1 | William Stallings, Network Security Essentials | | |
Method of Assessment | Type of assessment | Week No | Date | Duration (hours) | Weight (%) | Mid-term exam | 9 | | 2 | 25 | Project | 15 | | 2 | 25 | End-of-term exam | 16 | | 2 | 50 | |
Student Work Load and its Distribution | Type of work | Duration (hours pw) | No of weeks / Number of activity | Hours in total per term | Yüz yüze eğitim | 3 | 14 | 42 | Arasınav için hazırlık | 1 | 8 | 8 | Arasınav | 2 | 1 | 2 | Proje | 1 | 14 | 14 | Dönem sonu sınavı için hazırlık | 1 | 15 | 15 | Dönem sonu sınavı | 2 | 1 | 2 | Total work load | | | 83 |
|