Undergraduate
Faculty of Engineering and Architecture
Computer Engineering
Anlık RSS Bilgilendirmesi İçin Tıklayınız.Düzenli bilgilendirme E-Postaları almak için listemize kaydolabilirsiniz.


Networks Security

Course CodeSemester Course Name LE/RC/LA Course Type Language of Instruction ECTS
CSE0434 Networks Security 2/0/2 DE English 6
Course Goals
As information systems, and Internet based systems and computer networks have became pervasive, coupled with the increased intensity and sophistication of security-related attacks, have generated need for comprehensive security strategy which encompasses the use of specialized hardware and software and trained personnel. The course intends to fullfil this need by covering the threats to computer and network systems, evaluating the risks of these threats, and developing countermeasures, by examining the security principles, design approaches, standards, and real-world examples.
Prerequisite(s) -
Corequisite(s) -
Special Requisite(s) Students are expected to know the topics of the CSE3013 and CSE6032 courses.
Instructor(s) Assist. Prof. Dr. Öznur Şengel
Course Assistant(s) -
Schedule Theory (A & B) Tuesday 11:00-12:45, Lab. (A) Tuesday 13:00-14:45, Lab. (B) Tuesday 15:00-16:45
Office Hour(s) By appointment. To make an appointment, please contact me via e-mail 2 days in advance.
Teaching Methods and Techniques classroom lectures, lab demonstrations (tutorials), labs assigments, project
Principle Sources William Stallings, "Network Security Essentials: Applications and Standards", 6/E, 2017.
Other Sources William Stallings, Lawrie Brown, "Computer Security: Principles and Practice", Prentice Hall, 4/E. 

William Stallings, "Cryptography and Network Security Principles and Practice", 7/E.

Chuck Easttom, "Computer Security Fundementals", 3rd Edition.
Course Schedules
Week Contents Learning Methods
1. Week Introduction and Syllabus (Chapter 1) Oral presentation, Project
2. Week Symmetric Encryption and Message Confidentiality (Chapter 2) Oral presentation, Laboratory
3. Week Public-Key Cryptography and Message Authentication (Chapter 3) Oral presentation, Laboratory
4. Week Key Distribution and User Authentication (Chapter 4) Oral presentation, Laboratory
5. Week Network Access Control and Cloud Security (Chapter 5) Oral presentation, Laboratory
6. Week Transport-Level Security (Chapter 6) Oral presentation, Project
7. Week Wireless Network Security (Chapter 7) Oral presentation, Laboratory
8. Week Midterm Examination Midterm Examination
9. Week Electronic Mail Security (Chapter 8) Oral presentation, Laboratory
10. Week IP Security (Chapter 9) Oral presentation, Laboratory
11. Week Malicious Software (Chapter 10) Oral presentation, Project
12. Week Intruders (Chapter 11) Oral presentation, Laboratory
13. Week Firewalls (Chapter 12) Oral presentation, Laboratory
14. Week Project Presentation Oral presentation, Laboratory
15. Week Review Oral presentation, Project
16. Week
17. Week
Assessments
Evaluation tools Quantity Weight(%)
Midterm(s) 1 20
Project(s) 1 20
Lab Assignment(s) 5 20
Final Exam 1 40


Program Outcomes
PO-1Adequate knowledge in mathematics, science and engineering subjects pertaining to the relevant discipline; ability to use theoretical and applied information in these areas to model and solve engineering problems.
PO-2Ability to identify, formulate, and solve complex engineering problems; ability to select and apply proper analysis and modelling methods for this purpose.
PO-3Ability to design a complex system, process, device or product under realistic constraints and conditions, in such a way so as to meet the desired result; ability to apply modern design methods for this purpose. (Realistic constraints and conditions may include factors such as economic and environmental issues, sustainability, manufacturability, ethics, health, safety issues, and social and political issues according to the nature of the design.)
PO-4Ability to devise, select, and use modern techniques and tools needed for engineering practice; ability to employ information technologies effectively.
PO-5Ability to design and conduct experiments, gather data, analyse and interpret results for investigating engineering problems.
PO-6Ability to work efficiently in intra-disciplinary and multi-disciplinary teams; ability to work individually.
PO-7Ability to communicate effectively, both orally and in writing; knowledge of a minimum of one foreign language.
PO-8Recognition of the need for lifelong learning; ability to access information, to follow developments in science and technology, and to continue to educate him/herself.
PO-9Awareness of professional and ethical responsibility.
PO-10Information about business life practices such as project management, risk management, and change management; awareness of entrepreneurship, innovation, and sustainable development.
PO-11Knowledge about contemporary issues and the global and societal effects of engineering practices on health, environment, and safety; awareness of the legal consequences of engineering solutions.
Learning Outcomes
LO-1To be able to define, identify and describe security services, security mechanisms and security attacks.
LO-2Understand the need and to be able to apply the different cryptographic techniques for providing various security services.
LO-3Learn and be able to apply the different computer security technology components such as access control, firewall, intrusion detection and prevention, antimalware technologies, etc..
LO-4To understand the security issues on the Internet and be able to apply the security principles and technologies while using applications such as FTP, email, Web, etc.
LO-5Explain and demonstrate the threats to computer and network systems, evaluate the relative risks of these threats and develop cost effective and user-friendly countermeasures.
Course Assessment Matrix:
Program Outcomes - Learning Outcomes Matrix
 PO 1PO 2PO 3PO 4PO 5PO 6PO 7PO 8PO 9PO 10PO 11
LO 1
LO 2
LO 3
LO 4
LO 5