Security in computer terminology defines the solutions developed for compute and communicate and protocols to be followed in threats of attack environment. In this context, the goal of the Network Security course is to create a solid hardware and software infrastructure for the basic issues of security in modern computer network systems. Identifying and assessing possible threats and risks against all information systems from personal computers to large-scale networks and taking precaution against these threats is the basic content of the Network Security course.
Prerequisite(s)
. MB0051 Computer Networks
. MB0053 Cryptography
Corequisite(s)
-
Special Requisite(s)
The minimum qualifications that are expected from the students who want to attend the course.(Examples: Foreign language level, attendance, known theoretical pre-qualifications, etc.)
Instructor(s)
Assist. Prof. Dr. Tayfun Kaynaş
Course Assistant(s)
Schedule
Thursday, 13.00-16.45
Office Hour(s)
Thursday, 17.00-18.00
Teaching Methods and Techniques
Theory and practice
Principle Sources
“Network Security Essentials”, William Stallings, 5th edition (Pearson)
Other Sources
“Network Security : A Beginner’s Guide”, Eric Maiwald, McGraw Hill.
“Computer Security”, 2nd edition, Deiter Gollmann, John & Wiley Publishing.
Course Schedules
Week
Contents
Learning Methods
1. Week
Overview of Security Concept
Theory, Practice
2. Week
Symmetric Encryption, Information Security
Theory, Practice
3. Week
Public Key Cryptography, Message Verification
Theory, Practice
4. Week
Key Distribution and User Authentication
Theory, Practice
5. Week
Network Access Control and Cloud Computing
Theory, Practice
6. Week
Transport Level Security
Theory, Practice
7. Week
Wireless Network Secuirt
Theory, Practice
8. Week
Midterm
Exam
9. Week
Electronic Mail Secuirt
Theory, Practice
10. Week
IP Security
Theory, Practice
11. Week
Malicious Software
Theory, Practice
12. Week
Viruses and similar threats
Theory, Practice
13. Week
Intrusion Detection and Intrusion Prevention Systems
Theory, Practice
14. Week
Firewalls
Theory, Practice
15. Week
16. Week
17. Week
Assessments
Evaluation tools
Quantity
Weight(%)
Midterm(s)
1
30
Quizzes
2
20
Final Exam
1
50
Program Outcomes
PO-1
Interpreting advanced theoretical and applied knowledge in Mathematics and Computer Science.
PO-2
Critiquing and evaluating data by implementing the acquired knowledge and skills in Mathematics and Computer Science.
PO-3
Recognizing, describing, and analyzing problems in Mathematics and Computer Science; producing solution proposals based on research and evidence.
PO-4
Understanding the operating logic of computer and recognizing computational-based thinking using mathematics as a discipline.
PO-5
Collaborating as a team-member, as well as individually, to produce solutions to problems in Mathematics and Computer Science.
PO-6
Communicating in a foreign language, and interpreting oral and written communicational abilities in Turkish.
PO-7
Using time effectively in inventing solutions by implementing analytical thinking.
PO-8
Understanding professional ethics and responsibilities.
PO-9
Having the ability to behave independently, to take initiative, and to be creative.
PO-10
Understanding the importance of lifelong learning and developing professional skills continuously.
PO-11
Using professional knowledge for the benefit of the society.
Learning Outcomes
LO-1
Understanding Network security terminology.
LO-2
Remembering preliminary information on cryptography and information security.
LO-3
Identifying security risks in a computer system and different types of threats and attacks that can be done in the system.
LO-4
Analysing symmetric and asymmetric cryptographic systems and remembering weak and strong aspects of these techniques against attack threats.
LO-5
Understanding security software and hardware solutions such as firewall, antivirus, access control and applying them.
LO-6
Understanding security management issues in computer networks.