Undergraduate
Faculty of Science and Letters
Mathematics And Computer Science
Anlık RSS Bilgilendirmesi İçin Tıklayınız.Düzenli bilgilendirme E-Postaları almak için listemize kaydolabilirsiniz.


Network Security

Course CodeSemester Course Name LE/RC/LA Course Type Language of Instruction ECTS
MB0056 Network Security 2/2/0 DE Turkish 5
Course Goals
Security in computer terminology defines the solutions developed for compute and communicate and protocols to be followed in threats of attack environment. In this context, the goal of the Network Security course is to create a solid hardware and software infrastructure for the basic issues of security in modern computer network systems. Identifying and assessing possible threats and risks against all information systems from personal computers to large-scale networks and taking precaution against these threats is the basic content of the Network Security course.
Prerequisite(s) . MB0051 Computer Networks . MB0053 Cryptography
Corequisite(s) -
Special Requisite(s) The minimum qualifications that are expected from the students who want to attend the course.(Examples: Foreign language level, attendance, known theoretical pre-qualifications, etc.)
Instructor(s) Assist. Prof. Dr. Tayfun Kaynaş
Course Assistant(s)
Schedule Thursday, 13.00-16.45
Office Hour(s) Thursday, 17.00-18.00
Teaching Methods and Techniques Theory and practice
Principle Sources “Network Security Essentials”,  William Stallings, 5th edition (Pearson)
Other Sources

“Network Security :  A Beginner’s Guide”, Eric Maiwald, McGraw Hill.

“Computer Security”, 2nd edition, Deiter Gollmann, John & Wiley Publishing.

Course Schedules
Week Contents Learning Methods
1. Week Overview of Security Concept Theory, Practice
2. Week Symmetric Encryption, Information Security Theory, Practice
3. Week Public Key Cryptography, Message Verification Theory, Practice
4. Week Key Distribution and User Authentication Theory, Practice
5. Week Network Access Control and Cloud Computing Theory, Practice
6. Week Transport Level Security Theory, Practice
7. Week Wireless Network Secuirt Theory, Practice
8. Week Midterm Exam
9. Week Electronic Mail Secuirt Theory, Practice
10. Week IP Security Theory, Practice
11. Week Malicious Software Theory, Practice
12. Week Viruses and similar threats Theory, Practice
13. Week Intrusion Detection and Intrusion Prevention Systems Theory, Practice
14. Week Firewalls Theory, Practice
15. Week
16. Week
17. Week
Assessments
Evaluation tools Quantity Weight(%)
Midterm(s) 1 30
Quizzes 2 20
Final Exam 1 50


Program Outcomes
PO-1Interpreting advanced theoretical and applied knowledge in Mathematics and Computer Science.
PO-2Critiquing and evaluating data by implementing the acquired knowledge and skills in Mathematics and Computer Science.
PO-3Recognizing, describing, and analyzing problems in Mathematics and Computer Science; producing solution proposals based on research and evidence.
PO-4Understanding the operating logic of computer and recognizing computational-based thinking using mathematics as a discipline.
PO-5Collaborating as a team-member, as well as individually, to produce solutions to problems in Mathematics and Computer Science.
PO-6Communicating in a foreign language, and interpreting oral and written communicational abilities in Turkish.
PO-7Using time effectively in inventing solutions by implementing analytical thinking.
PO-8Understanding professional ethics and responsibilities.
PO-9Having the ability to behave independently, to take initiative, and to be creative.
PO-10Understanding the importance of lifelong learning and developing professional skills continuously.
PO-11Using professional knowledge for the benefit of the society.
Learning Outcomes
LO-1Understanding Network security terminology.
LO-2Remembering preliminary information on cryptography and information security.
LO-3Identifying security risks in a computer system and different types of threats and attacks that can be done in the system.
LO-4Analysing symmetric and asymmetric cryptographic systems and remembering weak and strong aspects of these techniques against attack threats.
LO-5Understanding security software and hardware solutions such as firewall, antivirus, access control and applying them.
LO-6Understanding security management issues in computer networks.
Course Assessment Matrix:
Program Outcomes - Learning Outcomes Matrix
 PO 1PO 2PO 3PO 4PO 5PO 6PO 7PO 8PO 9PO 10PO 11