Week |
Subject |
Related Preparation |
1) |
Concepts and Principles of Computer Security |
1) Stallings, W. (2015). Cryptography and Network Security Principles and Practices, 4th edition, ISBN 0-13-187316-4.
2) van Oorschot, P. C. (2021). Computer Security and the internet: Tools and jewels from malware to bitcoin. Cham, Switzerland: Springer.
3) Aumasson, JP. (2018). Serious Cryptography. (First Edition). No Starch Press, ISBN-10: 1-59327-826-8. |
2) |
Cryptographic Building Blocks |
1) Stallings, W. (2015). Cryptography and Network Security Principles and Practices, 4th edition, ISBN 0-13-187316-4.
2) van Oorschot, P. C. (2021). Computer Security and the internet: Tools and jewels from malware to bitcoin. Cham, Switzerland: Springer.
3) Aumasson, JP. (2018). Serious Cryptography. (First Edition). No Starch Press, ISBN-10: 1-59327-826-8. |
3) |
User Authentication |
1) Stallings, W. (2015). Cryptography and Network Security Principles and Practices, 4th edition, ISBN 0-13-187316-4.
2) van Oorschot, P. C. (2021). Computer Security and the internet: Tools and jewels from malware to bitcoin. Cham, Switzerland: Springer.
3) Aumasson, JP. (2018). Serious Cryptography. (First Edition). No Starch Press, ISBN-10: 1-59327-826-8. |
4) |
Authentication Protocols and Key Generation |
1) Stallings, W. (2015). Cryptography and Network Security Principles and Practices, 4th edition, ISBN 0-13-187316-4.
2) van Oorschot, P. C. (2021). Computer Security and the internet: Tools and jewels from malware to bitcoin. Cham, Switzerland: Springer.
3) Aumasson, JP. (2018). Serious Cryptography. (First Edition). No Starch Press, ISBN-10: 1-59327-826-8. |
5) |
Operating Systems Security and Access Control |
1) Stallings, W. (2015). Cryptography and Network Security Principles and Practices, 4th edition, ISBN 0-13-187316-4.
2) van Oorschot, P. C. (2021). Computer Security and the internet: Tools and jewels from malware to bitcoin. Cham, Switzerland: Springer.
3) Aumasson, JP. (2018). Serious Cryptography. (First Edition). No Starch Press, ISBN-10: 1-59327-826-8. |
6) |
Software Security and Trusted Systems |
1) Stallings, W. (2015). Cryptography and Network Security Principles and Practices, 4th edition, ISBN 0-13-187316-4.
2) van Oorschot, P. C. (2021). Computer Security and the internet: Tools and jewels from malware to bitcoin. Cham, Switzerland: Springer.
3) Aumasson, JP. (2018). Serious Cryptography. (First Edition). No Starch Press, ISBN-10: 1-59327-826-8. |
7) |
Malicious Software |
1) Stallings, W. (2015). Cryptography and Network Security Principles and Practices, 4th edition, ISBN 0-13-187316-4.
2) van Oorschot, P. C. (2021). Computer Security and the internet: Tools and jewels from malware to bitcoin. Cham, Switzerland: Springer.
3) Aumasson, JP. (2018). Serious Cryptography. (First Edition). No Starch Press, ISBN-10: 1-59327-826-8. |
8) |
Midterm |
|
9) |
Public-Key Certificate Management |
1) Stallings, W. (2015). Cryptography and Network Security Principles and Practices, 4th edition, ISBN 0-13-187316-4.
2) van Oorschot, P. C. (2021). Computer Security and the internet: Tools and jewels from malware to bitcoin. Cham, Switzerland: Springer.
3) Aumasson, JP. (2018). Serious Cryptography. (First Edition). No Starch Press, ISBN-10: 1-59327-826-8. |
10) |
Network Security |
1) Stallings, W. (2015). Cryptography and Network Security Principles and Practices, 4th edition, ISBN 0-13-187316-4.
2) van Oorschot, P. C. (2021). Computer Security and the internet: Tools and jewels from malware to bitcoin. Cham, Switzerland: Springer.
3) Aumasson, JP. (2018). Serious Cryptography. (First Edition). No Starch Press, ISBN-10: 1-59327-826-8. |
11) |
Firewalls |
1) Stallings, W. (2015). Cryptography and Network Security Principles and Practices, 4th edition, ISBN 0-13-187316-4.
2) van Oorschot, P. C. (2021). Computer Security and the internet: Tools and jewels from malware to bitcoin. Cham, Switzerland: Springer.
3) Aumasson, JP. (2018). Serious Cryptography. (First Edition). No Starch Press, ISBN-10: 1-59327-826-8. |
12) |
IT Security Management |
1) Stallings, W. (2015). Cryptography and Network Security Principles and Practices, 4th edition, ISBN 0-13-187316-4.
2) van Oorschot, P. C. (2021). Computer Security and the internet: Tools and jewels from malware to bitcoin. Cham, Switzerland: Springer.
3) Aumasson, JP. (2018). Serious Cryptography. (First Edition). No Starch Press, ISBN-10: 1-59327-826-8. |
13) |
Bitcoin and Blockchain |
1) Stallings, W. (2015). Cryptography and Network Security Principles and Practices, 4th edition, ISBN 0-13-187316-4.
2) van Oorschot, P. C. (2021). Computer Security and the internet: Tools and jewels from malware to bitcoin. Cham, Switzerland: Springer.
3) Aumasson, JP. (2018). Serious Cryptography. (First Edition). No Starch Press, ISBN-10: 1-59327-826-8. |
14) |
Linux and Windows Security |
1) Stallings, W. (2015). Cryptography and Network Security Principles and Practices, 4th edition, ISBN 0-13-187316-4.
2) van Oorschot, P. C. (2021). Computer Security and the internet: Tools and jewels from malware to bitcoin. Cham, Switzerland: Springer.
3) Aumasson, JP. (2018). Serious Cryptography. (First Edition). No Starch Press, ISBN-10: 1-59327-826-8. |
15) |
Final Exam |
|
|
Program Outcomes |
Level of Contribution |
1) |
To have the ability to apply knowledge in the fields of mathematics, science and programming to the development of software systems and the solution of problems related to computer programming. |
3 |
2) |
To have the ability to analyze and model problems specific to the field of software systems development and computer programming, and to identify and define appropriate software requirements for their solutions. |
1 |
3) |
Having the ability to design, develop and evaluate a software system, system part, process or program that will meet specified requirements. |
1 |
4) |
Have the ability to develop software systems and use modern technical and programming tools for computer programming applications. |
1 |
5) |
To have the discipline of software systems development and computer programming and the ability to demonstrate the necessary business skills to work effectively in interdisciplinary teams or individually. |
1 |
6) |
To have the ability to develop software systems and apply approaches in the development of computer programs by applying analysis, design, implementation, verification, validation and maintenance processes. |
3 |
7) |
To have awareness and awareness of professional, legal, ethical and social problems in the field of software and computer programming. |
2 |