Course Objectives: |
The aim of this course is to provide students with knowledge about basic computer security, especially network security, security principles, and tools, platforms and applications used for security. |
Course Content: |
Security Concepts and Terminology, Threats, Main Topics, Cryptology, Cryptanalysis, Single and Double Key Systems, Hashing, Network security, Authentication, Email, IP and Network Security applications, Network Attack Types, DoS attacks and defenses, System security, and Defenses It includes the concepts of Attackers, Intrusion Detection Systems, Malware, Network Walls and Operating System. |
Week |
Subject |
Related Preparation |
1) |
Computer Security Concepts and Principles |
Cryptography and Network Security Principles and Practices, 4th edition W. Stallings, ISBN 0-13-187316-4 |
2) |
Cryptographic Building Blocks |
Cryptography and Network Security Principles and Practices, 4th edition W. Stallings, ISBN 0-13-187316-4 |
3) |
User Authentication |
Cryptography and Network Security Principles and Practices, 4th edition W. Stallings, ISBN 0-13-187316-4 |
4) |
Authentication Protocols and Key Generation |
Cryptography and Network Security Principles and Practices, 4th edition W. Stallings, ISBN 0-13-187316-4 |
5) |
Operating Systems Security and Access Control |
Cryptography and Network Security Principles and Practices, 4th edition W. Stallings, ISBN 0-13-187316-4 |
6) |
Software Security and Reliable Systems |
Cryptography and Network Security Principles and Practices, 4th edition W. Stallings, ISBN 0-13-187316-4 |
7) |
Malwares |
Cryptography and Network Security Principles and Practices, 4th edition W. Stallings, ISBN 0-13-187316-4 |
8) |
Midterm |
Cryptography and Network Security Principles and Practices, 4th edition W. Stallings, ISBN 0-13-187316-4 |
9) |
Public-Key Certificate Management |
Cryptography and Network Security Principles and Practices, 4th edition W. Stallings, ISBN 0-13-187316-4 |
10) |
Network Security |
Cryptography and Network Security Principles and Practices, 4th edition W. Stallings, ISBN 0-13-187316-4 |
11) |
Firewalls |
Cryptography and Network Security Principles and Practices, 4th edition W. Stallings, ISBN 0-13-187316-4 |
12) |
IT Security Management |
Cryptography and Network Security Principles and Practices, 4th edition W. Stallings, ISBN 0-13-187316-4 |
13) |
Bitcoin and Blockchain |
Cryptography and Network Security Principles and Practices, 4th edition W. Stallings, ISBN 0-13-187316-4 |
14) |
Linux and Windows Security |
Cryptography and Network Security Principles and Practices, 4th edition W. Stallings, ISBN 0-13-187316-4 |
Course Notes / Textbooks: |
Cryptography and Network Security Principles and Practices, 4th edition W. Stallings, ISBN 0-13-187316-4 |
References: |
Cryptography and Network Security Principles and Practices, 4th edition W. Stallings, ISBN 0-13-187316-4
10 Adımda Bilgisayar Güvenliği Eğitim Kitabı, Kodlab yayınları, ISBN 9786054205165
Bilgi Güvenliği ve Hacking, Enes Aslanbakan, Pusula Yayıncılık, 2016, ISBN 9786058309876 |
|
Program Outcomes |
Level of Contribution |
1) |
Having knowledge and skills in security algorithms for programming |
4 |
1) |
Possesses in-depth theoretical knowledge in information security, cybersecurity, network security, and data protection. |
4 |
2) |
Understands information security management systems, national and international security standards, ethical considerations, and legal regulations. |
|
2) |
Ability to install and manage software required for end user security |
5 |
3) |
Has analytical thinking skills in classifying cyber threats, attack vectors, and defense mechanisms. |
|
3) |
Having the ability to install and manage computer networks and use the network operating system |
4 |
4) |
Theoretically comprehends security technologies such as cryptography, digital signatures, authentication, and access control mechanisms. |
|
5) |
Can establish network security policies and effectively manage security tools such as firewalls and intrusion detection/prevention systems. |
|
6) |
Has expertise in applying cryptographic algorithms, using data encryption techniques, and analyzing cybersecurity intelligence. |
|
7) |
Can conduct penetration tests and security assessments to identify system vulnerabilities and develop preventive measures. |
|