Week |
Subject |
Related Preparation |
1) |
Introduction to security and examination of security concepts |
Cryptography and Network Security (4th Edition) Principles and Practices, William Stallings
Network Security Essentials: Applications and Standards (3rd Edition), William Stallings
Network Security: Private Communication in a Public World (2nd Edition), Charlie Kaufman |
2) |
Overview of the elements that make up security |
Cryptography and Network Security (4th Edition) Principles and Practices, William Stallings
Network Security Essentials: Applications and Standards (3rd Edition), William Stallings
Network Security: Private Communication in a Public World (2nd Edition), Charlie Kaufman |
3) |
Overview of the elements that make up security |
Cryptography and Network Security (4th Edition) Principles and Practices, William Stallings
Network Security Essentials: Applications and Standards (3rd Edition), William Stallings
Network Security: Private Communication in a Public World (2nd Edition), Charlie Kaufman |
4) |
Cryptography and its place in security |
Cryptography and Network Security (4th Edition) Principles and Practices, William Stallings
Network Security Essentials: Applications and Standards (3rd Edition), William Stallings
Network Security: Private Communication in a Public World (2nd Edition), Charlie Kaufman |
5) |
Cryptography and its place in security |
Cryptography and Network Security (4th Edition) Principles and Practices, William Stallings
Network Security Essentials: Applications and Standards (3rd Edition), William Stallings
Network Security: Private Communication in a Public World (2nd Edition), Charlie Kaufman |
6) |
Network security |
Cryptography and Network Security (4th Edition) Principles and Practices, William Stallings
Network Security Essentials: Applications and Standards (3rd Edition), William Stallings
Network Security: Private Communication in a Public World (2nd Edition), Charlie Kaufman |
7) |
Operating systems security |
Cryptography and Network Security (4th Edition) Principles and Practices, William Stallings
Network Security Essentials: Applications and Standards (3rd Edition), William Stallings
Network Security: Private Communication in a Public World (2nd Edition), Charlie Kaufman |
8) |
Midterm |
Cryptography and Network Security (4th Edition) Principles and Practices, William Stallings
Network Security Essentials: Applications and Standards (3rd Edition), William Stallings
Network Security: Private Communication in a Public World (2nd Edition), Charlie Kaufman |
9) |
Web application security |
Cryptography and Network Security (4th Edition) Principles and Practices, William Stallings
Network Security Essentials: Applications and Standards (3rd Edition), William Stallings
Network Security: Private Communication in a Public World (2nd Edition), Charlie Kaufman |
10) |
Web application security |
Cryptography and Network Security (4th Edition) Principles and Practices, William Stallings
Network Security Essentials: Applications and Standards (3rd Edition), William Stallings
Network Security: Private Communication in a Public World (2nd Edition), Charlie Kaufman |
11) |
Security in identity management |
Cryptography and Network Security (4th Edition) Principles and Practices, William Stallings
Network Security Essentials: Applications and Standards (3rd Edition), William Stallings
Network Security: Private Communication in a Public World (2nd Edition), Charlie Kaufman |
12) |
Compliance and certification |
Cryptography and Network Security (4th Edition) Principles and Practices, William Stallings
Network Security Essentials: Applications and Standards (3rd Edition), William Stallings
Network Security: Private Communication in a Public World (2nd Edition), Charlie Kaufman |
13) |
Security Reviews |
Cryptography and Network Security (4th Edition) Principles and Practices, William Stallings
Network Security Essentials: Applications and Standards (3rd Edition), William Stallings
Network Security: Private Communication in a Public World (2nd Edition), Charlie Kaufman |
14) |
Final |
Cryptography and Network Security (4th Edition) Principles and Practices, William Stallings
Network Security Essentials: Applications and Standards (3rd Edition), William Stallings
Network Security: Private Communication in a Public World (2nd Edition), Charlie Kaufman |
|
Program Outcomes |
Level of Contribution |
1) |
Competent knowledge of mathematics, science and technology, and computer engineering; ability to apply this knowledge to engineering solutions. |
|
2) |
Skills to design and conduct experiments, collect data, analyze and interpret results. |
|
3) |
Ability to design a complex system, process, device or product under realistic constraints and conditions to meet specific requirements; ability to apply modern design methods for this purpose. |
|
4) |
Ability to develop, select and use modern techniques and tools required for analysis and solution of complex problems encountered in engineering practice; ability to use information technologies effectively. |
|
5) |
Ability to design and conduct experiments, collect data, analyze and interpret results to investigate complex engineering problems or discipline-specific research topics. |
|
6) |
Ability to work effectively in intra-disciplinary and multi-disciplinary teams; ability to work individually. |
|
7) |
Ability to communicate effectively in Turkish, both orally and in writing; Knowledge of at least one foreign language; the ability to write and understand written reports effectively, to prepare design and production reports, to make effective presentations, to give and receive clear and understandable instructions. |
|
8) |
Awareness of the necessity of lifelong learning; the ability to access information, to follow developments in science and technology, and to constantly renew oneself. |
|
9) |
Acting in accordance with ethical principles, professional and ethical responsibility awareness; information about standards used in engineering applications. |
|
10) |
Information about business life practices such as project management, risk management and change management; awareness of entrepreneurship, innovation; information about sustainable development. |
|
11) |
Knowledge about the universal and social effects of engineering applications on health, environment and safety and the problems of the age reflected in the field of engineering; awareness of the legal consequences of engineering solutions. |
|