Cryptography protocols, authentication protocols, e-commerce security protocols: design, implementation and analysis, OSI security, models and architectures for network security, email security, email security, IP security, Ipv6, web security, virtual private networks, firewalls, content filtering, denial of service attacks, wireless network security, network security policies, intrusion detection, misuse detection methods, anomaly detection methods, windows and linux security
Vertical Tabs
Course Learning Outcomes
Learning Outcomes | Program Learning Outcomes | Teaching Methods | Assessment Methods | |||
Information Systems graduates know the basic components of operating systems and networks. | 3,6,9 | 1,3,4 | A,B,C | |||
Information Systems graduates know what the basic OS security threats are. | 2,3,6,9 | 1,2,3,4 | A,B,C | |||
Information Systems graduates know what the basic security threats in networks are. | 3,6,9 | 1,3,4 | A,B,C | |||
Knows security protocols and their implementation. | 2,6,9 | 1,3,4 | A,B,C | |||
Knows how to take countermeasures against security threats. | 3,6,9 | 1,3,4 | A,B,C,D | |||
Knows and implements cryptographic measures. | 3,9,6 | 1,2,3,4 | A,B,C,D | |||
Knows and implements authentication measures | 3,9 | 1,2,3,4 | A,B,C,D |
Course Flow
Course Content | ||
Week | Topics | Study Materials |
1 | Introductıon to Information Systems | Lecture Notes |
2 | Hardware Components | Lecture Notes |
3 | Software Components | Lecture Notes |
4 | Open Source Software | Lecture Notes |
5 | Internet | Lecture Notes |
6 | Computer Networks and The TCP/IP Protocol | Lecture Notes |
7 | Midterm | Lecture Notes |
8 | Essentials of Computer Security | Lecture Notes |
9 | Ciphering Protocols | Lecture Notes |
10 | Authentication Protocols | Lecture Notes |
11 | Network and E-Mail Security | Lecture Notes |
12 | Web Security | Lecture Notes |
13 | Windows Security | Lecture Notes |
14 | Linux Security | Lecture Notes |
15 | Review And Midterm |
Recommended Sources
RECOMMENDED SOURCES | |
Textbook |
Guide to Operating Systems Security, Michael Palmer, Publisher: Thomson, 2003 (2004 2nd ed),
ISBN 13: 9780619160401©2004, ISBN 10: 0619160403; Cryptography and Network Security Fourth Ed., William Stallings,© 2006 | Pearson Prentice Hall |ISBN: 0131873184 |
Additional Resources |
Maximum Linux Security (2nd Edition), John Ray, Sams, 2 Pap/Cdr edition, 2001, ISBN10:
0672321343, ISBN13: 9780672321344 Hacking Exposed Windows Server 2003, Joel Scambray & Stuart McClure, McGrawHill Osborne Media, 2006, ISBN10: 0072230614, ISBN13: 9780072230611 |
Material Sharing
MATERIAL SHARING | |
Documents | Presentations and Laboratory Sheets |
Assignments | Homework Sheets |
Exams | Old exam questions are furnished |
Assessment
ASSESSMENT | ||
IN-TERM STUDIES | NUMBER | PERCENTAGE |
Mid-terms | 2 | 66 |
Quizzes | 4 | 16 |
Assignment and Lab Work | 10 | 18 |
Total | 100 | |
CONTRIBUTION OF FINAL EXAMINATION TO OVERALL GRADE | 40 | |
CONTRIBUTION OF IN-TERM STUDIES TO OVERALL GRADE | 60 | |
Total | 100 |
Course’s Contribution to Program
COURSE CATEGORY | Expertise/Field Courses |
COURSE'S CONTRIBUTION TO PROGRAM | |||||||
No | Program Learning Outcomes | Contribution | |||||
1 | 2 | 3 | 4 | 5 | |||
1 | Information Systems graduates have the knowledge and the skills to design and develop the complete systems for multi-media visual user interface. (ACM 112,262) | ||||||
2 | Information Systems graduates have advanced the knowledge and skills to design, develop and install the application systems for multi-media. (ACM365, 368,473) | x | |||||
3 | Information Systems graduates have the knowledge and the skills to design, develop and apply algorithms and data structures to solve the basic problems of information processing, within the framework of discrete mathematics (ACM 221,222). | X | |||||
4 | Information Systems graduates have the knowledge and the skills to design and develop computer applications, based on user specificed requirements, using modern structured development tools and install them on various hardware platforms and deploy their usage.(ACM 311,322) | X | |||||
5 | Information Systems graduates have the knowledge and the skills to design and develop computer applications, based on user specificed requirements, using modern object-oriented development tools and install them on various hardware platforms and deploy their usage(ACM 321). | X | |||||
6 | Information Systems graduates know the logic of computer operating systems, the basic set of system commands, how to control access to system resources by users of different departments and how to monitor the running of jobs in the system (ACM 369, 370). | X | |||||
7 | Information Systems graduates have the knowledge and the skills to design and develop data models serving different requirements, database applications that would access and process data using various types of software, including queries, reports and business applications.(ACM 211, 364) | X | |||||
8 | Information Systems graduates have the knowledge and the skills to design and develop business applications that would provide data access, modification and processing for data kept in enterprise database systems (ACM 221,364). | ||||||
9 | Information Systems graduates have the knowledge about computer networks, and have the skills to design, develop and monitor computer networks, how to configure them and how to maintain their performance. (ACM 361, 362, 363, 463, 464) | X | |||||
10 | Information Systems graduates have the knowledge and the skills to design and develop visual user interfaces for the web, web-based applications for n-tier client/server configurations, how to deploy them in enterprises (ACM 365, 368, 412). | x |
ECTS
ECTS ALLOCATED BASED ON STUDENT WORKLOAD BY THE COURSE DESCRIPTION | |||
Activities | Quantity |
Duration (Hour) |
Total Workload (Hour) |
Course Duration (Including the exam week: 16x Total course hours) | 16 | 3 | 48 |
Hours for off-the-classroom study (Pre-study, practice) | 16 | 3 | 48 |
Mid-terms | 2 | 2 | 4 |
Quizzes | 4 | 1 | 4 |
Homework | 10 | 3 | 30 |
Final examination | 2 (Including reparation) | 2 | 4 |
Total Work Load | 138 | ||
Total Work Load / 25 (h) | 5.52 | ||
ECTS Credit of the Course | 6 |