Teaching Staff
|
|
Language of Instruction |
Türkçe (Turkish) |
Type Of Course |
Compulsory |
Prerequisites |
- |
Recommended Optional Programme Component |
|
Course Objectives |
To gain the ability of security analysis, design and implementation for computer systems, networks and applications.The semester project will emphasize the in tegration of these components into a useful application and evolution of the application over time. Lectures will provide overviews of the components, integration techniques, and planning for changes as the application evolves. |
Course Content |
Examining the concept of security and the components that create security within the scope of computer systems and computer networks and applications using these structures. |
Learning Outcomes (LO) |
1. Student will be able to master basic security concepts for computer systems, networks and applications.
2. Students will be able to describe and analyze the security of computer systems.
3. Student will be able to realize the necessary applications to ensure security in computer systems, networks and applications.
4. Students will learn security problems and related solutions related to operating systems and applications.
5. The student will be able to evaluate security for existing structures in the systems and learn what measures to take.
|
Mode of Delivery |
Face to face |
Course Outline |
Week |
Topics |
1. Week |
Introduction to security and examination of security concepts |
2. Week |
Overview of the elements that make up security |
3. Week |
Overview of the elements that make up security |
4. Week |
The place of cryptography and security in cryptography |
5. Week |
The place of cryptography and security in cryptography |
6. Week |
Network security |
7. Week |
Operating systems security |
8. Week |
Midterm Exam |
9. Week |
Web application security |
10. Week |
Web application security |
11. Week |
Security in identity management |
12. Week |
Compliance and certification |
13. Week |
Security Reviews |
14. Week |
General evaluation
|
|
Assessment |
|
Percentage(%) |
Mid-term (%) |
40 |
Quizes (%) |
|
Homeworks/Term papers (%) |
|
Practice (%) |
|
Labs (%) |
|
Projects/Field Work (%) |
|
Seminars/Workshops (%) |
|
Final (%) |
60 |
Other (%) |
|
Total(%) |
100 |
|
Course Book (s) and/or References |
•Cryptography and Network Security (4th Edition) Principles and Practices, William Stallings
•Network Security Essentials: Applications and Standards (3rd Edition), William Stallings
•Network Security: Private Communication in a Public World (2nd Edition), Charlie Kaufman
|
Work Placement(s) |
|
The Relationship between Program Qualifications (PQ) and Course Learning Outcomes (LO) |
| PQ1 | PQ2 | PQ3 | PQ4 | PQ5 | PQ6 | PQ7 | PQ8 | PQ9 | PQ10 | PQ11 | PQ12 | PQ13 | PQ14 | LO1 | 5 | 4 | | | | | | | | | | | | | LO2 | 5 | 4 | | | 3 | | | | 3 | | | | | | LO3 | 5 | 4 | | | 3 | | | | 3 | | | | | | LO4 | 5 | 4 | | | | | | | | | | | | | LO5 | 5 | 4 | | | | | | | | | | | | |
* Contribution Level : 1 Very low 2 Low 3 Medium 4 High 5 Very High |