Course Name
|
Cryptography and Network Security
|
Code
|
Semester
|
Theory
(hour/week)
|
Application/Lab
(hour/week)
|
Local Credits
|
ECTS
|
CE 340
|
Fall/Spring
|
3
|
0
|
3
|
5
|
Prerequisites
|
None
|
Course Language
|
English
|
Course Type
|
Elective
|
Course Level
|
First Cycle
|
Mode of Delivery
|
- |
Teaching Methods and Techniques of the Course
|
Group Work Problem Solving Lecture / Presentation
|
National Occupation Classification
|
-
|
Course Coordinator
|
|
Course Lecturer(s)
|
|
Assistant(s)
|
- |
Course Objectives
|
This course will introduce cryptography theories, algorithms, and systems. It will also consider necessary approaches and techniques to build protection mechanisms in order to secure computer networks |
Learning Outcomes
|
#
|
Content
|
PC Sub
|
* Contribution Level
|
1
|
2
|
3
|
4
|
5
|
1 | define threats to computer networks and protection mechanisms and methods needed to thwart these threats, | | | | | | | 2 | describe the theory of the fundamental cryptography, encryption, and decryption algorithms, | | | | | | | 3 | build simple cryptosystems by applying encryption algorithms with Python, | | | | | | | 4 | classify secure identity management (authentication), message authentication, and digital signature techniques, | | | | | | | 5 | practice packet generation and observation tools such as Python/scapy and Wireshark. | | | | | | |
|
Course Description
|
To introduce literature and terminology used for cryptography and network security; to acquaint students with the major cryptography algorithms, systems, functions, and development techniques applied to network security mechanisms. |
Related Sustainable Development Goals
|
|
|
Core Courses |
X
|
Major Area Courses |
|
Supportive Courses |
|
Media and Management Skills Courses |
|
Transferable Skill Courses |
|
WEEKLY SUBJECTS AND RELATED PREPARATION STUDIES
Week |
Subjects |
Related Preparation |
Learning Outcome
|
1 |
Fundamental Concepts |
Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch1.1 pp. 1-14 |
2 |
Cryptographic Concepts |
Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch1.2 pp. 19-31 |
3 |
Symmetric Cryptography |
Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch2.1 pp. 53-68 |
4 |
Public-Key Cryptography |
Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch2.2 pp. 72-81 |
5 |
Cryptographic Hash Functions |
Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch2.3-Ch2.4 pp. 83-88 |
6 |
Digital Signatures |
Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch2.4-Ch2.5 pp. 89-97 |
7 |
Operating Systems Security |
Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch3 pp. 111-157 |
8 |
Malicious Software |
Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch4 pp. 167-208 |
9 |
Network Security |
Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch5.1-Ch5.2 pp. 215-227 |
10 |
Network Security |
Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch5.3-Ch5.6 pp. 230-256 |
11 |
Network Services & Security |
Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch6 pp. 261-310 |
12 |
Browser Security |
Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch7 pp. 319-372 |
13 |
Security Models & Practice |
Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch9 pp. 435-474 |
14 |
Project Presentations |
- |
15 |
Semester Review |
|
16 |
Final Examination |
|
Course Notes/Textbooks
|
Introduction to Computer Security - M. T. Goodrich and R. Tamassia, © 2011 | Pearson Prentice Hall | ISBN-13: 978-0-321-70201-2, ISBN-10: 0-321-70201-8 |
Suggested Readings/Materials
|
|
EVALUATION SYSTEM
Semester Activities
|
Number |
Weigthing |
LO 1 | LO 2 | LO 3 | LO 4 | LO 5 |
Participation |
-
|
-
|
Laboratory / Application |
-
|
-
|
Field Work |
-
|
-
|
Quizzes / Studio Critiques |
4
|
10
|
Portfolio |
-
|
-
|
Homework / Assignments |
-
|
-
|
Presentation / Jury |
-
|
-
|
Project |
2
|
30
|
Seminar / Workshop |
-
|
-
|
Oral Exams |
-
|
-
|
Midterm |
1
|
30
|
Final Exam |
1
|
30
|
Total |
8
|
100
|
Weighting of Semester Activities on the Final Grade |
7
|
70
|
Weighting of End-of-Semester Activities on the Final Grade |
1
|
30
|
Total |
8 |
100 |
ECTS / WORKLOAD TABLE
Semester Activities
|
Number |
Duration (Hours) |
Workload |
Theoretical Course Hours (Including exam week: 16 x total hours) |
16
|
3
|
48
|
Laboratory / Application Hours (Including exam week: '.16.' x total hours) |
-
|
-
|
-
|
Study Hours Out of Class |
14
|
3
|
42
|
Field Work |
-
|
-
|
-
|
Quizzes / Studio Critiques |
4
|
2
|
8
|
Portfolio |
-
|
-
|
-
|
Homework / Assignments |
-
|
-
|
-
|
Presentation / Jury |
-
|
-
|
-
|
Project |
2
|
10
|
20
|
Seminar / Workshop |
-
|
-
|
-
|
Oral Exam |
-
|
-
|
-
|
Midterms |
1
|
12
|
12
|
Final Exam |
1
|
20
|
20
|
|
|
Total |
150
|
COURSE LEARNING OUTCOMES AND PROGRAM QUALIFICATIONS RELATIONSHIP
#
|
PC Sub |
Program Competencies/Outcomes
|
* Contribution Level
|
1
|
2
|
3
|
4
|
5
|
1 |
To have adequate knowledge in Mathematics, Science and Industrial Engineering; to be able to use theoretical and applied information in these areas to model and solve Industrial Engineering problems.
|
-
|
-
|
-
|
X
|
-
|
2 |
To be able to identify, formulate and solve complex Industrial Engineering problems by using state-of-the-art methods, techniques and equipment; to be able to select and apply proper analysis and modeling methods for this purpose.
|
-
|
-
|
-
|
X
|
-
|
3 |
To be able to analyze a complex system, process, device or product, and to design with realistic limitations to meet the requirements using modern design techniques.
|
-
|
-
|
-
|
X
|
-
|
4 |
To be able to choose and use the required modern techniques and tools for Industrial Engineering applications; to be able to use information technologies efficiently.
|
-
|
-
|
-
|
X
|
-
|
5 |
To be able to design and do simulation and/or experiment, collect and analyze data and interpret the results for investigating Industrial Engineering problems and Industrial Engineering related research areas.
|
-
|
-
|
-
|
X
|
-
|
6 |
To be able to work efficiently in Industrial Engineering disciplinary and multidisciplinary teams; to be able to work individually.
|
-
|
-
|
X
|
-
|
-
|
7 |
To be able to communicate effectively in Turkish, both orally and in writing; to be able to author and comprehend written reports, to be able to prepare design and implementation reports, to present effectively; to be able to give and receive clear and comprehensible instructions
|
-
|
-
|
-
|
-
|
-
|
8 |
To have knowledge about contemporary issues and the global and societal effects of Industrial Engineering practices on health, environment, and safety; to be aware of the legal consequences of Industrial Engineering solutions.
|
X
|
-
|
-
|
-
|
-
|
9 |
To be aware of professional and ethical responsibility; to have knowledge of the standards used in Industrial Engineering practice.
|
-
|
X
|
-
|
-
|
-
|
10 |
To have knowledge about business life practices such as project management, risk management, and change management; to be aware of entrepreneurship and innovation; to have knowledge about sustainable development.
|
-
|
X
|
-
|
-
|
-
|
11 |
To be able to collect data in the area of Industrial Engineering; to be able to communicate with colleagues in a foreign language.
|
-
|
-
|
-
|
-
|
-
|
12 |
To be able to speak a second foreign at a medium level of fluency efficiently.
|
-
|
-
|
-
|
-
|
-
|
13 |
To recognize the need for lifelong learning; to be able to access information, to be able to stay current with developments in science and technology; to be able to relate the knowledge accumulated throughout the human history to Industrial Engineering.
|
-
|
X
|
-
|
-
|
-
|
*1 Lowest, 2 Low, 3 Average, 4 High, 5 Highest