|
|||||
| Year/Semester of Study | 3 / Spring Semester | ||||
| Level of Course | 1st Cycle Degree Programme | ||||
| Type of Course | Optional | ||||
| Department | DEPARTMENT OF COMPUTER ENGINEERING | ||||
| Pre-requisities and Co-requisites | None | ||||
| Mode of Delivery | Face to Face | ||||
| Teaching Period | 14 Weeks | ||||
| Name of Lecturer | NUH AZGINOĞLU (nuh@nevsehir.edu.tr) | ||||
| Name of Lecturer(s) | SEMA ATASEVER, | ||||
| Language of Instruction | Turkish | ||||
| Work Placement(s) | None | ||||
| Objectives of the Course | |||||
| This course aims at making the students to achieve basic security skills and how to use them in the design and implementation of computer systems and networks. | |||||
| Learning Outcomes | PO | MME | |
| The students who succeeded in this course: | |||
| LO-1 | Will be able to achieve basic security skills. |
PO-7 Students gain the ability to identify, define, formulate and solve problems specific to Computer Engineering. PO-9 Students will have knowledge and skills about basic computer hardware, software and system security. |
Examination |
| LO-2 | Will be able to have knowledge about basic security skills. |
PO-4 Students gain the ability to apply knowledge of mathematics, science and engineering. PO-5 Students gain the ability to define, model, formulate and solve general engineering problems. PO-9 Students will have knowledge and skills about basic computer hardware, software and system security. PO-15 Students will be able to design a system or process to meet the desired needs. PO-21 Students acquire basic knowledge and skills in subjects such as project management, risk management, entrepreneurship, managerial skills and sustainability. |
Examination |
| LO-3 | Will be able to know how to use security skills in the design and implementation of computer systems and networks |
PO-4 Students gain the ability to apply knowledge of mathematics, science and engineering. PO-5 Students gain the ability to define, model, formulate and solve general engineering problems. PO-9 Students will have knowledge and skills about basic computer hardware, software and system security. PO-15 Students will be able to design a system or process to meet the desired needs. |
Examination |
| PO: Programme Outcomes MME:Method of measurement & Evaluation |
|||
| Course Contents | ||
| This course focuses on the security issues in computer systems and computer networks | ||
| Weekly Course Content | ||
| Week | Subject | Learning Activities and Teaching Methods |
| 1 | Introduction to data and network security | Explaining, Question-Answer, Problem Solving, Practice |
| 2 | Network security | Explaining, Question-Answer, Problem Solving, Practice |
| 3 | Level of network security | Explaining, Question-Answer, Problem Solving, Practice |
| 4 | Communication in computer systems | Explaining, Question-Answer, Problem Solving, Practice |
| 5 | Topology security | Explaining, Question-Answer, Problem Solving, Practice |
| 6 | Firewall | Explaining, Question-Answer, Problem Solving, Practice |
| 7 | Intrusion detection systems | Explaining, Question-Answer, Problem Solving, Practice |
| 8 | mid-term exam | |
| 9 | Biometric security systems | Explaining, Question-Answer, Problem Solving, Practice |
| 10 | Authentication and encryption | Explaining, Question-Answer, Problem Solving, Practice |
| 11 | Security via encryption | Explaining, Question-Answer, Problem Solving, Practice |
| 12 | Virtual private networking | Explaining, Question-Answer, Problem Solving, Practice |
| 13 | Disaster prevention and recovering | Explaining, Question-Answer, Problem Solving, Practice |
| 14 | Network usage policies | Explaining, Question-Answer, Problem Solving, Practice |
| 15 | Network usage policies-continue | Explaining, Question-Answer, Problem Solving, Practice |
| 16 | final exam | |
| Recommend Course Book / Supplementary Book/Reading | ||
| 1 | Pieprzyk, J., Okamoto, E., & Seberry, J. (Eds.). (2003). Information Security: Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings. Springer. | |
| Required Course instruments and materials | ||
| Pieprzyk, J., Okamoto, E., & Seberry, J. (Eds.). (2003). Information Security: Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings. Springer. | ||
| Assessment Methods | |||
| Type of Assessment | Week | Hours | Weight(%) |
| mid-term exam | 8 | 1 | 40 |
| Other assessment methods | |||
| 1.Oral Examination | |||
| 2.Quiz | |||
| 3.Laboratory exam | |||
| 4.Presentation | |||
| 5.Report | |||
| 6.Workshop | |||
| 7.Performance Project | |||
| 8.Term Paper | |||
| 9.Project | |||
| final exam | 16 | 1 | 60 |
| Student Work Load | |||
| Type of Work | Weekly Hours | Number of Weeks | Work Load |
| Weekly Course Hours (Theoretical+Practice) | 2 | 14 | 28 |
| Outside Class | |||
| a) Reading | 9 | 4 | 36 |
| b) Search in internet/Library | 0 | ||
| c) Performance Project | 0 | ||
| d) Prepare a workshop/Presentation/Report | 0 | ||
| e) Term paper/Project | 0 | ||
| Oral Examination | 0 | ||
| Quiz | 0 | ||
| Laboratory exam | 0 | ||
| Own study for mid-term exam | 12 | 1 | 12 |
| mid-term exam | 1 | 1 | 1 |
| Own study for final exam | 12 | 1 | 12 |
| final exam | 1 | 1 | 1 |
| 0 | |||
| 0 | |||
| Total work load; | 90 | ||