|
|||||
Year/Semester of Study | 3 / Spring Semester | ||||
Level of Course | 1st Cycle Degree Programme | ||||
Type of Course | Optional | ||||
Department | DEPARTMENT OF COMPUTER ENGINEERING | ||||
Pre-requisities and Co-requisites | None | ||||
Mode of Delivery | Face to Face | ||||
Teaching Period | 14 Weeks | ||||
Name of Lecturer | NUH AZGINOĞLU (nuh@nevsehir.edu.tr) | ||||
Name of Lecturer(s) | SEMA ATASEVER, | ||||
Language of Instruction | Turkish | ||||
Work Placement(s) | None | ||||
Objectives of the Course | |||||
This course aims at making the students to achieve basic security skills and how to use them in the design and implementation of computer systems and networks. |
Learning Outcomes | PO | MME | |
The students who succeeded in this course: | |||
LO-1 | Will be able to achieve basic security skills. |
PO-7 Students gain the ability to identify, define, formulate and solve problems specific to Computer Engineering. PO-9 Students will have knowledge and skills about basic computer hardware, software and system security. |
Examination |
LO-2 | Will be able to have knowledge about basic security skills. |
PO-4 Students gain the ability to apply knowledge of mathematics, science and engineering. PO-5 Students gain the ability to define, model, formulate and solve general engineering problems. PO-9 Students will have knowledge and skills about basic computer hardware, software and system security. PO-15 Students will be able to design a system or process to meet the desired needs. PO-21 Students acquire basic knowledge and skills in subjects such as project management, risk management, entrepreneurship, managerial skills and sustainability. |
Examination |
LO-3 | Will be able to know how to use security skills in the design and implementation of computer systems and networks |
PO-4 Students gain the ability to apply knowledge of mathematics, science and engineering. PO-5 Students gain the ability to define, model, formulate and solve general engineering problems. PO-9 Students will have knowledge and skills about basic computer hardware, software and system security. PO-15 Students will be able to design a system or process to meet the desired needs. |
Examination |
PO: Programme Outcomes MME:Method of measurement & Evaluation |
Course Contents | ||
This course focuses on the security issues in computer systems and computer networks | ||
Weekly Course Content | ||
Week | Subject | Learning Activities and Teaching Methods |
1 | Introduction to data and network security | Explaining, Question-Answer, Problem Solving, Practice |
2 | Network security | Explaining, Question-Answer, Problem Solving, Practice |
3 | Level of network security | Explaining, Question-Answer, Problem Solving, Practice |
4 | Communication in computer systems | Explaining, Question-Answer, Problem Solving, Practice |
5 | Topology security | Explaining, Question-Answer, Problem Solving, Practice |
6 | Firewall | Explaining, Question-Answer, Problem Solving, Practice |
7 | Intrusion detection systems | Explaining, Question-Answer, Problem Solving, Practice |
8 | mid-term exam | |
9 | Biometric security systems | Explaining, Question-Answer, Problem Solving, Practice |
10 | Authentication and encryption | Explaining, Question-Answer, Problem Solving, Practice |
11 | Security via encryption | Explaining, Question-Answer, Problem Solving, Practice |
12 | Virtual private networking | Explaining, Question-Answer, Problem Solving, Practice |
13 | Disaster prevention and recovering | Explaining, Question-Answer, Problem Solving, Practice |
14 | Network usage policies | Explaining, Question-Answer, Problem Solving, Practice |
15 | Network usage policies-continue | Explaining, Question-Answer, Problem Solving, Practice |
16 | final exam | |
Recommend Course Book / Supplementary Book/Reading | ||
1 | Pieprzyk, J., Okamoto, E., & Seberry, J. (Eds.). (2003). Information Security: Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings. Springer. | |
Required Course instruments and materials | ||
Pieprzyk, J., Okamoto, E., & Seberry, J. (Eds.). (2003). Information Security: Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings. Springer. |
Assessment Methods | |||
Type of Assessment | Week | Hours | Weight(%) |
mid-term exam | 8 | 1 | 40 |
Other assessment methods | |||
1.Oral Examination | |||
2.Quiz | |||
3.Laboratory exam | |||
4.Presentation | |||
5.Report | |||
6.Workshop | |||
7.Performance Project | |||
8.Term Paper | |||
9.Project | |||
final exam | 16 | 1 | 60 |
Student Work Load | |||
Type of Work | Weekly Hours | Number of Weeks | Work Load |
Weekly Course Hours (Theoretical+Practice) | 2 | 14 | 28 |
Outside Class | |||
a) Reading | 9 | 4 | 36 |
b) Search in internet/Library | 0 | ||
c) Performance Project | 0 | ||
d) Prepare a workshop/Presentation/Report | 0 | ||
e) Term paper/Project | 0 | ||
Oral Examination | 0 | ||
Quiz | 0 | ||
Laboratory exam | 0 | ||
Own study for mid-term exam | 12 | 1 | 12 |
mid-term exam | 1 | 1 | 1 |
Own study for final exam | 12 | 1 | 12 |
final exam | 1 | 1 | 1 |
0 | |||
0 | |||
Total work load; | 90 |