INTERNATIONAL BURCH UNIVERSITY
Graduate Study - Faculty of Engineering and Natural Sciences
3+2 Information Technology Master
2012-2013

SYLLABUS
Code Name Level Year Semester
CEN 582 Computer and Network Securuty Graduate 1 Spring
Status Number of ECTS Credits Class Hours Per Week Total Hours Per Semester Language
Area Elective 7.5 3 0 English

Instructor Assistant Coordinator
Abdülhamit Subaşı, Prof. Dr. Abdülhamit Subaşı, Prof. Dr.
[email protected] no email

COURSE OBJECTIVE
Introduce computer and network security concepts.
Introduce confidentiality, integrity and availability
Develop some general design decisions that should be made when constructing secure systems
Develop basic application of information security concepts.

COURSE CONTENT
Week
Topic
  1. Introduction to Computer and Network Security , Cryptographic Tools
  2. User Authentication , Access Control
  3. Database Security
  4. Intrusion Detection
  5. Malicious Software , Denial of Service
  6. Firewalls and Intrusion Prevention
  7. Trusted Computing and Multilevel Security
  8. Buffer Overflow , Other Software Security Issues
  9. Security Auditing, IT Security Management and Risk Assessment
  10. Physical and Infrastructure Security ,Human Factors
  11. IT Security Controls, Plans and Procedures , Legal and Ethical Aspects
  12. Symmetric Encryption and Message Confidentiality ,Public-Key Cryptography and Message Authentication
  13. Internet Security Protocols and Standards, Internet Authentication Applications
  14. Unix/Linux Security , Windows and Windows Vista Security

LABORATORY/PRACTICE PLAN
Week
Topic

    TEACHING/ASSESSMENT
    Description
      Description (%)
      Method Quantity Percentage (%)
      Total: 0
      Learning outcomes
      • Demonstrate a systematic and critical understanding of the theories, principles and practices of computing;
      • Critically review the role of a “professional computing practitioner” with particular regard to an understanding of legal and ethical issues;
      • Creatively apply contemporary theories, processes and tools in the development and evaluation of solutions to problems and product design;
      • Work with minimum supervision, both individually and as a part of a team, demonstrating the interpersonal, organisation and problem-solving skills supported by related attitudes necessary to undertake employment
      • Actively participate in, reflect upon, and take responsibility for, personal learning and development, within a framework of lifelong learning and continued professional development; Present issues and solutions in appropriate form to communicate effectively with peers and clients from specialist and non-specialist backgrounds
      TEXTBOOK(S)
      • . William Stallings and Lawrie Brown, Computer Security, Principles and Practice, Prentice Hall, 2008.

      ECTS (Allocated based on student) WORKLOAD
      Activities Quantity Duration (Hour) Total Work Load
      Lecture (14 weeks x Lecture hours per week) 0
      Laboratory / Practice (14 weeks x Laboratory/Practice hours per week) 0
      Midterm Examination (1 week) 0
      Final Examination(1 week) 0
      Preparation for Midterm Examination 0
      Preparation for Final Examination7.50
      Total Workload: 0
      ECTS Credit (Total workload/25): 0