INTERNATIONAL BURCH UNIVERSITY
Graduate Study - Faculty of Engineering and Natural Sciences
3+2 Information Technology Master
||Computer and Network Securuty
||Number of ECTS Credits
||Class Hours Per Week
||Total Hours Per Semester
|Abdülhamit Subaşı, Prof. Dr.
||Abdülhamit Subaşı, Prof. Dr.
|Introduce computer and network security concepts.
Introduce confidentiality, integrity and availability
Develop some general design decisions that should be made when constructing secure systems
Develop basic application of information security concepts.
- Introduction to Computer and Network Security , Cryptographic Tools
- User Authentication , Access Control
- Database Security
- Intrusion Detection
- Malicious Software , Denial of Service
- Firewalls and Intrusion Prevention
- Trusted Computing and Multilevel Security
- Buffer Overflow , Other Software Security Issues
- Security Auditing, IT Security Management and Risk Assessment
- Physical and Infrastructure Security ,Human Factors
- IT Security Controls, Plans and Procedures , Legal and Ethical Aspects
- Symmetric Encryption and Message Confidentiality ,Public-Key Cryptography and Message Authentication
- Internet Security Protocols and Standards, Internet Authentication Applications
- Unix/Linux Security , Windows and Windows Vista Security
- Demonstrate a systematic and critical understanding of the theories, principles and practices of computing;
- Critically review the role of a “professional computing practitioner” with particular regard to an understanding of legal and ethical issues;
- Creatively apply contemporary theories, processes and tools in the development and evaluation of solutions to problems and product design;
- Work with minimum supervision, both individually and as a part of a team, demonstrating the interpersonal, organisation and problem-solving skills supported by related attitudes necessary to undertake employment
- Actively participate in, reflect upon, and take responsibility for, personal learning and development, within a framework of lifelong learning and continued professional development; Present issues and solutions in appropriate form to communicate effectively with peers and clients from specialist and non-specialist backgrounds
- . William Stallings and Lawrie Brown, Computer Security, Principles and Practice, Prentice Hall, 2008.
|ECTS (Allocated based on student) WORKLOAD
|Lecture (14 weeks x Lecture hours per week)|| ||0|
|Laboratory / Practice (14 weeks x Laboratory/Practice hours per week)|| || ||0|
|Midterm Examination (1 week)|| || ||0|
|Final Examination(1 week)|| || ||0|
|Preparation for Midterm Examination|| || ||0|
|Preparation for Final Examination||7.5||0|