Information
Unit | INSTITUTE OF NATURAL AND APPLIED SCIENCES |
COMPUTER ENGINEERING (MASTER) (WITHOUT THESIS) | |
Code | CENGT002 |
Name | Cyber Security |
Term | 2022-2023 Academic Year |
Term | Spring |
Duration (T+A) | 3-0 (T-A) (17 Week) |
ECTS | 6 ECTS |
National Credit | 3 National Credit |
Teaching Language | Türkçe |
Level | Yüksek Lisans Dersi |
Type | Normal |
Mode of study | Yüz Yüze Öğretim |
Catalog Information Coordinator | |
Course Instructor |
The current term course schedule has not been prepared yet.
|
Course Goal / Objective
This course introduces the fundamental principles of computer, web, and network security by studying attacks on computer systems and network. Students will learn how those attacks work and how to prevent them using a variety of security protocols, tools and architectures.
Course Content
Introduction to cryptography. Classification of threats, attackers and victims. Wireless security: WEP, WPA and WPA-2. Jamming attack detection and mitigation in wireless networks. Virtual private networks and tunneling. IPSec. SSL/TLS. SSH. Chip cards and RFID security. AAA protocols: Kerberos, Radius, TACACS. Secure E-Payment and iKP protocol family. Firewalls and intrusion detection systems. Model checking methods for security protocols.
Course Precondition
Resources
Notes
Course Learning Outcomes
Order | Course Learning Outcomes |
---|---|
LO01 | Ability to define cybersecurity and outline its major components. |
LO02 | Ability to encrypt and decrypt messages using block ciphers, sign and verify messages using well known signature generation and verification algorithms. |
LO03 | Ability to classify network security threats, attackers, and victims. |
LO04 | Ability to explain how various attacks work and how they are prevented. |
LO05 | Knowledge on how security protocols, policies and practices are developed. |
LO06 | Knowledge on the basics of firewalls, packet filtering and intrusion detection systems. |
LO07 | Knowledge on the basics of authentication protocols and processes. |
LO08 | Knowledge on the basics of blockchain protocols and processes. |
Relation with Program Learning Outcome
Order | Type | Program Learning Outcomes | Level |
---|---|---|---|
PLO01 | Belirsiz |
Week Plan
Week | Topic | Preparation | Methods |
---|---|---|---|
1 | Introduction to Cryptography | Reading the lecture notes | Öğretim Yöntemleri: Anlatım |
2 | Overview of Attacks: Goals and Motives | Reading the lecture notes | Öğretim Yöntemleri: Anlatım |
3 | Wireless Security Protocols: WEP, WPA and WPA-2 | Reading the lecture notes | Öğretim Yöntemleri: Anlatım |
4 | Detecting and Mitigating Jamming Attacks in Wireless Networks: Link 16 as a Case Study | Reading the lecture notes | Öğretim Yöntemleri: Anlatım |
5 | Virtual Private Network (VPN) and Tunneling | Reading the lecture notes | Öğretim Yöntemleri: Anlatım |
6 | IPSec: Internet Protocol Security | Reading the lecture notes | Öğretim Yöntemleri: Anlatım |
7 | SSL/TLS: Transport Layer Security | Reading the lecture notes | Öğretim Yöntemleri: Anlatım |
8 | Mid-Term Exam | ||
9 | Secure Shell (SSH): Secure Remote Login and File Transfer | Reading the lecture notes | Öğretim Yöntemleri: Anlatım |
10 | Public Key Infrastructure (PKI) and Digital Certificates | Reading the lecture notes | Öğretim Yöntemleri: Anlatım |
11 | Chip Cards and RFID Security | Reading the lecture notes | Öğretim Yöntemleri: Anlatım |
12 | AAA (Authentication, Authorization and Accounting): Kerberos, Radius, TACACS | Reading the lecture notes | Öğretim Yöntemleri: Anlatım |
13 | iKP: A Family of Secure Electronic Payment Protocols | Reading the lecture notes | Öğretim Yöntemleri: Anlatım |
14 | Firewalls and Intrusion Detection Systems | Reading the lecture notes | Öğretim Yöntemleri: Anlatım |
15 | Model Checking Methods for Security Protocols and Blockchain Protocols | Reading the lecture notes | Öğretim Yöntemleri: Anlatım |
16 | Term Exams | ||
17 | Term Exams |