Information Systems (non-thesis) | |||||
Master | TR-NQF-HE: Level 7 | QF-EHEA: Second Cycle | EQF-LLL: Level 7 |
Course Code: | BIS509 | ||||||||
Course Name: | Network Security | ||||||||
Course Semester: | Spring | ||||||||
Course Credits: |
|
||||||||
Language of instruction: | |||||||||
Course Requisites: | |||||||||
Does the Course Require Work Experience?: | No | ||||||||
Type of course: | Department Elective | ||||||||
Course Level: |
|
||||||||
Mode of Delivery: | Face to face | ||||||||
Course Coordinator : | Öğr.Gör. AZİZ BEKTAŞ | ||||||||
Course Lecturer(s): | |||||||||
Course Assistants: |
Course Objectives: | With this course, students will gain skills about vulnerability of 2nd layer protocols, end user weaknesses, password weaknesses, gathering information from local network, collecting target server information, strengthening of switch - router spoof attacks. |
Course Content: | Introduction to network security; security requirements and assets to be protected; security level; how to communicate with network systems; topology security; cryptography and symmetric encryption / decryption; public-key crypto systems; the firewall; biometric security systems; virtual private networks; hacking; disaster prevention and recovery; network usage policies. |
The students who have succeeded in this course;
|
Week | Subject | Related Preparation |
1) | Passive information collection, Active information collection | Projection, Computer |
2) | CDP, DTP weakness and interface commands for strengthening | Projection, Computer, Resource Books |
3) | NMAP exploration tools and weakness search techniques | Projection, Computer, Resource Books |
4) | Password cracking attacks and strong password detection policies | Projection, Computer, Resource Books |
5) | DNS spoofing attacks and interface commands for strengthening | Projection, Computer, Resource Books |
6) | Arp spoofing attacks and port-security for retrofit | Projection, Computer, Resource Books |
7) | DHCP starvation attacks and Dhcp snooping for strengthening | Projection, Computer, Resource Books |
8) | Mid Term | |
9) | 802.1x protocol | Projection, Computer, Resource Books |
10) | Login-Block configurations | Projection, Computer, Resource Books |
11) | Access-List firewall rules define | Projection, Computer, Resource Books |
12) | AAA security principles | Projection, Computer, Resource Books |
13) | Wireless network attacks and retrofit techniques for wireless network vulnerabilities | Projection, Computer, Resource Books |
14) | Radius, Tacacs + server installation | Projection, Computer, Resource Books |
Course Notes / Textbooks: | Computer System and Network Security, Gregory B. White, Eric A. Fisch, Udo W. Pooch, Washington, 1996 |
References: | Introduction to Computer Networks and Cybersecurity, Chwan-Hwa (John) Wu, J. David Irwin, 2013 Cisco NetAcademy Modules |
Learning Outcomes | 1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||
1) Having knowledge and skills in software development for different environments, systems management, network security, data and database management systems. | ||||||||
2) Keeping up-to-date with current issues about new information systems that are the result of rapid change of information technologies. | ||||||||
3) Be aware of the importance of Information Systems' strategic position in the firm and its role in the creation of new business strategies. | ||||||||
4) To be able to take responsibilities in the information projects as project manager or participant in accordance with the project objectives. | ||||||||
5) Ability to carry out an independent study on the subjects requiring expertise in the field of Information Systems. |
No Effect | 1 Lowest | 2 Low | 3 Average | 4 High | 5 Highest |
Program Outcomes | Level of Contribution | |
1) | Having knowledge and skills in software development for different environments, systems management, network security, data and database management systems. | 4 |
2) | Keeping up-to-date with current issues about new information systems that are the result of rapid change of information technologies. | 4 |
3) | Be aware of the importance of Information Systems' strategic position in the firm and its role in the creation of new business strategies. | 5 |
4) | To be able to take responsibilities in the information projects as project manager or participant in accordance with the project objectives. | 3 |
5) | Ability to carry out an independent study on the subjects requiring expertise in the field of Information Systems. | 3 |
Application |
Semester Requirements | Number of Activities | Level of Contribution |
Attendance | 42 | % 10 |
Midterms | 1 | % 40 |
Final | 1 | % 50 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 50 | |
PERCENTAGE OF FINAL WORK | % 50 | |
total | % 100 |
Activities | Number of Activities | Duration (Hours) | Workload |
Course Hours | 14 | 42 | 588 |
Midterms | 1 | 1 | 1 |
Final | 1 | 1 | 1 |
Total Workload | 590 |