BIS509 Network SecurityIstanbul Okan UniversityDegree Programs Information SystemGeneral Information For StudentsDiploma SupplementErasmus Policy StatementNational Qualifications
Information System
Master TR-NQF-HE: Level 7 QF-EHEA: Second Cycle EQF-LLL: Level 7

General course introduction information

Course Code: BIS509
Course Name: Network Security
Course Semester: Spring
Course Credits:
Theoretical Practical Credit ECTS
3 0 3 10
Language of instruction:
Course Requisites:
Does the Course Require Work Experience?: No
Type of course: Department Elective
Course Level:
Master TR-NQF-HE:7. Master`s Degree QF-EHEA:Second Cycle EQF-LLL:7. Master`s Degree
Mode of Delivery: Face to face
Course Coordinator : Öğr.Gör. AZİZ BEKTAŞ
Course Lecturer(s):
Course Assistants:

Course Objective and Content

Course Objectives: With this course, students will gain skills about vulnerability of 2nd layer protocols, end user weaknesses, password weaknesses, gathering information from local network, collecting target server information, strengthening of switch - router spoof attacks.
Course Content: Introduction to network security; security requirements and assets to be protected; security level; how to communicate with network systems; topology security; cryptography and symmetric encryption / decryption; public-key crypto systems; the firewall; biometric security systems; virtual private networks; hacking; disaster prevention and recovery; network usage policies.

Learning Outcomes

The students who have succeeded in this course;
Learning Outcomes
1 - Knowledge
Theoretical - Conceptual
2 - Skills
Cognitive - Practical
1) Configuring Static and Default routing
2) Configuring Port-Security
3) Configuring router vulnerabilities
4) Configure IPsec.
5) Configure Authentication for AAA
6) Configure Dot1x
7) Configure Account for AAA
8) Configure HSRP for redundancy of access
3 - Competences
Communication and Social Competence
Learning Competence
Field Specific Competence
Competence to Work Independently and Take Responsibility

Lesson Plan

Week Subject Related Preparation
1) Passive information collection, Active information collection Projection, Computer
2) CDP, DTP weakness and interface commands for strengthening Projection, Computer, Resource Books
3) NMAP exploration tools and weakness search techniques Projection, Computer, Resource Books
4) Password cracking attacks and strong password detection policies Projection, Computer, Resource Books
5) DNS spoofing attacks and interface commands for strengthening Projection, Computer, Resource Books
6) Arp spoofing attacks and port-security for retrofit Projection, Computer, Resource Books
7) DHCP starvation attacks and Dhcp snooping for strengthening Projection, Computer, Resource Books
8) Mid Term
9) 802.1x protocol Projection, Computer, Resource Books
10) Login-Block configurations Projection, Computer, Resource Books
11) Access-List firewall rules define Projection, Computer, Resource Books
12) AAA security principles Projection, Computer, Resource Books
13) Wireless network attacks and retrofit techniques for wireless network vulnerabilities Projection, Computer, Resource Books
14) Radius, Tacacs + server installation Projection, Computer, Resource Books

Sources

Course Notes / Textbooks: Computer System and Network Security, Gregory B. White, Eric A. Fisch, Udo W.
Pooch, Washington, 1996
References: Introduction to Computer Networks and Cybersecurity, Chwan-Hwa (John) Wu, J.
David Irwin, 2013
Cisco NetAcademy Modules

Course-Program Learning Outcome Relationship

Learning Outcomes

1

2

3

4

5

6

7

8

Program Outcomes
1) Having knowledge and skills in software development for different environments, systems management, network security, data and database management systems.
2) Keeping up-to-date with current issues about new information systems that are the result of rapid change of information technologies.
3) Be aware of the importance of Information Systems' strategic position in the firm and its role in the creation of new business strategies.
4) To be able to take responsibilities in the information projects as project manager or participant in accordance with the project objectives.
5) Ability to carry out an independent study on the subjects requiring expertise in the field of Information Systems.

Course - Learning Outcome Relationship

No Effect 1 Lowest 2 Low 3 Average 4 High 5 Highest
           
Program Outcomes Level of Contribution
1) Having knowledge and skills in software development for different environments, systems management, network security, data and database management systems. 4
2) Keeping up-to-date with current issues about new information systems that are the result of rapid change of information technologies. 4
3) Be aware of the importance of Information Systems' strategic position in the firm and its role in the creation of new business strategies. 5
4) To be able to take responsibilities in the information projects as project manager or participant in accordance with the project objectives. 3
5) Ability to carry out an independent study on the subjects requiring expertise in the field of Information Systems. 3

Learning Activity and Teaching Methods

Assessment & Grading Methods and Criteria

Application

Assessment & Grading

Semester Requirements Number of Activities Level of Contribution
Attendance 42 % 10
Midterms 1 % 40
Final 1 % 50
total % 100
PERCENTAGE OF SEMESTER WORK % 50
PERCENTAGE OF FINAL WORK % 50
total % 100

Workload and ECTS Credit Grading

Activities Number of Activities Duration (Hours) Workload
Course Hours 14 42 588
Midterms 1 1 1
Final 1 1 1
Total Workload 590