Information Systems (Master) (With Thesis) (English) | |||||
Master | TR-NQF-HE: Level 7 | QF-EHEA: Second Cycle | EQF-LLL: Level 7 |
Course Code: | EBIS509 | ||||||||
Course Name: | Network Security | ||||||||
Course Semester: | Fall | ||||||||
Course Credits: |
|
||||||||
Language of instruction: | EN | ||||||||
Course Requisites: | |||||||||
Does the Course Require Work Experience?: | No | ||||||||
Type of course: | Department Elective | ||||||||
Course Level: |
|
||||||||
Mode of Delivery: | Face to face | ||||||||
Course Coordinator : | Öğr.Gör. AZİZ BEKTAŞ | ||||||||
Course Lecturer(s): | |||||||||
Course Assistants: |
Course Objectives: | With this course, students will gain skills about vulnerability of 2nd layer protocols, end user weaknesses, password weaknesses, gathering information from local network, collecting target server information, strengthening of switch - router spoof attacks. |
Course Content: | Introduction to network security; security requirements and assets to be protected; security level; how to communicate with network systems; topology security; cryptography and symmetric encryption / decryption; public-key crypto systems; the firewall; biometric security systems; virtual private networks; hacking; disaster prevention and recovery; network usage policies. |
The students who have succeeded in this course;
|
Week | Subject | Related Preparation |
1) | Passive information collection, Active information collection | Projection, Computer |
2) | CDP, DTP weakness and interface commands for strengthening | Projection, Computer, Resource Books |
3) | NMAP exploration tools and weakness search techniques | Projection, Computer, Resource Books |
4) | Password cracking attacks and strong password detection policies | Projection, Computer, Resource Books |
5) | DNS spoofing attacks and interface commands for strengthening | Projection, Computer, Resource Books |
6) | Arp spoofing attacks and port-security for retrofit | Projection, Computer, Resource Books |
7) | DHCP starvation attacks and Dhcp snooping for strengthening | Projection, Computer, Resource Books |
8) | Mid Term | |
9) | 802.1x protocol | Projection, Computer, Resource Books |
10) | Login-Block configurations | Projection, Computer, Resource Books |
11) | Access-List firewall rules define | Projection, Computer, Resource Books |
12) | AAA security principles | Projection, Computer, Resource Books |
13) | Wireless network attacks and retrofit techniques for wireless network vulnerabilities | Projection, Computer, Resource Books |
14) | Radius, Tacacs + server installation | Projection, Computer, Resource Books |
Course Notes / Textbooks: | Computer System and Network Security, Gregory B. White, Eric A. Fisch, Udo W. Pooch, Washington, 1996 |
References: | Introduction to Computer Networks and Cybersecurity, Chwan-Hwa (John) Wu, J. David Irwin, 2013 Cisco NetAcademy Modules |
Learning Outcomes | 1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
---|---|---|---|---|---|---|---|---|
Program Outcomes |
No Effect | 1 Lowest | 2 Low | 3 Average | 4 High | 5 Highest |
Program Outcomes | Level of Contribution |
Application |
Semester Requirements | Number of Activities | Level of Contribution |
Attendance | 42 | % 10 |
Midterms | 1 | % 40 |
Final | 1 | % 50 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 50 | |
PERCENTAGE OF FINAL WORK | % 50 | |
total | % 100 |
Activities | Number of Activities | Duration (Hours) | Workload |
Course Hours | 14 | 42 | 588 |
Midterms | 1 | 1 | 1 |
Final | 1 | 1 | 1 |
Total Workload | 590 |