GAZI UNIVERSITY INFORMATION PACKAGE - 2019 ACADEMIC YEAR

COURSE DESCRIPTION
INFORMATION AND COMPUTER SECURITY/5051329
Course Title: INFORMATION AND COMPUTER SECURITY
Credits 3 ECTS 7.5
Semester 1 Compulsory/Elective Elective
COURSE INFO
 -- LANGUAGE OF INSTRUCTION
  Turkish
 -- NAME OF LECTURER(S)
  Prof. Dr. Seref SAGIROGLU
 -- WEB SITE(S) OF LECTURER(S)
  ceng.gazi.edu.tr/~ss
 -- EMAIL(S) OF LECTURER(S)
  ss@gazi.edu.tr
 -- LEARNING OUTCOMES OF THE COURSE UNIT
Develop theoritical and practical solutions to problems encountered about computer and information security.
Able to protect personel assests
Setting secure electronic platforms, using and checking these platforms
Being aware of upto-date vulnerabilities about computer and information security.





 -- MODE OF DELIVERY
  The mode of delivery of this course is Face to face
 -- PREREQUISITES AND CO-REQUISITES
  There is no prerequisite or co-requisite for this course.
 -- RECOMMENDED OPTIONAL PROGRAMME COMPONENTS
  There is no recommended optional programme component for this course.
 --COURSE CONTENT
1. Week  Concepts for Information, Security and Computer Security
2. Week  Security Engineering
3. Week  Vulnerabilities and information security issues
4. Week  Techniques and technologies to ensure Information Security
5. Week  Computer Security Models and Standards
6. Week  Software security and Secure Coding
7. Week  Cryptology and Cryptoanalysis
8. Week  Midterm exam
9. Week  Symmetric and Asymmetric Algorithms
10. Week  E-signature and Public Key Infrastructure
11. Week  Access Control and Identity Management
12. Week  Information security technologies: Intrusion Detection and Prevention Systems, Firewalls, Filtering, etc.
13. Week  Information security technologies: Intrusion Detection and Prevention Systems, Firewalls, Filtering, etc.
14. Week  Oral Presentations for Research and Application Projects
15. Week  Oral Presentations for Research and Application Projects
16. Week  Final exam
 -- RECOMMENDED OR REQUIRED READING
  (1) "Lecture notes on ınformation and computer security", Ş. Sağıroğlu, 2004. (2) "How to Break Software Security, J. Whittaker, H. Thompson, 0-32-119433-0, Addison Wesley, 1 May, 2003 (3) ".NET Security and Cryptography (The Integrated .Net Series From Object Innovations), Peter Thorsteinson, 013100851x, Prentice Hall Ptr, 2003. (4) "Data Privacy: Encryption and Information Hiding, D Salomon, 0387003118, 480 pages, Springer-Verlag New York Inc., 2003. (5) "Cryptography and Public Key Infrastructure on the Internet, K.S. Schmeh, 047084745X , John Wiley and Sons Ltd, 2003.
 -- PLANNED LEARNING ACTIVITIES AND TEACHING METHODS
  Lecture, Question & Answer, Demonstration, weekly homework, Discussions, Term project presentation
 -- WORK PLACEMENT(S)
  None
 -- ASSESSMENT METHODS AND CRITERIA
 
Quantity
Percentage
 Mid-terms
1
30
 Assignment
6
10
 Exercises
2
10
 Projects
1
40
 Practice
1
10
 Quiz
0
0
 Contribution of In-term Studies to Overall Grade  
40
 Contribution of Final Examination to Overall Grade  
60
 -- WORKLOAD
 Efficiency  Total Week Count  Weekly Duration (in hour)  Total Workload in Semester
 Theoretical Study Hours of Course Per Week
13
3
39
 Practising Hours of Course Per Week
2
3
6
 Reading
14
3
42
 Searching in Internet and Library
16
2
32
 Designing and Applying Materials
5
5
25
 Preparing Reports
7
3
21
 Preparing Presentation
2
5
10
 Presentation
2
5
10
 Mid-Term and Studying for Mid-Term
1
5
5
 Final and Studying for Final
1
10
10
 Other
0
0
0
 TOTAL WORKLOAD: 
200
 TOTAL WORKLOAD / 25: 
8
 ECTS: 
7.5
 -- COURSE'S CONTRIBUTION TO PROGRAM
NO
PROGRAM LEARNING OUTCOMES
1
2
3
4
5
1X
2X
3X
4X
5X
6X
7X
8X
9X
10X
11X
12X