Information
Code | CENG0036 |
Name | Advanced Topics in Cyber Security |
Term | 2022-2023 Academic Year |
Term | Spring |
Duration (T+A) | 3-0 (T-A) (17 Week) |
ECTS | 6 ECTS |
National Credit | 3 National Credit |
Teaching Language | İngilizce |
Level | Doktora Dersi |
Type | Normal |
Mode of study | Yüz Yüze Öğretim |
Catalog Information Coordinator | |
Course Instructor |
1 |
Course Goal / Objective
This course covers advanced topics in cyber security such as computer forensics, malware analysis, secure coding, operating system security and penetration testing of web applications and networks.
Course Content
Cryptography. Malware and software vulnerability analysis. Operating system security. Penetration testing. Machine learning for cyber security. Secure software development. Network security. Web application security. Cloud computing and security. Mobile security. Relational database security. Blockchain security.
Course Precondition
There are no prerequisites.
Resources
1. Wu and Irwin, “Introduction to Computer Networks and Cybersecurity”, 2013
Notes
2. William Stallings, “Network Security Essentials”, 5th Edition, 2014 3. Kaufman, Perlman, and Speciner, “Network Security: Private Communication in a Public World”, 2nd Edition, 2002
Course Learning Outcomes
Order | Course Learning Outcomes |
---|---|
LO01 | Ability to understand the operating system and network security mechanisms |
LO02 | Ability to understand the web and cloud computing security mechanisms |
LO03 | Ability to understand the principles of secure software development and penetration testing |
LO04 | Ability to understand the cryptocurrencies as well as the security and privacy in blockchain environments |
Relation with Program Learning Outcome
Order | Type | Program Learning Outcomes | Level |
---|---|---|---|
PLO01 | Bilgi - Kuramsal, Olgusal | On the basis of the competencies gained at the undergraduate level, it has an advanced level of knowledge and understanding that provides the basis for original studies in the field of Computer Engineering. | 4 |
PLO02 | Bilgi - Kuramsal, Olgusal | By reaching scientific knowledge in the field of engineering, he/she reaches the knowledge in depth and depth, evaluates, interprets and applies the information. | 4 |
PLO03 | Yetkinlikler - Öğrenme Yetkinliği | Being aware of the new and developing practices of his / her profession and examining and learning when necessary. | 2 |
PLO04 | Yetkinlikler - Öğrenme Yetkinliği | Constructs engineering problems, develops methods to solve them and applies innovative methods in solutions. | 5 |
PLO05 | Yetkinlikler - Öğrenme Yetkinliği | Designs and applies analytical, modeling and experimental based researches, analyzes and interprets complex situations encountered in this process. | 3 |
PLO06 | Yetkinlikler - Öğrenme Yetkinliği | Develops new and / or original ideas and methods, develops innovative solutions in system, part or process design. | 3 |
PLO07 | Beceriler - Bilişsel, Uygulamalı | Has the skills of learning. | 4 |
PLO08 | Beceriler - Bilişsel, Uygulamalı | Being aware of new and emerging applications of Computer Engineering examines and learns them if necessary. | 5 |
PLO09 | Beceriler - Bilişsel, Uygulamalı | Transmits the processes and results of their studies in written or oral form in the national and international environments outside or outside the field of Computer Engineering. | 3 |
PLO10 | Beceriler - Bilişsel, Uygulamalı | Has comprehensive knowledge about current techniques and methods and their limitations in Computer Engineering. | 3 |
PLO11 | Beceriler - Bilişsel, Uygulamalı | Uses information and communication technologies at an advanced level interactively with computer software required by Computer Engineering. | 5 |
PLO12 | Bilgi - Kuramsal, Olgusal | Observes social, scientific and ethical values in all professional activities. |
Week Plan
Week | Topic | Preparation | Methods |
---|---|---|---|
1 | Introduction to Cyber Security | Reading related chapter in lecture notes | |
2 | Cryptography and Cryptanalysis | Reading related chapter in lecture notes | |
3 | Malware and Software Vulnerability Analysis | Reading related chapter in lecture notes | |
4 | Operating System Security | Reading related chapter in lecture notes | |
5 | Penetration Testing | Reading related chapter in lecture notes | |
6 | Machine Learning for Cyber Security | Reading related chapter in lecture notes | |
7 | Secure Software Development | Reading related chapter in lecture notes | |
8 | Mid-Term Exam | ||
9 | Network Security | Reading related chapter in lecture notes | |
10 | Web Application Security | Reading related chapter in lecture notes | |
11 | Mobile Security | Reading related chapter in lecture notes | |
12 | Database Security | Reading related chapter in lecture notes | |
13 | Cryptocurrencies and Blockchain Security | Reading related chapter in lecture notes | |
14 | Digital Forensics and Data Analytics | Reading related chapter in lecture notes | |
15 | Current Research Trends in Cyber Security | Reading related chapter in lecture notes | |
16 | Term Exams | ||
17 | Term Exams |
Student Workload - ECTS
Works | Number | Time (Hour) | Workload (Hour) |
---|---|---|---|
Course Related Works | |||
Class Time (Exam weeks are excluded) | 14 | 3 | 42 |
Out of Class Study (Preliminary Work, Practice) | 14 | 5 | 70 |
Assesment Related Works | |||
Homeworks, Projects, Others | 0 | 0 | 0 |
Mid-term Exams (Written, Oral, etc.) | 1 | 15 | 15 |
Final Exam | 1 | 30 | 30 |
Total Workload (Hour) | 157 | ||
Total Workload / 25 (h) | 6,28 | ||
ECTS | 6 ECTS |