FACULTY OF ENGINEERING

Department of Software Engineering

CE 340 | Course Introduction and Application Information

Course Name
Cryptography and Network Security
Code
Semester
Theory
(hour/week)
Application/Lab
(hour/week)
Local Credits
ECTS
CE 340
Fall/Spring
3
0
3
5

Prerequisites
None
Course Language
English
Course Type
Elective
Course Level
First Cycle
Mode of Delivery -
Teaching Methods and Techniques of the Course Group Work
Problem Solving
Lecture / Presentation
Course Coordinator
Course Lecturer(s)
Assistant(s) -
Course Objectives This course will introduce cryptography theories, algorithms, and systems. It will also consider necessary approaches and techniques to build protection mechanisms in order to secure computer networks
Learning Outcomes The students who succeeded in this course;
  • define threats to computer networks and protection mechanisms and methods needed to thwart these threats,
  • describe the theory of the fundamental cryptography, encryption, and decryption algorithms,
  • build simple cryptosystems by applying encryption algorithms with Python,
  • classify secure identity management (authentication), message authentication, and digital signature techniques,
  • practice packet generation and observation tools such as Python/scapy and Wireshark.
Course Description To introduce literature and terminology used for cryptography and network security; to acquaint students with the major cryptography algorithms, systems, functions, and development techniques applied to network security mechanisms.

 



Course Category

Core Courses
X
Major Area Courses
Supportive Courses
Media and Management Skills Courses
Transferable Skill Courses

 

WEEKLY SUBJECTS AND RELATED PREPARATION STUDIES

Week Subjects Related Preparation
1 Fundamental Concepts Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch1.1 pp. 1-14
2 Cryptographic Concepts Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch1.2 pp. 19-31
3 Symmetric Cryptography Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch2.1 pp. 53-68
4 Public-Key Cryptography Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch2.2 pp. 72-81
5 Cryptographic Hash Functions Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch2.3-Ch2.4 pp. 83-88
6 Digital Signatures Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch2.4-Ch2.5 pp. 89-97
7 Operating Systems Security Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch3 pp. 111-157
8 Malicious Software Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch4 pp. 167-208
9 Network Security Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch5.1-Ch5.2 pp. 215-227
10 Network Security Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch5.3-Ch5.6 pp. 230-256
11 Network Services & Security Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch6 pp. 261-310
12 Browser Security Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch7 pp. 319-372
13 Security Models & Practice Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch9 pp. 435-474
14 Project Presentations -
15 Semester Review
16 Final Examination

 

Course Notes/Textbooks Introduction to Computer Security - M. T. Goodrich and R. Tamassia, © 2011 | Pearson Prentice Hall | ISBN-13: 978-0-321-70201-2, ISBN-10: 0-321-70201-8
Suggested Readings/Materials

 

EVALUATION SYSTEM

Semester Activities Number Weigthing
Participation
Laboratory / Application
Field Work
Quizzes / Studio Critiques
4
10
Portfolio
Homework / Assignments
Presentation / Jury
Project
2
30
Seminar / Workshop
Oral Exams
Midterm
1
30
Final Exam
1
30
Total

Weighting of Semester Activities on the Final Grade
7
70
Weighting of End-of-Semester Activities on the Final Grade
1
30
Total

ECTS / WORKLOAD TABLE

Semester Activities Number Duration (Hours) Workload
Theoretical Course Hours
(Including exam week: 16 x total hours)
16
3
48
Laboratory / Application Hours
(Including exam week: '.16.' x total hours)
16
0
Study Hours Out of Class
14
3
42
Field Work
0
Quizzes / Studio Critiques
4
2
8
Portfolio
0
Homework / Assignments
0
Presentation / Jury
0
Project
2
10
20
Seminar / Workshop
0
Oral Exam
0
Midterms
1
12
12
Final Exam
1
20
20
    Total
150

 

COURSE LEARNING OUTCOMES AND PROGRAM QUALIFICATIONS RELATIONSHIP

#
Program Competencies/Outcomes
* Contribution Level
1
2
3
4
5
1

To have adequate knowledge in Mathematics, Science, Computer Science and Software Engineering; to be able to use theoretical and applied information in these areas on complex engineering problems.

2

To be able to identify, define, formulate, and solve complex Software Engineering problems; to be able to select and apply proper analysis and modeling methods for this purpose.

X
3

To be able to design, implement, verify, validate, document, measure and maintain a complex software system, process, or product under realistic constraints and conditions, in such a way as to meet the requirements; ability to apply modern methods for this purpose.

X
4

To be able to devise, select, and use modern techniques and tools needed for analysis and solution of complex problems in software engineering applications; to be able to use information technologies effectively.

X
5

To be able to design and conduct experiments, gather data, analyze and interpret results for investigating complex Software Engineering problems.

6

To be able to work effectively in Software Engineering disciplinary and multi-disciplinary teams; to be able to work individually.

X
7

To be able to communicate effectively in Turkish, both orally and in writing; to be able to author and comprehend written reports, to be able to prepare design and implementation reports, to be able to present effectively, to be able to give and receive clear and comprehensible instructions.

8

To have knowledge about global and social impact of engineering practices and software applications on health, environment, and safety; to have knowledge about contemporary issues as they pertain to engineering; to be aware of the legal ramifications of Engineering and Software Engineering solutions.

9

To be aware of ethical behavior, professional and ethical responsibility; to have knowledge about standards utilized in engineering applications.

10

To have knowledge about industrial practices such as project management, risk management, and change management; to have awareness of entrepreneurship and innovation; to have knowledge about sustainable development.

11

To be able to collect data in the area of Software Engineering, and to be able to communicate with colleagues in a foreign language. ("European Language Portfolio Global Scale", Level B1)

12

To be able to speak a second foreign language at a medium level of fluency efficiently.

13

To recognize the need for lifelong learning; to be able to access information, to be able to stay current with developments in science and technology; to be able to relate the knowledge accumulated throughout the human history to Software Engineering.

*1 Lowest, 2 Low, 3 Average, 4 High, 5 Highest

 


SOCIAL MEDIA

Izmir University of Economics
is an establishment of
izto logo
Izmir Chamber of Commerce Health and Education Foundation.
ieu logo

Sakarya Street No:156
35330 Balçova - İzmir / Turkey

kampus izmir

Follow Us

İEU © All rights reserved.