ÇAĞ UNIVERSITY FACULTY OF ARTS AND SCIENCES Learning Outcomes of the Course Code Course Title Credit ECTS MAT 421 Networks & Their Security 3 (3-0) 5 Prerequisites None Language of Instruction Mode of Delivery Face to face English Type and Level of Course Compulsory/ 4.Year/ Fall Semester Lecturers Name(s) Contacts Lecture Hours Office Hours Course Coordinator Assoc.Prof.Dr. M. Fatih mfakay@cu.edu.tr Thu. 9-12 N/A AKAY Others Course Objective This course provides an essential study of computer security issues and methods in networking systems. The aim of the course is to introduce the student to the fundamentals of cryptography and network security. Relationship Students who have completed the course successfully should be able to Net Effect Prog. Output 4&5 1 command on the concepts of data communications 8 &10 5&5 2 explain concepts related to applied cryptography, including 3 & 10 plaintext, ciphertext, symmetric cryptography, asymmetric cryptography, and digital signatures. 5&5 3 outline the requirements and mechanisms for identification and 3 & 10 authentication. 5&5 4 explain the requirements of non-real time security (email 3 & 10 security) and ways to provide privacy, source authentication, message integrity, non-repudiation, proof of submission, proof of delivery, message flow confidentiality, and anonymity. Course Description: This course involves an intense examination of network security defense techniques and countermeasures with defense fundamentals explained in great detail. Topics include Introduction to the Internet, Principles of Cryptography, Message Integrity and End-Point Authentication, Securing E-mail, TCP Connections and Wireless LANs. Course Contents:( Weekly Lecture Plan ) Weeks Topics Preparation Teaching Methods 1 Lectures and Demonstration What Is the Internet? Textbook Ch.1 2 Lectures and Demonstration Delay, Loss, and Throughput in PacketTextbook Ch.1 Switched Networks 3 Lectures and Demonstration Protocol Layers and Their Service Models Textbook Ch.1 4 Lectures and Demonstration Networks Under Attack Textbook Ch.1 5 Lectures and Demonstration History of Computer Networking and the Textbook Ch.1 Internet 6 Lectures and Demonstration What Is Network Security? Textbook Ch.8 7 Lectures and Demonstration Principles of Cryptography Textbook Ch.8 8 Lectures and Demonstration Symmetric Key Cryptography Textbook Ch.8 9 Lectures and Demonstration Public Key Encryption Textbook Ch.8 10 Lectures and Demonstration Message Integrity and End-Point Textbook Ch.8 Authentication 11 Lectures and Demonstration Securing E-mail and TCP Connections: SSL Textbook Ch.8 12 Lectures and Demonstration Network-Layer Security: IPsec and Virtual Textbook Ch.8 Private Networks 13 Lectures and Demonstration Securing Wireless LANs Textbook Ch.8 14 Lectures and Demonstration Operational Security: Firewalls and Intrusion Textbook Ch.8 Detection Systems REFERENCES Textbook Kurose, J.F., Ross, K.W., Computer Networking, A Top-Down Approach Featuring the Internet, Addison-Wesley, Fifth Edition, 2010 Activities Midterm Exam Homework Effect of The Activities Effect of The Final Exam Number 1 10 ASSESSMENT METHODS Effect 30% 10% 40% 60% ECTS TABLE Notes Total Contents Hours in Classroom (Face-to-face) Hours out Classroom Homeworks Midterm Exam Final Exam Number 14 14 10 1 1 Hours 3 3 2 20 25 Total Total / 30 ECTS Credit RECENT PERFORMANCE 2012-2013 FALL SEMESTER MAT421 NETWORKS AND THEIR SECURITY 5 4 3 2 1 0 -1 4 2 1 0 0 0 0 0 1 0 NA FF FD DD DC CC CB BB BA AA Total 42 42 20 20 25 149 =149/30= 4.96 5