>
Course Unit Title | Course Unit Code | Type of Course Unit | Level of Course Unit | Year of Study | Semester | ECTS Credits |
---|---|---|---|---|---|---|
Data and Network Security | BLM517 | Elective | Master's degree | 1 | Fall | 8 |
Prof. Dr. Nevcihan DURU
Prof. Dr. Adnan KAVAK
Assistant Prof. Dr. H. Engin DEMİRAY
Assistant Prof. Dr. Meltem KURT PEHLİVANOĞLU
1) Label the parts of Data and Network Security
2) Define Classical Encryption Techniques
3) Recognize the actual Encryption Techinques.
4) Recognize network security mechanisms.
5) Recognize and apply network security applications.
Program Competencies | ||||||||||||
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | ||
Learning Outcomes | ||||||||||||
1 | High | No relation | High | Low | No relation | Low | Low | No relation | Middle | Low | No relation | |
2 | High | Low | High | Low | Low | Low | Low | No relation | Low | Low | No relation | |
3 | High | Low | High | Low | Low | No relation | No relation | No relation | Low | Low | No relation | |
4 | No relation | No relation | No relation | No relation | No relation | No relation | No relation | No relation | No relation | No relation | No relation | |
5 | High | Low | High | Low | Low | No relation | No relation | No relation | Low | Low | No relation |
Face to Face
None
Computer Networks
Introduction to Data and Network Security, Classical Encryption Techniques, Block Ciphers, Finite Fields, Advanced Encryption Standard (AES), Confidentiality Using Symmetric Encryption, Number Theory, Public-Key Cryptography and RSA, Other Public-Key Cryptosystems, Hash Algorithms, Digital Signatures, Authentication Applications, Elelctronic Mail Security, IP Security, Web Security, Intruders, Malicious Software, Firewalls
Turkish
Not Required