Course Details

Course Information
SemesterCourse Unit CodeCourse Unit TitleT+P+LCreditNumber of ECTS CreditsLast Updated Date
7COMP414NETWORK SECURITY0+3+05514.08.2025

 
Course Details
Language of Instruction English
Level of Course Unit Bachelor's Degree
Department / Program COMPUTER ENGINEERING
Type of Program Formal Education
Type of Course Unit Elective
Course Delivery Method Face To Face
Objectives of the Course The primary goal of this course is to equip students with a comprehensive and in-depth understanding of modern network security principles, challenges, and mechanisms. Students will gain both theoretical knowledge and practical skills necessary to design and analyze secure network architectures. The course aims to develop students' ability to critically examine various cryptographic algorithms, understand the theoretical foundations that ensure their security, and apply these concepts to real-world scenarios. Additionally, the course will explore common network vulnerabilities, cyberattacks, and corresponding defense mechanisms, with a focus on cryptographic protections. Students will also investigate the specific security requirements of real-time communications and web services, preparing them to address contemporary security issues in evolving digital environments.
Course Content An overview of information security; symmetric cryptography and hash functions;
asymmetric cryptography; key management; public key infrastructure, X.509
certificates, and Kerberos; cyber-attacks, web security, IPSec, VPNs & firewall,
intrusion detection/prevention systems, network access control and cloud
security, wireless network security, electronic mail
security, and malicious software.
Course Methods and Techniques Theory in class will be supoorted with midterm, final, homework, project and quiz.
Prerequisites and co-requisities None
Course Coordinator None
Name of Lecturers Instructor Dr. Cavidan Yakupoğlu Karaağaç cavidan.yakupoglu@agu.edu.tr
Assistants None
Work Placement(s) No

Recommended or Required Reading
Resources William Stallings and Lawrie Brown, “Computer Security: Principles and Practice”, Pearson, Third Edition, 2015 . David Basin, Patrick Schaller, and Michael Schlapfer, “Applied Information Security: A Hands-on Approach”, Springer, 1st Edition, 2011. B. Forouzan, “Cryptography and Network Security,” McGraw-Hill, 1st edition, 2008. C. Kaufman, R. Perlman, M. Spencer, "Network Security: Private Communication in a Public World", 2nd Edition, Prentice Hall, 2002.
Course Notes William Stallings, “Cryptography and Network Security: Principles and Practice”, Pearson, 7th Edition, 2017.
The author’s web page related to the textbook:
http://williamstallings.com/Cryptography/Crypto7e-Student/

Course Category
Mathematics and Basic Sciences %20
Engineering %30
Engineering Design %30
Field %20

Planned Learning Activities and Teaching Methods
Activities are given in detail in the section of "Assessment Methods and Criteria" and "Workload Calculation"

Assessment Methods and Criteria
In-Term Studies Quantity Percentage
Yarıyıl İçi Çalışmalarının Başarı Notunun Katkısı 1 % 20
Quiz/Küçük Sınav 2 % 10
Ödev 4 % 20
Proje/Çizim 1 % 25
Final examination 1 % 25
Total
9
% 100

 
ECTS Allocated Based on Student Workload
Activities Quantity Duration Total Work Load
Yazılı Sınav 1 10 10
Grup Sunumu 1 10 10
Grup Projesi 1 25 25
Ev Ödevi 4 1 4
Sınıf İçi Aktivitesi 1 2 2
Sunum için Hazırlık 1 3 3
Kısa Sınav 2 5 10
Okuma 12 1 12
Araştırma 1 1 1
Kişisel Çalışma 12 1 12
Yüz Yüze Ders 14 3 42
Final Sınavı 1 20 20
Total Work Load   Number of ECTS Credits 5 151

 
Course Learning Outcomes: Upon the successful completion of this course, students will be able to:
NoLearning Outcomes
1 Understand the basic principles and practices in computer and network security.
2 Identify the major types of threats to information security and the associated attacks.
3 Understand the role of cryptography in information security.
4 Understand and learn cryptography algorithms and methods that are used in the past and present.
5 Develop knowledge about characteristics of malicious software.

 
Weekly Detailed Course Contents
WeekTopicsStudy MaterialsMaterials
1 Security Mindset
2 Introduction to Cryptography
3 Symmetric Encryption
4 Public Key Cryptography and Hashes
5 Authentication and Access Control
6 Security Protocols
7 Spring break
8 Midterm and active learning week: group studies
9 Malicious Code and Modern Malware
10 Firewall
11 Intrusion Detection
12 IPSec and TLS
13 Wireless and Mobile Security
14 Attacks and Web Security

 
Contribution of Learning Outcomes to Programme Outcomes
P1 P2 P3 P4 P5 P6 P7 P8 P9 P10 P11 P12 P13 P14 P15
All 4 2 3 2 1 2 3 4 3 2 4 3 3 4 2
C1 4 2 3 2 1 2 3 4 3 2 4 3 3 4 2
C2 4 2 3 2 1 2 3 4 4 2 4 3 3 4 2
C3 5 2 4 2 1 2 3 4 3 1 3 4 4 3 2
C4 5 2 4 2 1 2 4 4 3 1 3 5 5 3 2
C5 4 2 3 1 1 2 3 5 4 2 4 2 3 4 2

  Contribution: 1: Very Slight 2:Slight 3:Moderate 4:Significant 5:Very Significant

  
  https://sis.agu.edu.tr/oibs/bologna/progCourseDetails.aspx?curCourse=78284&lang=en