Course Name |
Identity Design and System Architecture
|
Code
|
Semester
|
Theory
(hour/week) |
Application/Lab
(hour/week) |
Local Credits
|
ECTS
|
MBGT 200
|
Spring
|
2
|
2
|
3
|
4
|
Prerequisites |
None
|
|||||
Course Language |
Turkish
|
|||||
Course Type |
Required
|
|||||
Course Level |
Short Cycle
|
|||||
Mode of Delivery | - | |||||
Teaching Methods and Techniques of the Course | - | |||||
National Occupation Classification | - | |||||
Course Coordinator | - | |||||
Course Lecturer(s) | ||||||
Assistant(s) | - |
Course Objectives | The aim of this course is to provide the students with information about reliable operating system principles, programming analysis and methods of providing secure services. |
Learning Outcomes |
The students who succeeded in this course;
|
Course Description | This course includes methods of providing secure services, secure programming analysis, and malware. |
Related Sustainable Development Goals |
|
Core Courses |
X
|
Major Area Courses | ||
Supportive Courses | ||
Media and Management Skills Courses | ||
Transferable Skill Courses |
Week | Subjects | Related Preparation |
1 | Security and design of network architecture, anonymization and privacy | |
2 | Spams, worms, evaluation of network defence | |
3 | Virus, DNS security, routing protocol security, wireless network security, authentication, security analysis, new generation attack | |
4 | Information security and cyber safety | |
5 | Security policy, risk analysis, ethics | |
6 | Physical threats and controls, information technologies security structures, security of computer programs and data | |
7 | Safe design principles, privacy in information systems, information crimes, Case-Event Review, | |
8 | Mid-term exam | |
9 | Secure programming, Security validation and testing, Code interpretation using static analysis tools, Shell and operating environment, Numerical overflow problems and attacks, Pillow area navigation problems and attacks, Formatted character string problems and attacks, Input validation problems and attacks | |
10 | Web application security, session management, XSS attacks, Connections and Race situations, conversion to standard form and directory browsing errors, Temporary storage space and randomness. | |
11 | Malicious Software Analysis: Tools and Techniques, Malware Classification and Malware Characteristics | |
12 | System security, Introduction to operating system security, User: UNIX / windows users and groups, Simple system security commands: MS IIS, MS Exchange, IIS, Windows, File management system security: UNIX file permission twos, Windows ACL lists, UNIX service security: mail, nfs, nis, http, imap, pop3, rlogin, Windows specific services | |
13 | Windows domain administration, Manual services: OpenLDAP, Microsoft Active Directory, System log management: UNIX / Windows logs, Windows Registry | |
14 | Encryption algorithms (DES, Diffie-Hellman, RSA, HASH, MD5, AES, SHA-1, HMAC). | |
15 | Symmetric and Asymmetric Key Encryption, Symmetric Key Algorithms and AES, Asymmetric Key Algorithms and RSA | |
16 | Final |
Course Notes/Textbooks | |
Suggested Readings/Materials |
Semester Activities | Number | Weigthing |
Participation |
1
|
10
|
Laboratory / Application | ||
Field Work | ||
Quizzes / Studio Critiques | ||
Portfolio | ||
Homework / Assignments | ||
Presentation / Jury | ||
Project | ||
Seminar / Workshop | ||
Oral Exams | ||
Midterm |
1
|
40
|
Final Exam |
1
|
50
|
Total |
Weighting of Semester Activities on the Final Grade |
2
|
50
|
Weighting of End-of-Semester Activities on the Final Grade |
1
|
50
|
Total |
Semester Activities | Number | Duration (Hours) | Workload |
---|---|---|---|
Theoretical Course Hours (Including exam week: 16 x total hours) |
16
|
4
|
64
|
Laboratory / Application Hours (Including exam week: '.16.' x total hours) |
16
|
0
|
|
Study Hours Out of Class |
16
|
4
|
64
|
Field Work |
0
|
||
Quizzes / Studio Critiques |
0
|
||
Portfolio |
0
|
||
Homework / Assignments |
0
|
||
Presentation / Jury |
0
|
||
Project |
0
|
||
Seminar / Workshop |
0
|
||
Oral Exam |
0
|
||
Midterms |
1
|
2
|
2
|
Final Exam |
1
|
2
|
2
|
Total |
132
|
#
|
Program Competencies/Outcomes |
* Contribution Level
|
|||||
1
|
2
|
3
|
4
|
5
|
|||
1 |
-
|
-
|
-
|
X
|
-
|
||
2 |
-
|
-
|
-
|
X
|
-
|
||
3 |
-
|
-
|
-
|
-
|
X
|
||
4 |
-
|
-
|
X
|
-
|
-
|
||
5 |
-
|
-
|
X
|
-
|
-
|
||
6 |
-
|
-
|
-
|
X
|
-
|
||
7 |
-
|
X
|
-
|
-
|
-
|
||
8 |
-
|
-
|
X
|
-
|
-
|
||
9 |
-
|
-
|
X
|
-
|
-
|
||
10 |
-
|
-
|
-
|
X
|
-
|
||
11 |
-
|
-
|
X
|
-
|
-
|
*1 Lowest, 2 Low, 3 Average, 4 High, 5 Highest
As Izmir University of Economics transforms into a world-class university, it also raises successful young people with global competence.
More..Izmir University of Economics produces qualified knowledge and competent technologies.
More..Izmir University of Economics sees producing social benefit as its reason for existence.
More..