Course Name |
Network Management II
|
Code
|
Semester
|
Theory
(hour/week) |
Application/Lab
(hour/week) |
Local Credits
|
ECTS
|
MBGT 210
|
Fall/Spring
|
3
|
0
|
3
|
3
|
Prerequisites |
None
|
|||||
Course Language |
Turkish
|
|||||
Course Type |
Elective
|
|||||
Course Level |
Short Cycle
|
|||||
Mode of Delivery | - | |||||
Teaching Methods and Techniques of the Course | - | |||||
National Occupation Classification | - | |||||
Course Coordinator | - | |||||
Course Lecturer(s) | ||||||
Assistant(s) | - |
Course Objectives | The aim of this course is to teach the students how to protect important data against the various attacks that may occur on the Internet. Another purpose is to teach the different aspects of security by means of practical applications to be done by using security tools as well as theoretical knowledge |
Learning Outcomes |
The students who succeeded in this course;
|
Course Description | Introduction to network security and basic concepts, risk assessment, security policy, classification of threats, passwords, access permissions. Encryption techniques, unauthorized access methods, public key methods, digital signatures, protocols, encryption software, security in TCP / IP protocols and services, firewalls, virtual private networks, intrusion detection systems. |
Related Sustainable Development Goals |
|
|
Core Courses | |
Major Area Courses |
X
|
|
Supportive Courses | ||
Media and Management Skills Courses | ||
Transferable Skill Courses |
Week | Subjects | Related Preparation |
1 | Computer Networks | |
2 | Network Topologies | |
3 | Internet Network Protocols | |
4 | Broadband Access Technologies | |
5 | Introducing network-package monitoring tools. Working principles of network applications. | |
6 | Web and http protocol | |
7 | FTP, SMTP and POP3 protocols | |
8 | DNS service and DNS protocol | |
9 | Mid-term exam | |
10 | Multiple Protocol Wavelength Switching | |
11 | Wireless networking features. WiFi, bluetooth, WiMAX, 802.11 MAC protocol and frame structure. | |
12 | User Authentication | |
13 | Network Security | |
14 | Attackers, Viruses, Hackers | |
15 | Firewalls, Service-Blocking Attacks | |
16 | Final |
Course Notes/Textbooks | |
Suggested Readings/Materials |
Semester Activities | Number | Weigthing |
Participation |
16
|
15
|
Laboratory / Application | ||
Field Work | ||
Quizzes / Studio Critiques | ||
Portfolio | ||
Homework / Assignments |
1
|
25
|
Presentation / Jury | ||
Project | ||
Seminar / Workshop | ||
Oral Exams | ||
Midterm |
1
|
25
|
Final Exam |
1
|
35
|
Total |
Weighting of Semester Activities on the Final Grade |
18
|
65
|
Weighting of End-of-Semester Activities on the Final Grade |
1
|
35
|
Total |
Semester Activities | Number | Duration (Hours) | Workload |
---|---|---|---|
Theoretical Course Hours (Including exam week: 16 x total hours) |
16
|
3
|
48
|
Laboratory / Application Hours (Including exam week: '.16.' x total hours) |
16
|
0
|
|
Study Hours Out of Class |
14
|
4
|
56
|
Field Work |
0
|
||
Quizzes / Studio Critiques |
0
|
||
Portfolio |
0
|
||
Homework / Assignments |
1
|
10
|
10
|
Presentation / Jury |
0
|
||
Project |
0
|
||
Seminar / Workshop |
0
|
||
Oral Exam |
0
|
||
Midterms |
1
|
2
|
2
|
Final Exam |
1
|
2
|
2
|
Total |
118
|
#
|
Program Competencies/Outcomes |
* Contribution Level
|
|||||
1
|
2
|
3
|
4
|
5
|
|||
1 |
-
|
-
|
-
|
X
|
-
|
||
2 |
-
|
-
|
X
|
-
|
-
|
||
3 |
-
|
-
|
-
|
X
|
-
|
||
4 |
-
|
-
|
X
|
-
|
-
|
||
5 |
-
|
-
|
X
|
-
|
-
|
||
6 |
-
|
-
|
-
|
X
|
-
|
||
7 |
X
|
-
|
-
|
-
|
-
|
||
8 |
-
|
X
|
-
|
-
|
-
|
||
9 |
-
|
-
|
-
|
X
|
-
|
||
10 |
-
|
-
|
-
|
X
|
-
|
||
11 |
-
|
-
|
-
|
X
|
-
|
*1 Lowest, 2 Low, 3 Average, 4 High, 5 Highest
As Izmir University of Economics transforms into a world-class university, it also raises successful young people with global competence.
More..Izmir University of Economics produces qualified knowledge and competent technologies.
More..Izmir University of Economics sees producing social benefit as its reason for existence.
More..