Theory and practice of computer security, focusing in particular on the security aspects of computing systems. Survey of classical cryptography and cryptographic tools used to provide security, such as shared key encryption, cryptographic hash functions, public key encryption, key exchange, and digital signature. Review of how these tools are utilized in Public Key Infrastructure (PKI), Transport-Level Security, Wireless Network Security, Electronic Mail Security. Introduction to "Network Access Control", "System Security", and "Secure Programming".
İlk dosyayı sen ekleyebilirsin — notlar, geçmiş finaller, çözümler, cheat-sheet, ne varsa. Drive linki / PDF / ZIP / fotoğraf, hepsi olur.
Şu an: mail at, ben düzenleyip yayına alayım. Form/upload UX yakında geliyor (Kimya tasarlıyor).
| Dönem | Course CPA | |
|---|---|---|
| 2025-2026 Fall | 2.83 | 2 sec · 66 öğr |
| 2024-2025 Fall | 3.03 | 2 sec · 80 öğr |
| 2024-2025 Spring | 2.92 | 1 sec · 26 öğr |
| 2023-2024 Fall | 2.79 | 2 sec · 57 öğr |
| 2023-2024 Spring | 2.52 | 1 sec · 26 öğr |
| 2022-2023 Fall | 2.86 | 2 sec · 40 öğr |
| 2022-2023 Spring | 2.51 | 1 sec · 17 öğr |
| 2021-2022 Fall | 2.47 | 3 sec · 45 öğr |
| 2021-2022 Spring | 2.18 | 1 sec · 16 öğr |
| 2020-2021 Fall | 2.94 | 2 sec · 67 öğr |
Aggregate course GPA — Bilkent STARS'tan public data. Hoca-bazlı per-section detayı için STARS evaluation report →. Öğrenci anket cevapları KVKK kapsamında defter'de tutulmaz.
A student who will fail to collect a total of 10/50 points from the weighted average of Midterm Exam (30%) and two Homeworks (20%), AND attend less than 60% of all the lectures will get FZ grade.
Use of GenAI tools in all assignments is strongly prohibited in this course. I also do not recommend using these tools for better understanding of subjects discussed during lectures, since they often generate incorrect information. Instead use Lecture Notes,
Course Overview, Definitions, Cryptographic Services (Netacad Module 15) Cryptographic Services (Netacad Module 15) Basic Integrity and Authenticity (Netacad Module 16) Public Key Cryptography (Netacad Module 17) PKI Applications, Electronic Mail Security with S/MIME Electronic Mail Security with PGP Virtual Private Networks (VPNs) (Netacad Module 18) Network Threats (Netacad Module 2 ) Mitigating Threats (Netacad Module 3) Authentication, Authorization, and Accounting (AAA) (Netacad Module 7 except for Section 7.4) Access Control Lists (ACLs) (Netacad Module 8) Firewall Technologies (Netacad Module 9) and Zone-Based Policy Firewalls (Netacad Module 10 except for Section 10.3 and 10.4) Intrusion Prevention Systems (IPS) Technologies (Netacad Module 11) Network Security Testing (Netacad Module 22) ECTS - Workload Table: Activities Number Hours Workload Midterm exam 1 3 3 Final exam 1 3 3 Preperation for Final exam 1 15 15 Project (including preparation and presentation if applicable) 1 15 15 Course hours 14 4 56 Individual or group work 14 3 42 Homework 2 5 10 Preparation for Midterm exam 1 12 12 Total Workload: 156 Total Workload / 30: 156 / 30 5.2 ECTS Credits of the Course: 5 Type of Course: Lecture Course Material: Multimedia - PC - PP - Written Teaching Methods: Assignment - Exercises - Lecture - Presentations