Courses given by the Department of Cyber Security
Course Code | Course Name | METU Credit | Contact (h/w) | Lab (h/w) | ECTS |
---|---|---|---|---|---|
CSEC500 | RESEARCH METHODS, EVALUATION AND DISSEMINATION ETHICS IN CYBERSECURITY | 0 | 0.00 | 0.00 | 10.0 |
Course ContentBasics of scientific and engineering ethics. Responsible and ethical conduct of research, evaluation and testing in cybersecurity. Ethical considerations in publication. Protection of personal privacy, and responsible data management. | |||||
CSEC501 | CYBER SYSTEMS AND INFORMATION SECURITY | 3 | 0.00 | 0.00 | 8.0 |
Course ContentThis course will cover fundamentals of cyber systems and information security. The course provides a strong foundation in cyber systems and information security. The focus of the course is security and risk management, asset security, identity and access management, security assessment and testing, cryptography, penetration testing, mobile security, social engineering, legal and ethical issues. | |||||
CSEC502 | NETWORK SECURITY | 3 | 0.00 | 0.00 | 8.0 |
Course ContentThis course will cover fundamentals of network security. The course provides a strong foundation in network security. The following topics are covered: encryption techniques, key management and authentication, hashing, public key cryptography, web security, TCP/IP, DDoS attacks, DNS security. | |||||
CSEC504 | PENETRATION TESTING AND VULNERABILITY ANALYSIS | 3 | 0.00 | 0.00 | 8.0 |
Course ContentIntroduction to penetration testing. Penetration testing planning; determining scope and rules of engagement documentation. Penetration testing tools: setting up virtual up and toolset. Reconnaissance phase: open source intelligence, information gathering, correlation, verification, and priorization. Scanning phase: enumeration, port scanning, and vulnerability analysis. Exploitation phase: manual exploitation, password cracking and Metasploit framework. Post-exploitation phase: Data gathering, network analysis, maintaining access, pivoting. Reporting phase: penetration test report structure and components. Bypassing security controls and avoiding detection. | |||||
CSEC505 | WEB APPLICATION SECURITY | 3 | 0.00 | 0.00 | 8.0 |
Course ContentState, in sequential order and without resorting to structured sentences,the main topics, issues, concerns etc. covered in the course, separate individual items with a semi-colon or a full stop; only proper names and words beginning after a full stop should be capitalized. | |||||
CSEC506 | INFORMATION SECURITY MANAGEMENT SYSTEM | 3 | 0.00 | 0.00 | 8.0 |
Course ContentIn todays high technology environment, organizations of all kinds rely on information systems to perform most of their business processes. The protection of the information assets underpins the commercial viability of all enterprises and the effectiveness of public sector organizations. Ensuring the secure operation of the business critical IT processes, therefore, gets more important from day to day and enterprises feel obliged to put information security higher on the board agenda as part of the enterprise governance rather than leaving it solely to technical people as in the past. The course covers the principles of applied information security management and is suitable for those who are looking for an in-depth understanding of security management in medium to large organizations. The course comprises the following topics: governance and security policy, threat and vulnerability management, incident management, risk management, information leakege, crisis management and business continuity, legal and compliance, security awareness and security implementation considerations. The topics are mostly based on ISO 27000 standards. The areas to be covered generally are: ISO 27000 series and the Plan Do Check Act model, assessment of threats and vulnerabilities, incident response, forensics and investigations, risk assessment and risk management, frameworks, dealing with classified sensitive data, contingency planning, legal and regulatory drivers and issues, certification, common criteria, security awareness, education and training, and practical considerations when implementing the frameworks to address current and future threats.Students will be introduced to the complexity of real security issues facing todays networked organizations. Through the assignments and case studies on information security management, this course will present best practices and standards, and will enable students to assess and plan for security risks and also develop and maintain security | |||||
CSEC507 | APPLIED CRYPTOLOGY | 3 | 0.00 | 0.00 | 8.0 |
Course ContentHistorical introduction to cryptography. Block ciphers: Descriptions of internationally standardized ciphers. Modes of Operation. Block cipher cryptaanalysis. Cryptographic Hash Functions. Password cracking. Stream Ciphers. Public-key cryptography: Discrete logarithm and factorization problems. Descriptions of Diffle-Hellman key exchange, RSA, DSA algorithms. TLS/SSL protocol. | |||||
CSEC508 | APPLIED CRYPTANALYSIS | 3 | 0.00 | 0.00 | 8.0 |
Course ContentTime complexity. Random variables. Cryptanalysis of historical ciphers. Frequency analysis. Differential cryptanalysis and its variants. Success probability and data complexity estimations. Linear cryptanalysis and its variants. Birthday paradox. Password cracking. Attacks on discrete logarithm and factorization problems. | |||||
CSEC509 | FORENSIC ANALYSIS AND INCIDENT RESPONSE MANAGEMENT | 3 | 0.00 | 0.00 | 8.0 |
Course ContentState,in sequential order and without resorting to structured sentences, the main topics, issues, concerns etc. covered in the course, separate individual items with a semi-colon or a full stop; only proper names and words beginning after a full stop should be capitalized. | |||||
CSEC510 | OPERATING SYSTEMS SECURITY | 3 | 0.00 | 0.00 | 8.0 |
Course ContentIntroduction to operating systems, Process and thread, Concurrency, Memory management, File management, Security kernel, Linux security, Windows security, OS-X security, Verifiable security goals, Common criteria. | |||||
CSEC511 | CLOUD COMPUTING AND SECURITY | 3 | 0.00 | 0.00 | 8.0 |
Course ContentIntroduction to cloud computing, Virtualization, Multi-tenancy, Scalability, On-demand access, Elasticity, Cloud stack, Service models, Deployment models, Software-as-a-Service, Platform-as-a- service, Infrastructure-as-a-service, Security-as-a-Service, Cloud security challenges, Encryption, Data security, Identity and Access Management. | |||||
CSEC513 | LIGHTWEIGHT CRYPTOGRAPHY FOR THE INTERNET OF THINGS | 3 | 3.00 | 0.00 | 8.0 |
Course ContentLightweight block ciphers. Lightweight hash functions. Lightweight message authentication codes. Lightweight stream ciphers. Lightweight cryptography standards. Lightweight devices and performance metrics. Cryptanalysis of lightweight designs. Side-channel analysis. Internet of things. | |||||
CSEC514 | HUMAN FACTORS IN CYBER PHYSICAL SYSTEMS | 3 | 0.00 | 0.00 | 7.0 |
Course ContentThis course aims at introducing the students theoretical frameworks and applications of various aspectsof human factors within the context of cyber physical systems. The topics involve but are not limited to the concept of cyber-physical systems, its fundamentals, security, privacy, domain-specific solutions for security and privacy in cyber-physical systems; human in the loop in cyber-physical systems and its applications, cyberpsychology and its applications, cyberemotions, cyberdeception, aspects of human factors in cyber security, in particular social engineering, situational awareness, human augmentation and research methods in cyber security. | |||||
CSEC515 | MALWARE ANALYSIS | 3 | 3.00 | 0.00 | 8.0 |
Course ContentLearn how to analyze malware, including computer viruses, trojans and rootkits using disassemblers, debuggers, static and dynamic analysis, using disassemblers, binary analysis debuggers and other tools. | |||||
CSEC516 | THE LEGAL DIMENSIONS OF CYBERSECURITY | 3 | 0.00 | 0.00 | 8.0 |
Course ContentThe concept of cybersecurity is critical in terms of national security, and as such has implications in both domestic and international law. Cybercrime poses a threat to cybersecurity, and has been made punishable by domestic and comparative law alike. Accordingly, the starting point of the course shall be to cover what constitutes cybercrime under the Turkish Criminal Code No. 5237. Secondly, we shall look at criminal activities defined under various laws, such as the Intellectual Property Act No.5846 and the Electronic Signature Act No. 5070. We shall elaborate on the legal aspect of cybercrime mitigation within the context of Turkish domestic law, and shall focus on the application process leading to legal internet access restriction. We shall go over the procedures of investigation and prosecution in light of related legislation. Finally, we will look at the legal process starting with the acquisition of digital evidence from the crime scene leading up to it being used to prove the existence of criminal elements at a court law, under the provisions of the Turkish Criminal Procedure Act No. 5271. The course aims to provide students who are expected to work in the field of cybersecurity with the necessary legal background by covering judicial decisions and various case studies. | |||||
CSEC519 | BLOCKCHAIN AND CRYPTOCURRENCY TECHNOLOGIES | 3 | 3.00 | 0.00 | 8.0 |
Course ContentThis course introduces the cryptographic foundations of blockchain and cryptocurrency technologies that are used for the security, integrity, and anonymity: digital signatures, cryptographic hash functions, multi signatures, and zero-knowledge protocols. Cryptocurrency mining algorithms and their security will be analyzed with an emphasis on popular cryptocurrencies. Consensus models, smart contracts, non-fungible tokens (NFTs), and emerging topics will be presented. | |||||
CSEC520 | SECURE EMBEDDED SYSTEMS | 3 | 2.00 | 1.00 | 8.0 |
Course ContentThis course teaches the fundamentals of embedded security with real-life implementations. In the first half of the course, students learn how to efficiently implement cryptography on embedded devices, using a microcontroller or an FPGA depending on the student s background. This first half includes security module implementations, which is solved during the lab time. In the second half of the course, threats against and techniques to attack embedded systems (e.g., side-channel analysis) are presented. The implementations from the first half part one are practically attacked with the introduced methods. At the end of the course, countermeasures against the types of attacks introduced in the second half will be briefly discussed and demonstrated. During the course, students will learn to use oscilloscopes and other tools used for security analyses. | |||||
CSEC521 | SECURE SOFTWARE DEVELOPMENT | 3 | 3.00 | 0.00 | 8.0 |
Course ContentSecure software development considers security as part of the development process and aims to achieve more secure software systems. This course introduces the state-of-art and industrys best practices for security requirements engineering, security analysis and modeling, security patterns and testing as integrated into the software development life cycle models. | |||||
CSEC522 | CYBER WARFARE | 3 | 3.00 | 0.00 | 8.0 |
Course ContentObjective of the course is to teach essential methods, tools, standards and principles of cyber security and cyber warfare, cyber defense and offense capabilities, policies of leading countries, fundamental tenets and aspects of cyber defense and offense. | |||||
CSEC525 | DIGITAL PRIVACY | 3 | 3.00 | 0.00 | 8.0 |
Course ContentThis course will provide students a legal approach about information privacy, communication privacy and individual privacy. Students will study privacy from philosophical, historical, legal, policy, and technical perspectives and learn how to engineer systems for privacy. In addition, students will be provided with a basic knowledge about contracts and Intellecual Property issues for cybersecurity experts. | |||||
CSEC528 | MACHINE LEARNING DESIGN AND APPLICATION FOR CYBER SECURITY | 3 | 2.00 | 2.00 | 8.0 |
Course ContentThis course aims to familiarize the cyber security and information systems students with data mining techniques and machine learning methods, with hands-on demonstrations on different cyber security use cases. The course will be conducted by first discussing the related concepts in theoretical formal lectures then applying sample codes in practical laboratory sessions. | |||||
CSEC536 | RESEARCH METHODS IN CYBER SECURITY | 3 | 3.00 | 0.00 | 8.0 |
Course ContentThe course will review research and applications on applied topics in cybersecurity, for the purpose of teaching methodologies for a systematic analysis of cyber security incidences in multiple domains, including methods for statistical analysis, the analysis of common cyber security attacks, malware analysis, and network packet analysis. The lectures in the course will introduce basic statistical methods, classical machine learning methods, deep learning methods, as well as the task analysis methods and Natural Language Processing (NLP) methods, together with their implementations. | |||||
CSEC589 | TERM PROJECT | 0 | 0.00 | 0.00 | 20.0 |
Course ContentM.S. students working on a common area choose a research topic to study and present to a group under the guidance of a faculty member. | |||||
CSEC590 | GRADUATE SEMINER | 0 | 0.00 | 2.00 | 10.0 |
Course ContentThis course is designed to provide students with a chance to prepare and present a professional seminar on subjects of their own chocie. | |||||
CSEC591 | CYBERSECURITY PRIMER I | 1 | 1.00 | 0.00 | 5.0 |
Course ContentFor course details, see https://catalog2.metu.edu.tr. | |||||
CSEC592 | CYBERSECURITY PRIMER II | 1 | 1.00 | 0.00 | 5.0 |
Course ContentAn introduction to the basic subjects underlying cybersecurity. Applied statistics, basic research methodology, ethics, IT governance, systems thinking, data mining, basics of cryptography, public-key cryptography. | |||||
CSEC599 | M.S. THESIS | 0 | 0.00 | 0.00 | 50.0 |
Course ContentProgram of research leading to M.S. degree arranged between student and faculty member. Students register to this course in all semesters starting from the beginning of their second semester while the research program or white-up thesis is in progress (F&S). | |||||