CSEC528 MACHINE LEARNING DESIGN AND APPLICATION FOR CYBER SECURITY

Course Code:9100528
METU Credit (Theoretical-Laboratory hours/week):3 (2.00 - 2.00)
ECTS Credit:8.0
Department:Cyber Security
Language of Instruction:English
Level of Study:Graduate
Course Coordinator:
Offered Semester:Fall and Spring Semesters.

Course Objectives

The objective of this course is to give the fundamental concepts of artificial intelligence and introduce the students with setting up the coding environment, data manipulation and classification execution stages, different techniques of machine learning. 

At the end of the course, the students are expected to learn different data mining techniques, coding in an interactive Python environment using artificial intelligence related libraries, executing different machine learning methods with a cyber security view.  


Course Content

This course aims to familiarize the cyber security and information systems students with data mining techniques and machine learning methods, with hands-on demonstrations on different cyber security use cases. The course will be conducted by first discussing the related concepts in theoretical formal lectures then applying sample codes in practical laboratory sessions.



In the formal lectures, the concepts of artificial intelligence and data mining, such as data splitting & standardization, decision trees, linear & logistic regression, perceptron, support vector machines, naïve bayes, k-nearest neighbors, k-means, neural networks, self-organizing maps will be analyzed.



During the hands-on lab sessions, the discussed concepts & algorithms will be utilized in Python for different cyber security use cases. Several different Python libraries, code editing tools, and different datasets about phishing, virus signatures and network logs will be used. Using these datasets and discussed algorithms, sample tasks such as classification of anomalies, filtering spams, detecting malwares will be presented. The functions and methods in the employed libraries will also be discussed in the lab sessions.


Course Learning Outcomes

At the end of the course, the students are expected to learn different data mining techniques, coding in an interactive Python environment using artificial intelligence related libraries, executing different machine learning methods with a cyber security view.  


Program Outcomes Matrix

Level of Contribution
#Program Outcomes0123
1leads and manages application and research projects related to the theoretical and methodological approaches on information security.
2knows fundamental concepts and techniques on enterprise information security management, information security management systems, ethics and information security governance.
3has in-depth and wide knowledge on cyber systems, operating systems and network security technologies, security risks including their analysis and risk mitigation techniques and methods.
4applies theoretical and methodical approaches of information security.
5has knowledge on analysis, design, implementation, and management of information systems requiring information security; uses related principles, methods, and tools.
6has deep and wide knowledge on cyber security and information security technology at a level to develop advanced applications.
7develops innovative solutions in the design of cyber security applications, processes, and systems.
8applies different quantitative and qualitative scientific research methods, has the ability to conduct scientific studies.
9conducts experimental and applied research.
10identifies the problems and the underlying causes in their area of expertise, develops methods to solve them, evaluates the results in line with objectives.
11follows academic literature on cyber security and information technologies; performs critical analysis of the information.
12works effectively both independently and in multi-disciplinary teams as a team member or leader.
13pays attention to ethical values and applies them at her professional and scientific studies.
14presents the recent developments in the field and their work, by supporting with qualitative and quantitative data effectively in written and spoken English and Turkish.

0: No Contribution 1: Little Contribution 2: Partial Contribution 3: Full Contribution