0% found this document useful (0 votes)
65 views23 pages

Lec1 Overview

The document outlines the course CSE 473: Network and Information Security, taught by Dr. Salih Sarp at Gebze Technical University. It details course objectives, topics, schedule, grading scheme, and logistics, aiming to equip students with knowledge in data and network security systems. Students will learn to identify vulnerabilities, conduct risk analyses, and apply ethical hacking techniques throughout the course.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views23 pages

Lec1 Overview

The document outlines the course CSE 473: Network and Information Security, taught by Dr. Salih Sarp at Gebze Technical University. It details course objectives, topics, schedule, grading scheme, and logistics, aiming to equip students with knowledge in data and network security systems. Students will learn to identify vulnerabilities, conduct risk analyses, and apply ethical hacking techniques throughout the course.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

Lecture Goals

• Logistics
• Instructor, office hours
• Course objectives, topics, schedule
CSE 473: Network and Information Security • Workload, and grading scheme
• Motivation and Overview
Course Introduction • Information Security Overview
• Security Controls
• Access Control

Dr. Salih SARP


Department of Computer Engineering
Acknowledgments/ Credits to Eshete, Mitchell. Taly and Datta

1 2

Logistics Course Info


• Instructor: Salih Sarp, PhD. (Member IEEE) joined Gebze Technical University (GTU)
– Computer Engineering Department as a Visiting Scholar in 2023. • Goal: Equip learners with in-depth knowledge of data and network security systems,
including their vulnerabilities and threats. Upon completion of this course, students
• His research interests include Artificial Intelligence, Digital Twin, Smart Cities, will be able to design and implement secure security systems, conduct comprehensive
Forecasting and Cybersecurity. security risk analyses, and apply ethical hacking techniques to identify and remediate
• Projects: potential security breaches.
• Digital Twin in Chronic Wound Management
• Analysis of Deceptive Data Attacks with Adversarial Machine Learning for Solar Photovoltaic Power • Syllabus on Teams group.
Generation Forecasting.
• Classification and Segmentation of Floodwater on Roadways using Mask-R-CNN
• Office: 253 • Time and location: Friday 2:00 pm – 5:00 pm @ 207
• Email: [email protected]
• Objectives:
• Office hours: Thu, 13:30 – 15:30. By appointment. Contact me via email to schedule a
• Identify vulnerabilities and threats, and design effective security measures.
time to meet via Teams. Check department website and Teams for any announcements.
• Assess potential risks and develop strategies to mitigate them.
• Emails should be explanatory, include your information. • Use penetration testing and vulnerability assessment to identify security weaknesses.
• Subject line should include the course code. • Ensure confidentiality, integrity, and availability of sensitive information.
• Set up firewalls, intrusion detection systems, and other security appliances.

3 4
Week Date Content Project
1 28/02 Introduction to Data and Network Security.

3
07/03 Information Security

14/03 Why secure your Network, Footprinting


Project
Project Proposal Submission
4 21/03 How Much security do you need, Scanning

Tentative 5 28/03 Enumeration • Collaborate with one person


Schedule 6

7
04/04 Vulnerability

11/04 System Hacking


• Choose an AI-based Cybersecurity application area
• Characterize the use of AI
and Topics 8 18/04 Midterm exam Midterm Project Report Submission

• Develop approaches
9 25/04 Malware

10 02/05 Sniffing • Find ways to measure, compare the use of AI


11 09/05 Social Engineering

12 16/05 DOS Quiz

13 23/05 Presentation

14 30/05 Presentation

15 06/06 General review

16 13/06 Final demo Final Project Report Submission

5 6

Grading, Workload
Project
Tentative Grading Scale Grading Weights
Letter grades are based on the following percentage scale:
• Mid-Term: 30%
Percentage Letter Grade • Quiz: 20%
90-100 AA
• In Class Activity: 15%
85-90 BA
• Project & HW: 40%
80-84 BB
• Project Proposal 15%
70-79 CB • Midterm Report 25%
65-69 CC • Codes + Report
55-64 DC • Final Work 60%
40-54 DD • Presentation
• Codes + Demo
≤ 39 FF • Report

• All assignments must be neat, legible, organized and professional


• File names should be consistent, needs to have your name, and assignment name.
Salih_Sarp_Final_Report.doc etc.
• Any file that you send or submit should have a proper naming.

7 9
10 11

12 13
14 15

16 17
18 19

20 21
23 24

25 26
27 28

29 30
31 32

33 34
35 36

37 38
39 40

41 42
43 44

45 46
47 48

49 50
51 52

53 54
55 56

57 58
59 60

61 62
63 64

65 66
67 68

69 70
71 72

74 75
76 77

82 83
84 85

86 87
88 89

90 91
92 93

94 95
Are you interested in AI, SOFTWARE DEVELOPMENT, Internet
of Things (IoT) and/or SMART CITIES/GRIDS?

• We are looking for Undergraduate/ Graduate students


for several research projects related to Artificial
Intelligence and, cybersecurity, internet of things
(IoT), and/or smart cities.

• Candidate should possess a strong background in


Computer Engineering.

• Interested? Contact me, Dr. Sarp, at [email protected]

96 97

98

You might also like