CHILD DEVELOPMENT (TURKISH)
Bachelor TR-NQF-HE: Level 6 QF-EHEA: First Cycle EQF-LLL: Level 6

Course Introduction and Application Information

Course Code Course Name Semester Theoretical Practical Credit ECTS
CMP4321 Introduction to Network Security and Cryptography Fall 3 0 3 6
This catalog is for information purposes. Course status is determined by the relevant department at the beginning of semester.

Basic information

Language of instruction: English
Type of course: Non-Departmental Elective
Course Level: Bachelor’s Degree (First Cycle)
Mode of Delivery: Face to face
Course Coordinator : MEHMET ŞÜKRÜ KURAN
Course Lecturer(s): Dr. Öğr. Üyesi SELÇUK BAKTIR
Recommended Optional Program Components: None
Course Objectives: This is an introductory course where fundamental concepts in cryptography and network security are explained. After completing the course, students will get basic understanding about encryption, decryption, stream ciphers, block ciphers, public-key cryptography, digital signatures, hash functions, message authentication codes and key distribution protocols.

Learning Outcomes

The students who have succeeded in this course;
I. Gain knowledge on Symmetric key cryptography, block and stream ciphers,
II. Gain knowledge on the AES algorithm,
III. Gain knowledge on Public key cryptography and public key algorithms such as RSA, Diffie-Hellman, Elgamal and elliptic curve cryptography,
IV. Gain knowledge on digital Signatures,
V. Gain knowledge on hash functions,
VI. Gain knowledge on key exchange protocols.

Course Content

Introduction and Review of Basics. Stream Ciphers. Advanced Encryption Standard (AES). Block Cipher Modes of Operation. Public-key Cryptography. The RSA Algorithm. Digital Signatures. Hash Functions. Message Authentication Codes. Discrete Logarithm Problem. Diffie-Hellman Key Exchange and ElGamal Encryption. Elliptic Curve Cryptography. Key Establishment Protocols.

Weekly Detailed Course Contents

Week Subject Related Preparation
1) Introduction and review of basics.
2) Stream Ciphers.
3) Advanced Encryption Standard (AES).
4) Block Cipher Modes of Operation.
5) Public-key Cryptography.
6) RSA Algorithm.
7) Midterm exam.
8) Digital Signatures.
9) Hash Functions.
10) Message Authentication Codes.
11) Discrete Logarithm Problem.
12) Diffie-Hellman Key Exchange and ElGamal Encryption.
13) Elliptic Curve Cryptography.
14) Key Establishment Protocols.

Sources

Course Notes / Textbooks: Understanding Cryptography, Christof Paar and Jan Pelzl, Springer 2010.
References:

Evaluation System

Semester Requirements Number of Activities Level of Contribution
Attendance 14 % 0
Homework Assignments 6 % 20
Presentation 1 % 10
Midterms 1 % 30
Final 1 % 40
Total % 100
PERCENTAGE OF SEMESTER WORK % 60
PERCENTAGE OF FINAL WORK % 40
Total % 100

ECTS / Workload Table

Activities Number of Activities Duration (Hours) Workload
Course Hours 14 3 42
Study Hours Out of Class 14 4 56
Homework Assignments 6 4 24
Midterms 1 2 2
Final 1 2 2
Total Workload 126

Contribution of Learning Outcomes to Programme Outcomes

No Effect 1 Lowest 2 Low 3 Average 4 High 5 Highest
           
Program Outcomes Level of Contribution
1) To gain both theoretical and practical knowledge about physical, cognitive, social-emotional aspects of child development. 4
2) To display actions in professional practice based on ethical principles and values. 5
3) To adopt the principle of lifelong learning, using efficient ways for accessing information. 5
4) To know the stages of child development and to be able to use models / theories efficiently for supporting children's cognitive, affective and psycho-motor development. 5
5) To plan, implement and evaluate professional projects, research and events with a sense of social responsibility, 5
6) To be able to use effective communication methods in counseling and child and family-based guidance. 3
7) To be sensitive to the child and family-related issues taking into account the child's stages of development, and to implement strategies for personal development of child and education methods which are vital for leading effective and productive life. 5
8) To use the education and communication materials according to the child development stage, and to create proper educational environment. 5
9) To take responsibilities in the field of child development and education using interdisciplinary approach, and to use information technologies, and to engage in projects and activities. 5
10) To use health information technologies for research in the field of child development. 5
11) To be able to monitor occupational information using at least one foreign language, to collaborate and communicate with colleagues at international level. 5
12) To become a good example for colleagues and society, and represent efficiently the professional identity using advanced knowledge about child development. 5