Course Unit Code | Course Unit Title | Type of Course Unit | Year of Study | Semester | Number of ECTS Credits | BT119B3 | Cyber Security | Compulsory | 1 | 1 | 3 |
|
Level of Course Unit |
Short Cycle |
Objectives of the Course |
To be able to understand the concepts, protocols, applications and develop projects in the fields of Computer, Informatics and Cyber Security |
Name of Lecturer(s) |
Öğr. Gör. Eda SAKA ŞİMŞEK |
Learning Outcomes |
1 | To gain an awareness of basic security issues in the field of information requests and to be able to apply this in their work. | 2 | Understanding cyber information and security | 3 | Understanding network security | 4 | Understanding the science and techniques of encryption | 5 | Understanding software security |
|
Mode of Delivery |
Normal Education |
Prerequisites and co-requisities |
None |
Recommended Optional Programme Components |
none |
Course Contents |
• To learn the concept of information systems and security within the scope of Computer - Informatics - Internet systems.
• To gain the ability to develop significant security projects by learning the basic concepts of information systems and security.
• Introduction to Information and Computer Security
Access Control Systems and Methods
• Threats and Prevention Methods
Network and Communication Security
Encryption Science (Cryptology) and Data Hiding (Stegonagraphy)
• Software Security
• Penetration Tests and Stages
• Personal Security, Education and Awareness, Social Engineering
• Information Technology Law, Information Crimes
• Information Security Management, Risk analysis and Risk management, Certification
• Corporate Information Security |
Weekly Detailed Course Contents |
|
1 | Information Systems and Security | | | 2 | Information Systems and Security | | | 3 | Cyber Information Security | | | 4 | Security and Hacking Concepts | | | 5 | Network Security | | | 6 | Network Security | | | 7 | Cryptography Science and Encryption Techniques | | | 8 | Midterm Exam | | | 9 | Steganography | | | 10 | Software Security | | | 11 | Information Leakage Detection | | | 12 | Security Tools | | | 13 | Biometric Security Tools | | | 14 | General Evaluation | | | 15 | General Eavaluation | | |
|
Recommended or Required Reading |
Instructor Notes |
Planned Learning Activities and Teaching Methods |
|
Assessment Methods and Criteria | |
Midterm Examination | 1 | 100 | SUM | 100 | |
Final Examination | 1 | 100 | SUM | 100 | Term (or Year) Learning Activities | 40 | End Of Term (or Year) Learning Activities | 60 | SUM | 100 |
| Language of Instruction | Turkish | Work Placement(s) | None |
|
Workload Calculation |
|
Midterm Examination | 1 | 1 | 1 |
Final Examination | 1 | 2 | 2 |
Attending Lectures | 14 | 2 | 28 |
Self Study | 14 | 2 | 28 |
Individual Study for Mid term Examination | 1 | 15 | 15 |
Individual Study for Final Examination | 1 | 15 | 15 |
|
Contribution of Learning Outcomes to Programme Outcomes |
LO1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | LO2 | 1 | 1 | 3 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | LO3 | 1 | 1 | 1 | 1 | 1 | 1 | 4 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | LO4 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | LO5 | 1 | 1 | 3 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 3 | 1 | 1 |
|
* Contribution Level : 1 Very low 2 Low 3 Medium 4 High 5 Very High |
|
|