Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | MYO035 | ||||
Course Name: | Blockchain technology | ||||
Semester: | Spring | ||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | Departmental Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | Face to face | ||||
Course Coordinator: | Öğr. Gör. KEYVAN ARASTEH ABBASABAD | ||||
Course Lecturer(s): | Keyvan Arasteh | ||||
Course Assistants: |
Course Objectives: | blockchain technology course typically aims to provide students with a comprehensive understanding of the fundamental concepts, principles, and applications of blockchain. |
Course Content: | Understanding Blockchain Fundamentals: Define what blockchain is and explain its underlying technology. Explore the decentralized and distributed nature of blockchain networks. Technical Proficiency: Familiarize students with the cryptographic principles underpinning blockchain. Provide hands-on experience with blockchain platforms and development tools. Teach smart contract development for platforms like Ethereum. Blockchain Architecture: Explain the architecture of blockchain networks, including nodes, consensus mechanisms, and peer-to-peer communication. Discuss different types of blockchains (public, private, consortium) and their use cases. Security and Privacy: Address the security challenges and vulnerabilities associated with blockchain technology. Explore privacy and anonymity considerations in blockchain systems. Use Cases and Applications: Examine real-world applications of blockchain across various industries such as finance, supply chain, healthcare, and more. Evaluate the benefits and limitations of using blockchain in different contexts. Smart Contracts: Introduce the concept of smart contracts and their role in decentralized applications. Teach the development, deployment, and execution of smart contracts. Legal and Regulatory Aspects: Explore legal and regulatory challenges associated with blockchain technology. Discuss the implications of blockchain in terms of compliance and governance. Blockchain Integration: Discuss strategies for integrating blockchain technology with existing systems and processes. Explore interoperability between different blockchain networks. Blockchain Consensus Mechanisms: Cover various consensus algorithms such as Proof of Work (PoW), Proof of Stake (PoS), and Practical Byzantine Fault Tolerance (PBFT). Scalability and Performance: Analyze the scalability issues of blockchain networks and potential solutions. Discuss the performance metrics and considerations for blockchain implementations. Emerging Trends and Future Developments: Explore cutting-edge developments in blockchain technology. Discuss emerging trends, such as decentralized finance (DeFi) and non-fungible tokens (NFTs). Critical Thinking and Problem-Solving: Foster critical thinking skills to analyze and solve problems related to blockchain technology. Encourage students to think creatively about potential applications and improvements. |
The students who have succeeded in this course;
1) Understand: Grasp fundamental blockchain concepts and technologies. 2) Technical Skills: Develop proficiency in blockchain platforms, cryptography, and smart contracts. 3) Architecture: Comprehend blockchain network architecture and consensus mechanisms. 4) Security and Privacy: Address security challenges, including privacy considerations. 5) Applications: Analyze real-world applications across industries. 6) Smart Contracts: Master the development and deployment of smart contracts. 7) Legal and Regulatory Awareness: Awareness of legal and regulatory challenges associated with blockchain technology and implications for compliance and governance. 8) Integration: Integrate blockchain with existing systems, considering interoperability. 9) Consensus Mechanisms: Grasp various blockchain consensus mechanisms. 10) Scalability: Analyze scalability issues and propose solutions. 11) Emerging Trends: Stay informed about trends like DeFi and NFTs. 12) Continuous Learning: Foster a mindset for ongoing learning in the dynamic blockchain field. |
Week | Subject | Related Preparation |
Course Notes / Textbooks: | |
References: |
Course Learning Outcomes | 1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | 1 |
2) | Can install and manage software and hardware required for end user security. | 1 |
3) | Can follow current security products. | 1 |
4) | It can manage both software and people in the environment against cyber attack incidents. | 1 |
5) | Installs the basic software and hardware of the computer. | 1 |
6) | Installs and manages open source operating system and computer networks software. | 1 |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | 1 |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | |
9) | Creates, manages and organizes space on cloud platforms. | 1 |
10) | Firewall software also enables, manages and regulates the installation of hardware. | 1 |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | 1 |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. | 1 |
Semester Requirements | Number of Activities | Level of Contribution |
total | % | |
PERCENTAGE OF SEMESTER WORK | % 0 | |
PERCENTAGE OF FINAL WORK | % | |
total | % |