Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | MYO059 | ||||
Course Name: | Security in E-Commerce | ||||
Semester: |
Fall Spring |
||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | Departmental Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | Face to face | ||||
Course Coordinator: | Öğr. Gör. RAMAZAN ŞEN | ||||
Course Lecturer(s): | Ramazan ŞEN | ||||
Course Assistants: |
Course Objectives: | Students determine the cyber security infrastructure and policies to be implemented in the institution to protect basic e-commerce applications. |
Course Content: | Security policies that must be implemented in an e-commerce company, protocols that must be followed for web page and mobile application security. |
The students who have succeeded in this course;
1) Student learns the concept of web security 2) The student learns the concept of mobile application security 3) Learns the security policies to be applied in the institution 4) Learns the security policies that company employees must comply with 5) Understands the concept of firewall 6) In case of an attack, detects the type of attack and responds appropriately |
Week | Subject | Related Preparation |
1) | What is a computer? | Öğr. El. Notları |
2) | What is the internet? | Öğr. El. Notları |
3) | What are the types of viruses? | Öğr. El Notları |
4) | What are the types of viruses? | Öğr. El Notları |
5) | What are encryption methods? | Öğr. El. Notları |
6) | What are encryption methods? | Öğr. El. Notları |
7) | What are encryption methods? | Öğr. El. Notları |
8) | Midterm Exam | |
9) | What are encryption methods? | Öğr. El. Notları |
10) | What are the types of firewalls? | |
11) | What are the types of firewalls? | |
12) | What are the types of firewalls? | |
13) | What are the types of firewalls? | |
14) | Current attack events |
Course Notes / Textbooks: | Öğr. El. Notları |
References: | Öğr. El. Notları |
Course Learning Outcomes | 1 |
2 |
3 |
4 |
5 |
6 |
||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | 2 | 2 | 2 | 2 | 2 | 2 | ||||||
2) Can install and manage software and hardware required for end user security. | 1 | 1 | 1 | 1 | 1 | 1 | ||||||
3) Can follow current security products. | 1 | 1 | 1 | 1 | 1 | 1 | ||||||
4) It can manage both software and people in the environment against cyber attack incidents. | 1 | 1 | 1 | 1 | 1 | 1 | ||||||
5) Installs the basic software and hardware of the computer. | 1 | 1 | 1 | 1 | 1 | 1 | ||||||
6) Installs and manages open source operating system and computer networks software. | 1 | 1 | 1 | 1 | 1 | 1 | ||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | 1 | 1 | 1 | 1 | 1 | 1 | ||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | 1 | 1 | 1 | 1 | 1 | 1 | ||||||
9) Creates, manages and organizes space on cloud platforms. | 1 | 1 | 1 | 1 | 1 | 1 | ||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | 1 | 1 | 1 | 1 | 1 | 1 | ||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | 1 | 1 | 1 | 1 | 1 | 1 | ||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. | 1 | 1 | 1 | 1 | 2 | 1 |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | 1 |
2) | Can install and manage software and hardware required for end user security. | 1 |
3) | Can follow current security products. | |
4) | It can manage both software and people in the environment against cyber attack incidents. | 2 |
5) | Installs the basic software and hardware of the computer. | 1 |
6) | Installs and manages open source operating system and computer networks software. | 1 |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | 1 |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | 1 |
9) | Creates, manages and organizes space on cloud platforms. | 1 |
10) | Firewall software also enables, manages and regulates the installation of hardware. | 1 |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | 1 |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. | 1 |
Semester Requirements | Number of Activities | Level of Contribution |
Homework Assignments | 1 | % 0 |
Midterms | 1 | % 40 |
Final | 1 | % 60 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 40 | |
PERCENTAGE OF FINAL WORK | % 60 | |
total | % 100 |
Activities | Number of Activities | Workload |
Course Hours | 16 | 32 |
Application | 16 | 16 |
Study Hours Out of Class | 16 | 36 |
Midterms | 1 | 1 |
Final | 1 | 1 |
Total Workload | 86 |