Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | BGT109 | ||||
Course Name: | Cyber Security | ||||
Semester: | Fall | ||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | Compulsory Courses | ||||
Course Level: |
|
||||
Mode of Delivery: | Face to face | ||||
Course Coordinator: | Öğr. Gör. RAMAZAN ŞEN | ||||
Course Lecturer(s): | Ramazan ŞEN | ||||
Course Assistants: |
Course Objectives: | To ensure the security of the devices that students use in their personal and corporate lives while completing or after completing their education and to prevent their personal data from being acquired by others. |
Course Content: | History of the computer, history of the internet, types of viruses, methods of protection from viruses, methods that should be applied to reduce the possibility of contracting viruses, ensuring computer security, attitudes and behaviors that should be adopted against viruses that settle on personal or corporate devices. Ensuring network security, mastering cyber warfare and cyber crimes, following current cyber events. |
The students who have succeeded in this course;
1) Learns the history of computer and internet. 2) Have knowledge of virus (malware) concepts 3) Learns self-defense methods against viruses. 4) Have a grasp of the concepts of cyber war and cybercrime. 5) Knows the basic encryption structures. 6) Learns to defend personal wireless networks. |
Week | Subject | Related Preparation |
1) | History of Computer | |
2) | History of the Internet | |
3) | Basic concepts | |
4) | Viruses | |
5) | Viruses | |
6) | Computer Security | |
7) | Individual and Corporate Security Behaviors | |
8) | Midterm Exam | |
9) | Wireless Network Security | |
9) | Wireless Network Security | |
10) | Basic Encryption Structures | |
11) | Basic Encryption Structures | |
12) | Cyber Warfare | |
13) | Cybercrime | |
14) | Siber Güvenlikte Güncel Konular | |
15) | Final Exam |
Course Notes / Textbooks: | Uygulamalı Siber Güvenlik ve Hacking: Sanal dünya, gerçek tehditler (2017) Mustafa Altınkaynak, Abaküs Kitap |
References: | Uygulamalı Siber Güvenlik ve Hacking: Sanal dünya, gerçek tehditler (2017) Mustafa Altınkaynak, Abaküs Kitap |
Course Learning Outcomes | 1 |
2 |
3 |
4 |
5 |
6 |
||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | 3 | 1 | 1 | 1 | 1 | 1 | ||||||
2) Can install and manage software and hardware required for end user security. | 1 | 1 | 1 | 1 | 1 | 1 | ||||||
3) Can follow current security products. | 1 | 1 | 1 | 1 | 1 | 2 | ||||||
4) It can manage both software and people in the environment against cyber attack incidents. | 1 | 1 | 2 | 1 | 1 | 1 | ||||||
5) Installs the basic software and hardware of the computer. | 1 | 1 | 2 | 1 | 1 | 1 | ||||||
6) Installs and manages open source operating system and computer networks software. | 1 | 1 | 1 | 1 | 1 | 1 | ||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | 1 | 1 | 1 | 1 | 1 | 1 | ||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | 1 | 1 | 1 | 1 | 1 | 1 | ||||||
9) Creates, manages and organizes space on cloud platforms. | 1 | 1 | 1 | 1 | 1 | 1 | ||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | 1 | 1 | 1 | 1 | 1 | 1 | ||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | 1 | 1 | 1 | 1 | 1 | 1 | ||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. | 1 | 1 | 1 | 1 | 1 | 1 |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | 1 |
2) | Can install and manage software and hardware required for end user security. | 1 |
3) | Can follow current security products. | 1 |
4) | It can manage both software and people in the environment against cyber attack incidents. | 1 |
5) | Installs the basic software and hardware of the computer. | 1 |
6) | Installs and manages open source operating system and computer networks software. | 1 |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | 1 |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | 1 |
9) | Creates, manages and organizes space on cloud platforms. | 1 |
10) | Firewall software also enables, manages and regulates the installation of hardware. | |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | 1 |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. | 1 |
Semester Requirements | Number of Activities | Level of Contribution |
Midterms | 1 | % 40 |
Final | 1 | % 60 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 40 | |
PERCENTAGE OF FINAL WORK | % 60 | |
total | % 100 |
Activities | Number of Activities | Preparation for the Activity | Spent for the Activity Itself | Completing the Activity Requirements | Workload | ||
Course Hours | 14 | 1 | 14 | ||||
Laboratory | 14 | 1 | 14 | ||||
Application | 3 | 3 | 9 | ||||
Homework Assignments | 2 | 2 | 4 | ||||
Midterms | 1 | 20 | 20 | ||||
Final | 1 | 30 | 30 | ||||
Total Workload | 91 |