Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | BGT207 | ||||
Course Name: | Firewall Solutions | ||||
Semester: | Fall | ||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | Compulsory Courses | ||||
Course Level: |
|
||||
Mode of Delivery: | Face to face | ||||
Course Coordinator: | Öğr. Gör. RAMAZAN ŞEN | ||||
Course Lecturer(s): |
|
||||
Course Assistants: |
Course Objectives: | With this course, it is aimed to learn about the threats that may occur in computer and network systems, the risks posed by these threats and the measures that can be taken against these threats. |
Course Content: | Secure wall types, attack detection and blocking systems, session interference in TCP/IP communication, Bypassing Firewall, IDS/IPS and content filtering systems, Web filtering solutions, FTP, DNS, HTTP, HTTPS, etc. protocols, vulnerability scanning and discovery systems, security of wireless networks, VPN and encryption technologies, firefox plugins used for security purposes, features of UTM firewall technologies and UTM application control |
The students who have succeeded in this course;
1) Knows how to bypass IDS/IPS and content filtering systems. 2) Knows VPN and encryption technologies. 3) Knows web filtering solutions. 4) Knows UTM security technologies. 5) Knows how to interfere with a session in TCP/IP communication. 6) Detects and blocks security attacks. |
Week | Subject | Related Preparation |
1) | Secure wall and types | Weekly Presentations |
2) | Attack detection and prevention systems | Weekly Presentations |
3) | Session interference in TCP/IP communication | Weekly Presentations |
4) | Bypass firewall, IDS/IPS, and content filtering systems | Haftalık Sunumlar |
5) | Web filtering solutions | Weekly Presentations |
6) | FTP, DNS, HTTP, HTTPS, etc. protocols | Weekly Presentations |
7) | Vulnerability scanning and discovery systems | Weekly Presentations |
8) | Midterm Exam | |
9) | Security of wireless networks | Weekly Presentations |
10) | VPN and encryption technologies | Weekly Presentations |
11) | VPN and encryption technologies | Weekly Presentations |
12) | UTM technologies | Weekly Presentations |
13) | Features of UTM firewall technologies | Weekly Presentations |
14) | UTM application control | Weekly Presentations |
15) | Final Exam |
Course Notes / Textbooks: | |
References: | Cemal Taner, Herkes için Siber Güvenlik, Abaküs Kitap, 2017 |
Course Learning Outcomes | 1 |
2 |
3 |
4 |
5 |
6 |
||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | 1 |
2) | Can install and manage software and hardware required for end user security. | 1 |
3) | Can follow current security products. | 1 |
4) | It can manage both software and people in the environment against cyber attack incidents. | 1 |
5) | Installs the basic software and hardware of the computer. | 2 |
6) | Installs and manages open source operating system and computer networks software. | 1 |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | 1 |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | 1 |
9) | Creates, manages and organizes space on cloud platforms. | 1 |
10) | Firewall software also enables, manages and regulates the installation of hardware. | 1 |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | 1 |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. | 1 |
Semester Requirements | Number of Activities | Level of Contribution |
Midterms | 1 | % 40 |
Final | 1 | % 60 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 40 | |
PERCENTAGE OF FINAL WORK | % 60 | |
total | % 100 |
Activities | Number of Activities | Preparation for the Activity | Spent for the Activity Itself | Completing the Activity Requirements | Workload | ||
Course Hours | 14 | 2 | 28 | ||||
Laboratory | 14 | 2 | 28 | ||||
Application | 2 | 2 | 4 | ||||
Midterms | 1 | 25 | 25 | ||||
Final | 1 | 30 | 30 | ||||
Total Workload | 115 |