Computer Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | UNI215 | ||||
Course Name: | IT Security | ||||
Semester: |
Fall Spring |
||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | University Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | E-Learning | ||||
Course Coordinator: | Öğr. Gör. RAMAZAN ŞEN | ||||
Course Lecturer(s): | Ramazan ŞEN | ||||
Course Assistants: |
Course Objectives: | To ensure the security of the devices that students use in their personal and corporate lives while completing or completing their education and to prevent their personal data from being captured by others. |
Course Content: | The history of the computer, the history of the internet, types of viruses, methods of protection from viruses, methods to be applied to reduce the possibility of catching viruses, ensuring computer security, attitudes and behaviors against viruses that settle on personal or corporate devices. Network security, cyber warfare and cybercrime issues, monitoring of current cyber events. |
The students who have succeeded in this course;
1) Learns the history of computer and internet. 2) Have knowledge of virus (malware) concepts. 3) Learns self-defense methods against viruses. 4) Have a grasp of the concepts of cyber war and cybercrime. 5) Knows the basic encryption structures 6) Learns to defend personal wireless networks. 7) Knows current cyber events. |
Week | Subject | Related Preparation |
1) | History of the Computer | Lecturer Notes. |
2) | History of the Internet | Lecturer Notes. |
3) | Basic concepts | Lecturer Notes. |
4) | Viruses | Lecturer Notes. |
5) | Viruses | Lecturer Notes. |
6) | Computer Security | Lecturer Notes. |
7) | Individual Security Behaviors | Lecturer Notes. |
8) | Midterm Exam | |
9) | Corporate Security Behaviors | Lecturer Notes. |
10) | Basic Cryptographic Structures | Lecturer Notes. |
11) | Basic Cryptographic Structures | Lecturer Notes. |
12) | Basic Cryptographic Structures | Lecturer Notes. |
13) | Cyber Wars | Lecturer Notes. |
14) | Cyber Crimes | Lecturer Notes. |
15) | Current Topics in Cyber Security | Lecturer Notes. |
15) | Final Exam |
Course Notes / Textbooks: | Lecturer's notes |
References: | Öğretim üyesi notları |
Course Learning Outcomes | 1 |
2 |
3 |
4 |
5 |
6 |
7 |
|||
---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||
1) To possess the ability to comprehend fundamental concepts in the field of computer technologies. | ||||||||||
2) To possess the ability to analyze and model problems in the field of computer technologies, and to determine and define appropriate software requirements for their solutions. | ||||||||||
3) To possess the ability to comprehend professional topics in a foreign language. | ||||||||||
4) To possess the capability to perform software installation, testing, and acceptance procedures. | ||||||||||
5) To possess the ability to carry out the setup and administration of computer networks, as well as utilize network operating systems. | ||||||||||
6) To possess the skill of conducting maintenance and repairs on computer hardware. | ||||||||||
7) To have awareness and responsibility regarding professional, legal, ethical, and social issues in the field of computer technologies. | ||||||||||
8) To possess the capability to plan, design, and develop computer and network software. | ||||||||||
9) To possess the ability to design and program for web development. | ||||||||||
10) To be competent in applying knowledge of database management, querying, and design to practical applications, and to be capable of developing database applications. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | To possess the ability to comprehend fundamental concepts in the field of computer technologies. | |
2) | To possess the ability to analyze and model problems in the field of computer technologies, and to determine and define appropriate software requirements for their solutions. | |
3) | To possess the ability to comprehend professional topics in a foreign language. | |
4) | To possess the capability to perform software installation, testing, and acceptance procedures. | |
5) | To possess the ability to carry out the setup and administration of computer networks, as well as utilize network operating systems. | |
6) | To possess the skill of conducting maintenance and repairs on computer hardware. | |
7) | To have awareness and responsibility regarding professional, legal, ethical, and social issues in the field of computer technologies. | |
8) | To possess the capability to plan, design, and develop computer and network software. | |
9) | To possess the ability to design and program for web development. | |
10) | To be competent in applying knowledge of database management, querying, and design to practical applications, and to be capable of developing database applications. |
Semester Requirements | Number of Activities | Level of Contribution |
Midterms | 1 | % 40 |
Final | 1 | % 60 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 40 | |
PERCENTAGE OF FINAL WORK | % 60 | |
total | % 100 |
Activities | Number of Activities | Workload |
Course Hours | 14 | 42 |
Study Hours Out of Class | 14 | 14 |
Midterms | 4 | 31 |
Final | 4 | 31 |
Total Workload | 118 |