E-commerce and Marketing (Evening Education) | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | UNI215 | ||||
Course Name: | IT Security | ||||
Semester: |
Spring Fall |
||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | University Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | E-Learning | ||||
Course Coordinator: | Öğr. Gör. RAMAZAN ŞEN | ||||
Course Lecturer(s): | Ramazan ŞEN | ||||
Course Assistants: |
Course Objectives: | To ensure the security of the devices that students use in their personal and corporate lives while completing or completing their education and to prevent their personal data from being captured by others. |
Course Content: | The history of the computer, the history of the internet, types of viruses, methods of protection from viruses, methods to be applied to reduce the possibility of catching viruses, ensuring computer security, attitudes and behaviors against viruses that settle on personal or corporate devices. Network security, cyber warfare and cybercrime issues, monitoring of current cyber events. |
The students who have succeeded in this course;
1) Learns the history of computer and internet. 2) Have knowledge of virus (malware) concepts. 3) Learns self-defense methods against viruses. 4) Have a grasp of the concepts of cyber war and cybercrime. 5) Knows the basic encryption structures 6) Learns to defend personal wireless networks. 7) Knows current cyber events. |
Week | Subject | Related Preparation |
1) | History of the Computer | Lecturer Notes. |
2) | History of the Internet | Lecturer Notes. |
3) | Basic concepts | Lecturer Notes. |
4) | Viruses | Lecturer Notes. |
5) | Viruses | Lecturer Notes. |
6) | Computer Security | Lecturer Notes. |
7) | Individual Security Behaviors | Lecturer Notes. |
8) | Midterm Exam | |
9) | Corporate Security Behaviors | Lecturer Notes. |
10) | Basic Cryptographic Structures | Lecturer Notes. |
11) | Basic Cryptographic Structures | Lecturer Notes. |
12) | Basic Cryptographic Structures | Lecturer Notes. |
13) | Cyber Wars | Lecturer Notes. |
14) | Cyber Crimes | Lecturer Notes. |
15) | Current Topics in Cyber Security | Lecturer Notes. |
15) | Final Exam |
Course Notes / Textbooks: | Lecturer's notes |
References: | Öğretim üyesi notları |
Course Learning Outcomes | 1 |
2 |
3 |
4 |
5 |
6 |
7 |
---|---|---|---|---|---|---|---|
Program Outcomes | |||||||
1) To have the ability to understand and apply basic concepts in the field of e-commerce and marketing | |||||||
1) Having detailed technical and professional application skills in subjects such as mobile marketing, digital media marketing, social media usage, digital analysis and measurement. | |||||||
2) Having the ability to catch up with the speed of the digital age and keep their information up to date |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | To have the ability to understand and apply basic concepts in the field of e-commerce and marketing | |
1) | Having detailed technical and professional application skills in subjects such as mobile marketing, digital media marketing, social media usage, digital analysis and measurement. | |
2) | Having the ability to catch up with the speed of the digital age and keep their information up to date |
Semester Requirements | Number of Activities | Level of Contribution |
Midterms | 1 | % 40 |
Final | 1 | % 60 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 40 | |
PERCENTAGE OF FINAL WORK | % 60 | |
total | % 100 |
Activities | Number of Activities | Workload |
Course Hours | 14 | 42 |
Study Hours Out of Class | 14 | 14 |
Midterms | 4 | 31 |
Final | 4 | 31 |
Total Workload | 118 |