Skip to main content

Course Detail

Course Description

CourseCodeSemesterT+P (Hour)CreditECTS
INTRODUCTION to INFORMATION SECURITYCOE4115374Fall Semester3+036
Course Program

Cuma 09:00-09:45

Cuma 10:00-10:45

Cuma 11:00-11:45

Prerequisites Courses
Recommended Elective Courses
Language of CourseEnglish
Course LevelFirst Cycle (Bachelor's Degree)
Course TypeElective
Course CoordinatorProf.Dr. Selim AKYOKUŞ
Name of Lecturer(s)Lect.Dr. Arzu KİLİTCİ CALAYIR
Assistant(s)Teaching assistant
AimUnderstand the players in the cybersecurity world and the motivation of cyber criminals and cybersecurity specialists. Learn to identify security attacks, symptoms, processes, and countermeasures. Learn foundational knowledge in various security domains. Build skills in security management, controls, protection, and mitigation technologies. Learn security laws, ethics, and how to develop security policies. Learn the roles of different cybersecurity professionals and career options.
Course ContentThis course contains; Cybersecurity World and Its need.,Attacks, Concepts and Techniques.,Protecting Data, Privacy, and Organization.,Cybersecurity Threats, Vulnerabilities and Attacks.,The Art of Protecting Secrets.,The Art of Ensuring Integrity.,Protecting Cyber Security Domain.,Midterm,The Five Nines Concept.,Information Security Framework.,Security Life Cycles.,Physical and Environmental Security,Disaster Recovery and Business Continuity Management.,Review of all topics covered. ,Project Presentations.
Dersin Öğrenme KazanımlarıTeaching MethodsAssessment Methods
1. Describe how the principles of confidentiality, integrity, and availability as they relate to data states and cybersecurity countermeasures.10, 12, 17, 2, 3, 9A, E, F
2. Describe the tactics, techniques and procedures used by cyber criminals. 10, 12, 17, 2, 3, 9A, E, F
3. Describe how technologies, products and procedures are used to protect confidentiality and ensure integrity.10, 12, 17, 2, 3, 9A, E, F
4. Explain how cybersecurity professionals use technologies, processes and procedures to defend all components of the network.10, 12, 17, 2, 3, 9A, E, F
5. Explain the purpose of laws related to cybersecurity. 10, 12, 17, 2, 3, 9A, E, F
6. Describe the ISO/IEC27001 international standard for information security: Information Security Management System10, 12, 17, 2, 3, 9A, E, F
Teaching Methods:10: Discussion Method, 12: Problem Solving Method, 17: Experimental Technique, 2: Project Based Learning Model, 3: Problem Baded Learning Model, 9: Lecture Method
Assessment Methods:A: Traditional Written Exam, E: Homework, F: Project Task

Course Outline

OrderSubjectsPreliminary Work
1Cybersecurity World and Its need.NetAcad C1 Ch.1
2Attacks, Concepts and Techniques.NetAcad C1 Ch.2
3Protecting Data, Privacy, and Organization.NetAcad C1 Ch.3
4Cybersecurity Threats, Vulnerabilities and Attacks.NetAcad C1 Ch.2 & Ch. 3
5The Art of Protecting Secrets.NetAcad C2 Ch.4
6The Art of Ensuring Integrity.NetAcad C2 Ch.5
7Protecting Cyber Security Domain.NetAcad C2 Ch.7
8MidtermAll topics till Week 7
9The Five Nines Concept.NetAcad C2 Ch.6
10Information Security Framework.Textbook Ch.2 & ch.3
11Security Life Cycles.Textbook Ch.4
12Physical and Environmental SecurityTextbook Ch.7
13Disaster Recovery and Business Continuity Management.Textbook Ch.8.
14Review of all topics covered. NetAcad & Textbook
15Project PresentationsLecture notes, the textbook and NetAcad.
Resources
1. Cisco NetAcad Introduction to Cybersecurity, Cisco NetAcad Cyber Essentials v1.1, and 2. Information Security Management Principles 3rd edition ISBN-10 ‏ : ‎ 1780175183
Lecture presentations.

Course Contribution to Program Qualifications

Course Contribution to Program Qualifications
NoProgram QualificationContribution Level
12345
1
1. An ability to apply knowledge of mathematics, science, and engineering
X
2
2. An ability to identify, formulate, and solve engineering problems
X
3
3. An ability to design a system, component, or process to meet desired needs within realistic constraints such as economic, environmental, social, political, ethical, health and safety, manufacturability, and sustainability
X
4
4. An ability to use the techniques, skills, and modern engineering tools necessary for engineering practice
X
5
5. An ability to design and conduct experiments, as well as to analyze and interpret data
X
6
6. An ability to function on multidisciplinary teams
X
7
7. An ability to communicate effectively
X
8
8. A recognition of the need for, and an ability to engage in life-long learning
X
9
9. An understanding of professional and ethical responsibility
X
10
10. A knowledge of contemporary issues
11
11. The broad education necessary to understand the impact of engineering solutions in a global, economic, environmental, and societal context
X

Assessment Methods

Contribution LevelAbsolute Evaluation
Rate of Midterm Exam to Success 30
Rate of Final Exam to Success 70
Total 100
ECTS / Workload Table
ActivitiesNumber ofDuration(Hour)Total Workload(Hour)
Course Hours14342
Guided Problem Solving000
Resolution of Homework Problems and Submission as a Report10550
Term Project000
Presentation of Project / Seminar22040
Quiz000
Midterm Exam11212
General Exam12424
Performance Task, Maintenance Plan000
Total Workload(Hour)168
Dersin AKTS Kredisi = Toplam İş Yükü (Saat)/30*=(168/30)6
ECTS of the course: 30 hours of work is counted as 1 ECTS credit.

Detail Informations of the Course

Course Description

CourseCodeSemesterT+P (Hour)CreditECTS
INTRODUCTION to INFORMATION SECURITYCOE4115374Fall Semester3+036
Course Program

Cuma 09:00-09:45

Cuma 10:00-10:45

Cuma 11:00-11:45

Prerequisites Courses
Recommended Elective Courses
Language of CourseEnglish
Course LevelFirst Cycle (Bachelor's Degree)
Course TypeElective
Course CoordinatorProf.Dr. Selim AKYOKUŞ
Name of Lecturer(s)Lect.Dr. Arzu KİLİTCİ CALAYIR
Assistant(s)Teaching assistant
AimUnderstand the players in the cybersecurity world and the motivation of cyber criminals and cybersecurity specialists. Learn to identify security attacks, symptoms, processes, and countermeasures. Learn foundational knowledge in various security domains. Build skills in security management, controls, protection, and mitigation technologies. Learn security laws, ethics, and how to develop security policies. Learn the roles of different cybersecurity professionals and career options.
Course ContentThis course contains; Cybersecurity World and Its need.,Attacks, Concepts and Techniques.,Protecting Data, Privacy, and Organization.,Cybersecurity Threats, Vulnerabilities and Attacks.,The Art of Protecting Secrets.,The Art of Ensuring Integrity.,Protecting Cyber Security Domain.,Midterm,The Five Nines Concept.,Information Security Framework.,Security Life Cycles.,Physical and Environmental Security,Disaster Recovery and Business Continuity Management.,Review of all topics covered. ,Project Presentations.
Dersin Öğrenme KazanımlarıTeaching MethodsAssessment Methods
1. Describe how the principles of confidentiality, integrity, and availability as they relate to data states and cybersecurity countermeasures.10, 12, 17, 2, 3, 9A, E, F
2. Describe the tactics, techniques and procedures used by cyber criminals. 10, 12, 17, 2, 3, 9A, E, F
3. Describe how technologies, products and procedures are used to protect confidentiality and ensure integrity.10, 12, 17, 2, 3, 9A, E, F
4. Explain how cybersecurity professionals use technologies, processes and procedures to defend all components of the network.10, 12, 17, 2, 3, 9A, E, F
5. Explain the purpose of laws related to cybersecurity. 10, 12, 17, 2, 3, 9A, E, F
6. Describe the ISO/IEC27001 international standard for information security: Information Security Management System10, 12, 17, 2, 3, 9A, E, F
Teaching Methods:10: Discussion Method, 12: Problem Solving Method, 17: Experimental Technique, 2: Project Based Learning Model, 3: Problem Baded Learning Model, 9: Lecture Method
Assessment Methods:A: Traditional Written Exam, E: Homework, F: Project Task

Course Outline

OrderSubjectsPreliminary Work
1Cybersecurity World and Its need.NetAcad C1 Ch.1
2Attacks, Concepts and Techniques.NetAcad C1 Ch.2
3Protecting Data, Privacy, and Organization.NetAcad C1 Ch.3
4Cybersecurity Threats, Vulnerabilities and Attacks.NetAcad C1 Ch.2 & Ch. 3
5The Art of Protecting Secrets.NetAcad C2 Ch.4
6The Art of Ensuring Integrity.NetAcad C2 Ch.5
7Protecting Cyber Security Domain.NetAcad C2 Ch.7
8MidtermAll topics till Week 7
9The Five Nines Concept.NetAcad C2 Ch.6
10Information Security Framework.Textbook Ch.2 & ch.3
11Security Life Cycles.Textbook Ch.4
12Physical and Environmental SecurityTextbook Ch.7
13Disaster Recovery and Business Continuity Management.Textbook Ch.8.
14Review of all topics covered. NetAcad & Textbook
15Project PresentationsLecture notes, the textbook and NetAcad.
Resources
1. Cisco NetAcad Introduction to Cybersecurity, Cisco NetAcad Cyber Essentials v1.1, and 2. Information Security Management Principles 3rd edition ISBN-10 ‏ : ‎ 1780175183
Lecture presentations.

Course Contribution to Program Qualifications

Course Contribution to Program Qualifications
NoProgram QualificationContribution Level
12345
1
1. An ability to apply knowledge of mathematics, science, and engineering
X
2
2. An ability to identify, formulate, and solve engineering problems
X
3
3. An ability to design a system, component, or process to meet desired needs within realistic constraints such as economic, environmental, social, political, ethical, health and safety, manufacturability, and sustainability
X
4
4. An ability to use the techniques, skills, and modern engineering tools necessary for engineering practice
X
5
5. An ability to design and conduct experiments, as well as to analyze and interpret data
X
6
6. An ability to function on multidisciplinary teams
X
7
7. An ability to communicate effectively
X
8
8. A recognition of the need for, and an ability to engage in life-long learning
X
9
9. An understanding of professional and ethical responsibility
X
10
10. A knowledge of contemporary issues
11
11. The broad education necessary to understand the impact of engineering solutions in a global, economic, environmental, and societal context
X

Assessment Methods

Contribution LevelAbsolute Evaluation
Rate of Midterm Exam to Success 30
Rate of Final Exam to Success 70
Total 100

Numerical Data

Ekleme Tarihi: 09/10/2023 - 10:50Son Güncelleme Tarihi: 09/10/2023 - 10:51