Course Detail
Course Description
Course | Code | Semester | T+P (Hour) | Credit | ECTS |
---|
INTRODUCTION to INFORMATION SECURITY | COE4115374 | Fall Semester | 3+0 | 3 | 6 |
Course Program | Cuma 09:00-09:45 Cuma 10:00-10:45 Cuma 11:00-11:45 |
Prerequisites Courses | |
Recommended Elective Courses | |
Language of Course | English |
Course Level | First Cycle (Bachelor's Degree) |
Course Type | Elective |
Course Coordinator | Prof.Dr. Selim AKYOKUŞ |
Name of Lecturer(s) | Lect.Dr. Arzu KİLİTCİ CALAYIR |
Assistant(s) | Teaching assistant |
Aim | Understand the players in the cybersecurity world and the motivation of cyber criminals and cybersecurity specialists. Learn to identify security attacks, symptoms, processes, and countermeasures. Learn foundational knowledge in various security domains. Build skills in security management, controls, protection, and mitigation technologies. Learn security laws, ethics, and how to develop security policies. Learn the roles of different cybersecurity professionals and career options. |
Course Content | This course contains; Cybersecurity World and Its need.,Attacks, Concepts and Techniques.,Protecting Data, Privacy, and Organization.,Cybersecurity Threats, Vulnerabilities and Attacks.,The Art of Protecting Secrets.,The Art of Ensuring Integrity.,Protecting Cyber Security Domain.,Midterm,The Five Nines Concept.,Information Security Framework.,Security Life Cycles.,Physical and Environmental Security,Disaster Recovery and Business Continuity Management.,Review of all topics covered. ,Project Presentations. |
Dersin Öğrenme Kazanımları | Teaching Methods | Assessment Methods |
1. Describe how the principles of confidentiality, integrity, and availability as they relate to data states and cybersecurity countermeasures. | 10, 12, 17, 2, 3, 9 | A, E, F |
2. Describe the tactics, techniques and procedures used by cyber criminals. | 10, 12, 17, 2, 3, 9 | A, E, F |
3. Describe how technologies, products and procedures are used to protect confidentiality and ensure integrity. | 10, 12, 17, 2, 3, 9 | A, E, F |
4. Explain how cybersecurity professionals use technologies, processes and procedures to defend all components of the network. | 10, 12, 17, 2, 3, 9 | A, E, F |
5. Explain the purpose of laws related to cybersecurity. | 10, 12, 17, 2, 3, 9 | A, E, F |
6. Describe the ISO/IEC27001 international standard for information security: Information Security Management System | 10, 12, 17, 2, 3, 9 | A, E, F |
Teaching Methods: | 10: Discussion Method, 12: Problem Solving Method, 17: Experimental Technique, 2: Project Based Learning Model, 3: Problem Baded Learning Model, 9: Lecture Method |
Assessment Methods: | A: Traditional Written Exam, E: Homework, F: Project Task |
Course Outline
Order | Subjects | Preliminary Work |
---|
1 | Cybersecurity World and Its need. | NetAcad C1 Ch.1 |
2 | Attacks, Concepts and Techniques. | NetAcad C1 Ch.2 |
3 | Protecting Data, Privacy, and Organization. | NetAcad C1 Ch.3 |
4 | Cybersecurity Threats, Vulnerabilities and Attacks. | NetAcad C1 Ch.2 & Ch. 3 |
5 | The Art of Protecting Secrets. | NetAcad C2 Ch.4 |
6 | The Art of Ensuring Integrity. | NetAcad C2 Ch.5 |
7 | Protecting Cyber Security Domain. | NetAcad C2 Ch.7 |
8 | Midterm | All topics till Week 7 |
9 | The Five Nines Concept. | NetAcad C2 Ch.6 |
10 | Information Security Framework. | Textbook Ch.2 & ch.3 |
11 | Security Life Cycles. | Textbook Ch.4 |
12 | Physical and Environmental Security | Textbook Ch.7 |
13 | Disaster Recovery and Business Continuity Management. | Textbook Ch.8. |
14 | Review of all topics covered. | NetAcad & Textbook |
15 | Project Presentations | Lecture notes, the textbook and NetAcad. |
Resources |
1. Cisco NetAcad Introduction to Cybersecurity, Cisco NetAcad Cyber Essentials v1.1, and
2. Information Security Management Principles 3rd edition ISBN-10 : 1780175183 |
Lecture presentations. |
Course Contribution to Program Qualifications
Course Contribution to Program Qualifications |
No | Program Qualification | Contribution Level |
1 | 2 | 3 | 4 | 5 |
1 | 1. An ability to apply knowledge of mathematics, science, and engineering | | | | | X |
2 | 2. An ability to identify, formulate, and solve engineering problems | | | | | X |
3 | 3. An ability to design a system, component, or process to meet desired needs within realistic constraints such as economic, environmental, social, political, ethical, health and safety, manufacturability, and sustainability | | | | | X |
4 | 4. An ability to use the techniques, skills, and modern engineering tools necessary for engineering practice | | | | | X |
5 | 5. An ability to design and conduct experiments, as well as to analyze and interpret data | | | | X | |
6 | 6. An ability to function on multidisciplinary teams | X | | | | |
7 | 7. An ability to communicate effectively | | X | | | |
8 | 8. A recognition of the need for, and an ability to engage in life-long learning | | | X | | |
9 | 9. An understanding of professional and ethical responsibility | | | | | X |
10 | 10. A knowledge of contemporary issues | | | | | |
11 | 11. The broad education necessary to understand the impact of engineering solutions in a global, economic, environmental, and societal context | | | | | X |
Assessment Methods
Contribution Level | Absolute Evaluation |
Rate of Midterm Exam to Success | | 30 |
Rate of Final Exam to Success | | 70 |
Total | | 100 |
ECTS / Workload Table |
Activities | Number of | Duration(Hour) | Total Workload(Hour) |
Course Hours | 14 | 3 | 42 |
Guided Problem Solving | 0 | 0 | 0 |
Resolution of Homework Problems and Submission as a Report | 10 | 5 | 50 |
Term Project | 0 | 0 | 0 |
Presentation of Project / Seminar | 2 | 20 | 40 |
Quiz | 0 | 0 | 0 |
Midterm Exam | 1 | 12 | 12 |
General Exam | 1 | 24 | 24 |
Performance Task, Maintenance Plan | 0 | 0 | 0 |
Total Workload(Hour) | 168 |
Dersin AKTS Kredisi = Toplam İş Yükü (Saat)/30*=(168/30) | 6 |
ECTS of the course: 30 hours of work is counted as 1 ECTS credit. |
Detail Informations of the Course
Course Description
Course | Code | Semester | T+P (Hour) | Credit | ECTS |
---|
INTRODUCTION to INFORMATION SECURITY | COE4115374 | Fall Semester | 3+0 | 3 | 6 |
Course Program | Cuma 09:00-09:45 Cuma 10:00-10:45 Cuma 11:00-11:45 |
Prerequisites Courses | |
Recommended Elective Courses | |
Language of Course | English |
Course Level | First Cycle (Bachelor's Degree) |
Course Type | Elective |
Course Coordinator | Prof.Dr. Selim AKYOKUŞ |
Name of Lecturer(s) | Lect.Dr. Arzu KİLİTCİ CALAYIR |
Assistant(s) | Teaching assistant |
Aim | Understand the players in the cybersecurity world and the motivation of cyber criminals and cybersecurity specialists. Learn to identify security attacks, symptoms, processes, and countermeasures. Learn foundational knowledge in various security domains. Build skills in security management, controls, protection, and mitigation technologies. Learn security laws, ethics, and how to develop security policies. Learn the roles of different cybersecurity professionals and career options. |
Course Content | This course contains; Cybersecurity World and Its need.,Attacks, Concepts and Techniques.,Protecting Data, Privacy, and Organization.,Cybersecurity Threats, Vulnerabilities and Attacks.,The Art of Protecting Secrets.,The Art of Ensuring Integrity.,Protecting Cyber Security Domain.,Midterm,The Five Nines Concept.,Information Security Framework.,Security Life Cycles.,Physical and Environmental Security,Disaster Recovery and Business Continuity Management.,Review of all topics covered. ,Project Presentations. |
Dersin Öğrenme Kazanımları | Teaching Methods | Assessment Methods |
1. Describe how the principles of confidentiality, integrity, and availability as they relate to data states and cybersecurity countermeasures. | 10, 12, 17, 2, 3, 9 | A, E, F |
2. Describe the tactics, techniques and procedures used by cyber criminals. | 10, 12, 17, 2, 3, 9 | A, E, F |
3. Describe how technologies, products and procedures are used to protect confidentiality and ensure integrity. | 10, 12, 17, 2, 3, 9 | A, E, F |
4. Explain how cybersecurity professionals use technologies, processes and procedures to defend all components of the network. | 10, 12, 17, 2, 3, 9 | A, E, F |
5. Explain the purpose of laws related to cybersecurity. | 10, 12, 17, 2, 3, 9 | A, E, F |
6. Describe the ISO/IEC27001 international standard for information security: Information Security Management System | 10, 12, 17, 2, 3, 9 | A, E, F |
Teaching Methods: | 10: Discussion Method, 12: Problem Solving Method, 17: Experimental Technique, 2: Project Based Learning Model, 3: Problem Baded Learning Model, 9: Lecture Method |
Assessment Methods: | A: Traditional Written Exam, E: Homework, F: Project Task |
Course Outline
Order | Subjects | Preliminary Work |
---|
1 | Cybersecurity World and Its need. | NetAcad C1 Ch.1 |
2 | Attacks, Concepts and Techniques. | NetAcad C1 Ch.2 |
3 | Protecting Data, Privacy, and Organization. | NetAcad C1 Ch.3 |
4 | Cybersecurity Threats, Vulnerabilities and Attacks. | NetAcad C1 Ch.2 & Ch. 3 |
5 | The Art of Protecting Secrets. | NetAcad C2 Ch.4 |
6 | The Art of Ensuring Integrity. | NetAcad C2 Ch.5 |
7 | Protecting Cyber Security Domain. | NetAcad C2 Ch.7 |
8 | Midterm | All topics till Week 7 |
9 | The Five Nines Concept. | NetAcad C2 Ch.6 |
10 | Information Security Framework. | Textbook Ch.2 & ch.3 |
11 | Security Life Cycles. | Textbook Ch.4 |
12 | Physical and Environmental Security | Textbook Ch.7 |
13 | Disaster Recovery and Business Continuity Management. | Textbook Ch.8. |
14 | Review of all topics covered. | NetAcad & Textbook |
15 | Project Presentations | Lecture notes, the textbook and NetAcad. |
Resources |
1. Cisco NetAcad Introduction to Cybersecurity, Cisco NetAcad Cyber Essentials v1.1, and
2. Information Security Management Principles 3rd edition ISBN-10 : 1780175183 |
Lecture presentations. |
Course Contribution to Program Qualifications
Course Contribution to Program Qualifications |
No | Program Qualification | Contribution Level |
1 | 2 | 3 | 4 | 5 |
1 | 1. An ability to apply knowledge of mathematics, science, and engineering | | | | | X |
2 | 2. An ability to identify, formulate, and solve engineering problems | | | | | X |
3 | 3. An ability to design a system, component, or process to meet desired needs within realistic constraints such as economic, environmental, social, political, ethical, health and safety, manufacturability, and sustainability | | | | | X |
4 | 4. An ability to use the techniques, skills, and modern engineering tools necessary for engineering practice | | | | | X |
5 | 5. An ability to design and conduct experiments, as well as to analyze and interpret data | | | | X | |
6 | 6. An ability to function on multidisciplinary teams | X | | | | |
7 | 7. An ability to communicate effectively | | X | | | |
8 | 8. A recognition of the need for, and an ability to engage in life-long learning | | | X | | |
9 | 9. An understanding of professional and ethical responsibility | | | | | X |
10 | 10. A knowledge of contemporary issues | | | | | |
11 | 11. The broad education necessary to understand the impact of engineering solutions in a global, economic, environmental, and societal context | | | | | X |
Assessment Methods
Contribution Level | Absolute Evaluation |
Rate of Midterm Exam to Success | | 30 |
Rate of Final Exam to Success | | 70 |
Total | | 100 |
Numerical Data
Ekleme Tarihi: 09/10/2023 - 10:50Son Güncelleme Tarihi: 09/10/2023 - 10:51
×- A-Z Programs
- Undergraduate
- Graduate
- Academic Calendar
- Double Major & Minor Programs
- Erasmus
- Prospective Students
- Registration
- Re-Enrolment
- Fees
- Directorate of Registrar’s Office
- FAQ
- Accommodation
- Scholarships
- Lateral and Vertical Transfer
- Summer School
- Preparation
- Transportation