Skip to main content

Course Description

CourseCodeSemesterT+P (Hour)CreditECTS
CYBER SECURITY-Fall Semester3+035
Course Program
Prerequisites Courses
Recommended Elective Courses
Language of CourseTurkish
Course LevelShort Cycle (Associate's Degree)
Course TypeElective
Course CoordinatorLect. Beyza KOYULMUŞ
Name of Lecturer(s)Lect. Ömer Olcay KARATAŞ
Assistant(s)
AimAims to inform and develop information systems, network security, computer security, software security and security vulnerabilities of computer networks against security threats encountered in computer networks, to understand the threats and measures to be taken against cyber attacks.
Course ContentThis course contains; Introduction to the Course and General Information about the Course Objectives, Introduction to Security,Basic Security Concepts,Introduction to Cryptology,Types of Encryption,Network security; firewalls, intrusion detection and prevention systems,Network security; firewalls, intrusion detection and prevention systems-2,Secure Software Development,Security of Web Applications,Infiltration Trials,Investigation of Malicious Software,Network Security,Security Technologies and Security Models,Project Presentations,Project Presentations.
Dersin Öğrenme KazanımlarıTeaching MethodsAssessment Methods
Explains basic security concepts. 10, 12, 14, 16, 19, 3, 5, 6, 8, 9A, E, F
Defines the concepts of cryptology. 12, 2A, E, F, G
Ağ güvenliği; güvenlik duvarları, saldırı tespit ve önleme sistemlerini bilir.14, 6, 9A, E
Develop secure software. 14, 6, 8, 9A, E, F
Analyzes malicious software.14, 6, 9A, E, F
Uses security technologies and security models. 14, 6, 8, 9A, E
Teaching Methods:10: Discussion Method, 12: Problem Solving Method, 14: Self Study Method, 16: Question - Answer Technique, 19: Brainstorming Technique, 2: Project Based Learning Model, 3: Problem Baded Learning Model, 5: Cooperative Learning, 6: Experiential Learning, 8: Flipped Classroom Learning, 9: Lecture Method
Assessment Methods:A: Traditional Written Exam, E: Homework, F: Project Task, G: Quiz

Course Outline

OrderSubjectsPreliminary Work
1Introduction to the Course and General Information about the Course Objectives, Introduction to Security
2Basic Security Concepts
3Introduction to Cryptology
4Types of Encryption
5Network security; firewalls, intrusion detection and prevention systems
6Network security; firewalls, intrusion detection and prevention systems-2
7Secure Software Development
8Security of Web Applications
9Infiltration Trials
10Investigation of Malicious Software
11Network Security
12Security Technologies and Security Models
13Project Presentations
14Project Presentations
Resources

Course Contribution to Program Qualifications

Course Contribution to Program Qualifications
NoProgram QualificationContribution Level
12345
1
Has the background in algorithms, programming, and application development in software engineering projects; and has the ability to use them together in business.
X
2
Chooses and uses the proper solution methods and special techniques for programming purpose.
X
3
Uses modern techniques and tools for programming applications.
X
4
Works effectively individually and in teams.
X
5
Implements and follows test cases of developed software and applications.
X
6
Has the awareness in workplace practices, worker health, environmental and workplace safety, professional and ethical responsibility, and legal issues about programming practices.
7
Reaches information, and surveys resources for this purpose.
X
8
Aware of the necessity of life-long learning; follows technological advances and renews him/herself.
X
9
Communicates, oral and written, effectively using modern tools.
X
10
Aware of universal and social effects of software solutions and practices; develops new software tools for solving universal problems and social advance.
X
11
Keeps attention in clean and readable code design.
X
12
Considers and follows user centered design principles.

Assessment Methods

Contribution LevelAbsolute Evaluation
Rate of Midterm Exam to Success 40
Rate of Final Exam to Success 60
Total 100
ECTS / Workload Table
ActivitiesNumber ofDuration(Hour)Total Workload(Hour)
Course Hours000
Guided Problem Solving000
Resolution of Homework Problems and Submission as a Report000
Term Project000
Presentation of Project / Seminar000
Quiz000
Midterm Exam000
General Exam000
Performance Task, Maintenance Plan000
Total Workload(Hour)0
Dersin AKTS Kredisi = Toplam İş Yükü (Saat)/30*=(0/30)0
ECTS of the course: 30 hours of work is counted as 1 ECTS credit.

Detail Informations of the Course

Course Description

CourseCodeSemesterT+P (Hour)CreditECTS
CYBER SECURITY-Fall Semester3+035
Course Program
Prerequisites Courses
Recommended Elective Courses
Language of CourseTurkish
Course LevelShort Cycle (Associate's Degree)
Course TypeElective
Course CoordinatorLect. Beyza KOYULMUŞ
Name of Lecturer(s)Lect. Ömer Olcay KARATAŞ
Assistant(s)
AimAims to inform and develop information systems, network security, computer security, software security and security vulnerabilities of computer networks against security threats encountered in computer networks, to understand the threats and measures to be taken against cyber attacks.
Course ContentThis course contains; Introduction to the Course and General Information about the Course Objectives, Introduction to Security,Basic Security Concepts,Introduction to Cryptology,Types of Encryption,Network security; firewalls, intrusion detection and prevention systems,Network security; firewalls, intrusion detection and prevention systems-2,Secure Software Development,Security of Web Applications,Infiltration Trials,Investigation of Malicious Software,Network Security,Security Technologies and Security Models,Project Presentations,Project Presentations.
Dersin Öğrenme KazanımlarıTeaching MethodsAssessment Methods
Explains basic security concepts. 10, 12, 14, 16, 19, 3, 5, 6, 8, 9A, E, F
Defines the concepts of cryptology. 12, 2A, E, F, G
Ağ güvenliği; güvenlik duvarları, saldırı tespit ve önleme sistemlerini bilir.14, 6, 9A, E
Develop secure software. 14, 6, 8, 9A, E, F
Analyzes malicious software.14, 6, 9A, E, F
Uses security technologies and security models. 14, 6, 8, 9A, E
Teaching Methods:10: Discussion Method, 12: Problem Solving Method, 14: Self Study Method, 16: Question - Answer Technique, 19: Brainstorming Technique, 2: Project Based Learning Model, 3: Problem Baded Learning Model, 5: Cooperative Learning, 6: Experiential Learning, 8: Flipped Classroom Learning, 9: Lecture Method
Assessment Methods:A: Traditional Written Exam, E: Homework, F: Project Task, G: Quiz

Course Outline

OrderSubjectsPreliminary Work
1Introduction to the Course and General Information about the Course Objectives, Introduction to Security
2Basic Security Concepts
3Introduction to Cryptology
4Types of Encryption
5Network security; firewalls, intrusion detection and prevention systems
6Network security; firewalls, intrusion detection and prevention systems-2
7Secure Software Development
8Security of Web Applications
9Infiltration Trials
10Investigation of Malicious Software
11Network Security
12Security Technologies and Security Models
13Project Presentations
14Project Presentations
Resources

Course Contribution to Program Qualifications

Course Contribution to Program Qualifications
NoProgram QualificationContribution Level
12345
1
Has the background in algorithms, programming, and application development in software engineering projects; and has the ability to use them together in business.
X
2
Chooses and uses the proper solution methods and special techniques for programming purpose.
X
3
Uses modern techniques and tools for programming applications.
X
4
Works effectively individually and in teams.
X
5
Implements and follows test cases of developed software and applications.
X
6
Has the awareness in workplace practices, worker health, environmental and workplace safety, professional and ethical responsibility, and legal issues about programming practices.
7
Reaches information, and surveys resources for this purpose.
X
8
Aware of the necessity of life-long learning; follows technological advances and renews him/herself.
X
9
Communicates, oral and written, effectively using modern tools.
X
10
Aware of universal and social effects of software solutions and practices; develops new software tools for solving universal problems and social advance.
X
11
Keeps attention in clean and readable code design.
X
12
Considers and follows user centered design principles.

Assessment Methods

Contribution LevelAbsolute Evaluation
Rate of Midterm Exam to Success 40
Rate of Final Exam to Success 60
Total 100

Numerical Data

Student Success

Ekleme Tarihi: 05/11/2023 - 20:23Son Güncelleme Tarihi: 05/11/2023 - 20:25