|
|||||
| Year/Semester of Study | 1 / Spring Semester | ||||
| Level of Course | Short Cycle Degree Programme | ||||
| Type of Course | Optional | ||||
| Department | COMPUTER PROGRAMMING | ||||
| Pre-requisities and Co-requisites | None | ||||
| Mode of Delivery | Face to Face | ||||
| Teaching Period | 14 Weeks | ||||
| Name of Lecturer | MEHMET KIRTAY (mehmet@nevsehir.edu.tr) | ||||
| Name of Lecturer(s) | MEHMET KIRTAY, | ||||
| Language of Instruction | Turkish | ||||
| Work Placement(s) | None | ||||
| Objectives of the Course | |||||
| The aim of this course is to provide students with the basic concepts of information security and cyber security; to provide them with knowledge of topics such as network security, malware, encryption methods, security protocols, and ethical hacking; and to develop the ability to design secure information systems and implement basic defense mechanisms against cyber threats. | |||||
| Learning Outcomes | PO | MME | |
| The students who succeeded in this course: | |||
| LO-1 | Can define types of cyber attacks |
PO-1 Has basic, current, and practical knowledge related to his/her profession PO-3 Follows current developments and practices for his/her profession and uses them effectively PO-7 Takes responsibility as a team member to solve unforeseen and complex problems encountered in applications related to his/her field |
Examination |
| LO-2 | Can defines encryption, authentication and secure communication protocols |
PO-1 Has basic, current, and practical knowledge related to his/her profession PO-3 Follows current developments and practices for his/her profession and uses them effectively PO-5 Has the ability to independently evaluate professional problems and issues with an analytical and critical approach and to propose solutions |
Examination |
| LO-3 | Can detect potential threats on the network using network security tools and techniques. |
PO-1 Has basic, current, and practical knowledge related to his/her profession PO-3 Follows current developments and practices for his/her profession and uses them effectively PO-5 Has the ability to independently evaluate professional problems and issues with an analytical and critical approach and to propose solutions PO-7 Takes responsibility as a team member to solve unforeseen and complex problems encountered in applications related to his/her field PO-9 Has social, scientific, cultural, and ethical values in the stages of data collection, implementation, and dissemination of results related to his/her field |
Examination |
| PO: Programme Outcomes MME:Method of measurement & Evaluation |
|||
| Course Contents | ||
| To have knowledge about cybercrime, to provide network structures and security, to recognize and configure firewalls. Manage network devices. Securing servers. | ||
| Weekly Course Content | ||
| Week | Subject | Learning Activities and Teaching Methods |
| 1 | Introduction to Cyber Security and Basic Concepts | Lecture, Q&A, Presentation |
| 2 | Types of Cyber Threats and Malicious Software (Malware) | Lecture, Q&A, Presentation |
| 3 | Malware: Virus, Worm, Rootkit and Botnets | Lecture, Q&A, Presentation |
| 4 | Authentication and Access Control Methods | Lecture, Q&A, Presentation |
| 5 | Data Security and Encryption Methods | Lecture, Q&A, Presentation |
| 6 | Cyber Crimes, Hacktivism and Social Engineering | Lecture, Q&A, Presentation |
| 7 | Network Monitoring, Traffic Analysis and Firewalls | Lecture, Q&A, Presentation |
| 8 | mid-term exam | |
| 9 | Intrusion Detection and Prevention Systems | Lecture, Q&A, Presentation |
| 10 | Scan and Vulnerability Detection Password cracking tools | Lecture, Q&A, Presentation |
| 11 | Penetration Testing and Security Tests | Lecture, Q&A, Presentation |
| 12 | WEb Security - Attack and Detection Methods | Lecture, Q&A, Presentation |
| 13 | Firewalls and Intrusion Detection Systems | Lecture, Q&A, Presentation |
| 14 | Cybersecurity Management and Applications | Lecture, Q&A, Presentation |
| 15 | The Legal Aspects of Cyber Security and Forensic Informatics | Lecture, Q&A, Presentation |
| 16 | final exam | |
| Recommend Course Book / Supplementary Book/Reading | ||
| 1 | Altuntaş, A., & YAYIN, K. (2021). Kali Linux (Vol. 159). KODLAB YAYIN DAĞITIM YAZILIM LTD. ŞTİ.. | |
| 2 | Altınkaynak, M. (2018). Uygulamalı Siber Güvenlik ve Hacking. Abaküs Yayınları, İstanbul. | |
| Required Course instruments and materials | ||
| Projection, computer. | ||
| Assessment Methods | |||
| Type of Assessment | Week | Hours | Weight(%) |
| mid-term exam | 40 | ||
| Other assessment methods | |||
| 1.Oral Examination | |||
| 2.Quiz | |||
| 3.Laboratory exam | |||
| 4.Presentation | |||
| 5.Report | |||
| 6.Workshop | |||
| 7.Performance Project | |||
| 8.Term Paper | |||
| 9.Project | |||
| final exam | 60 | ||
| Student Work Load | |||
| Type of Work | Weekly Hours | Number of Weeks | Work Load |
| Weekly Course Hours (Theoretical+Practice) | 2 | 14 | 28 |
| Outside Class | |||
| a) Reading | 2 | 8 | 16 |
| b) Search in internet/Library | 2 | 8 | 16 |
| c) Performance Project | 0 | ||
| d) Prepare a workshop/Presentation/Report | 0 | ||
| e) Term paper/Project | 0 | ||
| Oral Examination | 0 | ||
| Quiz | 0 | ||
| Laboratory exam | 0 | ||
| Own study for mid-term exam | 2 | 7 | 14 |
| mid-term exam | 1 | 1 | 1 |
| Own study for final exam | 2 | 7 | 14 |
| final exam | 1 | 1 | 1 |
| 0 | |||
| 0 | |||
| Total work load; | 90 | ||