|
|||||
Year/Semester of Study | 1 / Spring Semester | ||||
Level of Course | Short Cycle Degree Programme | ||||
Type of Course | Optional | ||||
Department | COMPUTER PROGRAMMING | ||||
Pre-requisities and Co-requisites | None | ||||
Mode of Delivery | Face to Face | ||||
Teaching Period | 14 Weeks | ||||
Name of Lecturer | MEHMET KIRTAY (mehmet@nevsehir.edu.tr) | ||||
Name of Lecturer(s) | MEHMET KIRTAY, | ||||
Language of Instruction | Turkish | ||||
Work Placement(s) | None | ||||
Objectives of the Course | |||||
To provide students with basic concepts in the field of information security and cyber security; to provide them with information on topics such as network security, malware, encryption, security protocols and ethical hacking; to provide them with the ability to design secure information systems and to implement basic defense mechanisms against cyber threats. |
Learning Outcomes | PO | MME | |
The students who succeeded in this course: | |||
LO-1 | defines types of cyber attacks |
PO-1 Has basic, current, and practical knowledge related to his/her profession PO-3 Follows current developments and practices for his/her profession and uses them effectively PO-7 Takes responsibility as a team member to solve unforeseen and complex problems encountered in applications related to his/her field |
Examination |
LO-2 | Defines encryption, authentication and secure communication protocols |
PO-1 Has basic, current, and practical knowledge related to his/her profession PO-3 Follows current developments and practices for his/her profession and uses them effectively PO-5 Has the ability to independently evaluate professional problems and issues with an analytical and critical approach and to propose solutions |
Examination |
LO-3 | Detects potential threats on the network using network security tools and techniques and implements defensive strategies against attacks |
PO-1 Has basic, current, and practical knowledge related to his/her profession PO-3 Follows current developments and practices for his/her profession and uses them effectively PO-5 Has the ability to independently evaluate professional problems and issues with an analytical and critical approach and to propose solutions PO-7 Takes responsibility as a team member to solve unforeseen and complex problems encountered in applications related to his/her field PO-9 Has social, scientific, cultural, and ethical values in the stages of data collection, implementation, and dissemination of results related to his/her field |
Examination |
PO: Programme Outcomes MME:Method of measurement & Evaluation |
Course Contents | ||
To have knowledge about cybercrime, to provide network structures and security, to recognize and configure firewalls. Manage network devices. Securing servers. | ||
Weekly Course Content | ||
Week | Subject | Learning Activities and Teaching Methods |
1 | Introduction to Cyber Security and Basic Concepts | Lecture, Q&A, Presentation |
2 | Types of Cyber Threats and Malicious Software (Malware) | Lecture, Q&A, Presentation |
3 | Malware: Virus, Worm, Rootkit and Botnets | Lecture, Q&A, Presentation |
4 | Authentication and Access Control Methods | Lecture, Q&A, Presentation |
5 | Data Security and Encryption Methods | Lecture, Q&A, Presentation |
6 | Cyber Crimes, Hacktivism and Social Engineering | Lecture, Q&A, Presentation |
7 | Network Monitoring, Traffic Analysis and Firewalls | Lecture, Q&A, Presentation |
8 | mid-term exam | |
9 | Intrusion Detection and Prevention Systems | Lecture, Q&A, Presentation |
10 | Scan and Vulnerability Detection Password cracking tools | Lecture, Q&A, Presentation |
11 | Penetration Testing and Security Tests | Lecture, Q&A, Presentation |
12 | WEb Security - Attack and Detection Methods | Lecture, Q&A, Presentation |
13 | Firewalls and Intrusion Detection Systems | Lecture, Q&A, Presentation |
14 | Cybersecurity Management and Applications | Lecture, Q&A, Presentation |
15 | The Legal Aspects of Cyber Security and Forensic Informatics | Lecture, Q&A, Presentation |
16 | final exam | |
Recommend Course Book / Supplementary Book/Reading | ||
1 | Altuntaş, A., & YAYIN, K. (2021). Kali Linux (Vol. 159). KODLAB YAYIN DAĞITIM YAZILIM LTD. ŞTİ.. | |
2 | Altınkaynak, M. (2018). Uygulamalı Siber Güvenlik ve Hacking. Abaküs Yayınları, İstanbul. | |
Required Course instruments and materials | ||
Projection, computer. |
Assessment Methods | |||
Type of Assessment | Week | Hours | Weight(%) |
mid-term exam | 40 | ||
Other assessment methods | |||
1.Oral Examination | |||
2.Quiz | |||
3.Laboratory exam | |||
4.Presentation | |||
5.Report | |||
6.Workshop | |||
7.Performance Project | |||
8.Term Paper | |||
9.Project | |||
final exam | 60 |
Student Work Load | |||
Type of Work | Weekly Hours | Number of Weeks | Work Load |
Weekly Course Hours (Theoretical+Practice) | 2 | 14 | 28 |
Outside Class | |||
a) Reading | 2 | 8 | 16 |
b) Search in internet/Library | 2 | 8 | 16 |
c) Performance Project | 0 | ||
d) Prepare a workshop/Presentation/Report | 0 | ||
e) Term paper/Project | 0 | ||
Oral Examination | 0 | ||
Quiz | 0 | ||
Laboratory exam | 0 | ||
Own study for mid-term exam | 2 | 7 | 14 |
mid-term exam | 1 | 1 | 1 |
Own study for final exam | 2 | 7 | 14 |
final exam | 1 | 1 | 1 |
0 | |||
0 | |||
Total work load; | 90 |