|
|||||
Year/Semester of Study | 1 / Spring Semester | ||||
Level of Course | Short Cycle Degree Programme | ||||
Type of Course | Optional | ||||
Department | COMPUTER PROGRAMMING | ||||
Pre-requisities and Co-requisites | None | ||||
Mode of Delivery | Face to Face | ||||
Teaching Period | 14 Weeks | ||||
Name of Lecturer | MEHMET KIRTAY (mehmet@nevsehir.edu.tr) | ||||
Name of Lecturer(s) | MEHMET KIRTAY, | ||||
Language of Instruction | Turkish | ||||
Work Placement(s) | None | ||||
Objectives of the Course | |||||
o have knowledge about how to ensure network security, to provide a theoretical background for safe structures, reliable operating systems, to have knowledge about programming analysis and methods of providing secure services. |
Learning Outcomes | PO | MME | |
The students who succeeded in this course: | |||
LO-1 | Know the concepts of cybercrime and ethics |
PO- |
Examination |
LO-2 | Knows the safe structures that can be used in network design |
PO- |
Examination |
LO-3 | Have information about encryption methods |
PO- |
|
PO: Programme Outcomes MME:Method of measurement & Evaluation |
Course Contents | ||
To have knowledge about cybercrime, to provide network structures and security, to recognize and configure firewalls. Manage network devices. Securing servers. | ||
Weekly Course Content | ||
Week | Subject | Learning Activities and Teaching Methods |
1 | Information Security, What is Cyber Security? | Lecture, Question & Answer |
2 | Encryption methods. Authentication of identity and information content. | Lecture, Question & Answer |
3 | Security in wireless networks | Lecture, Question & Answer |
4 | Firewalls and configuration | Lecture Laboratory Applications Question answer |
5 | Antivirus software and intrusion detection systems. DDoS blocking systems. | Lecture, Question & Answer |
6 | Hidden channels and tunneling in TCP / IP | Lecture, Question & Answer |
7 | Virtual Private Networks (VPN) and related security methods | Lecture, Question & Answer |
8 | mid-term exam | |
9 | Cyber Attack Methods- Information Collection Tools | Lecture Laboratory Applications Question answer |
10 | Scan and Vulnerability Detection Password cracking tools | Lecture Laboratory Applications Question answer |
11 | Penetration tests | Lecture Laboratory Applications Question answer |
12 | WEb Security - Attack and Detection Methods | Lecture Laboratory Applications Question answer |
13 | Secure network architecture. Hardware security and protection | Lecture Laboratory Applications Question answer |
14 | Security in web applications | Lecture, Question & Answer |
15 | The Legal Aspects of Cyber Security and Forensic Informatics | Lecture, Question & Answer |
16 | final exam | |
Recommend Course Book / Supplementary Book/Reading | ||
1 | Altuntaş, A., & YAYIN, K. (2021). Kali Linux (Vol. 159). KODLAB YAYIN DAĞITIM YAZILIM LTD. ŞTİ.. | |
2 | Altınkaynak, M. (2018). Uygulamalı Siber Güvenlik ve Hacking. Abaküs Yayınları, İstanbul. | |
Required Course instruments and materials | ||
Projection, computer. |
Assessment Methods | |||
Type of Assessment | Week | Hours | Weight(%) |
mid-term exam | 40 | ||
Other assessment methods | |||
1.Oral Examination | |||
2.Quiz | |||
3.Laboratory exam | |||
4.Presentation | |||
5.Report | |||
6.Workshop | |||
7.Performance Project | |||
8.Term Paper | |||
9.Project | |||
final exam | 60 |
Student Work Load | |||
Type of Work | Weekly Hours | Number of Weeks | Work Load |
Weekly Course Hours (Theoretical+Practice) | 2 | 14 | 28 |
Outside Class | |||
a) Reading | 2 | 5 | 10 |
b) Search in internet/Library | 4 | 5 | 20 |
c) Performance Project | 2 | 5 | 10 |
d) Prepare a workshop/Presentation/Report | 2 | 4 | 8 |
e) Term paper/Project | 0 | ||
Oral Examination | 0 | ||
Quiz | 0 | ||
Laboratory exam | 0 | ||
Own study for mid-term exam | 1 | 4 | 4 |
mid-term exam | 1 | 1 | 1 |
Own study for final exam | 2 | 4 | 8 |
final exam | 1 | 1 | 1 |
0 | |||
0 | |||
Total work load; | 90 |