Nevşehir Hacı Bektaş Veli University Course Catalogue

Information Of Programmes

VOCATIONAL SCHOOL OF NEVŞEHİR / BİL116 - COMPUTER PROGRAMMING

Code: BİL116 Course Title: CYBER SECURITY Theoretical+Practice: 2+0 ECTS: 3
Year/Semester of Study 1 / Spring Semester
Level of Course Short Cycle Degree Programme
Type of Course Optional
Department COMPUTER PROGRAMMING
Pre-requisities and Co-requisites None
Mode of Delivery Face to Face
Teaching Period 14 Weeks
Name of Lecturer MEHMET KIRTAY (mehmet@nevsehir.edu.tr)
Name of Lecturer(s) MEHMET KIRTAY,
Language of Instruction Turkish
Work Placement(s) None
Objectives of the Course
To provide students with basic concepts in the field of information security and cyber security; to provide them with information on topics such as network security, malware, encryption, security protocols and ethical hacking; to provide them with the ability to design secure information systems and to implement basic defense mechanisms against cyber threats.

Learning Outcomes PO MME
The students who succeeded in this course:
LO-1 defines types of cyber attacks PO-1 Has basic, current, and practical knowledge related to his/her profession
PO-3 Follows current developments and practices for his/her profession and uses them effectively
PO-7 Takes responsibility as a team member to solve unforeseen and complex problems encountered in applications related to his/her field
Examination
LO-2 Defines encryption, authentication and secure communication protocols PO-1 Has basic, current, and practical knowledge related to his/her profession
PO-3 Follows current developments and practices for his/her profession and uses them effectively
PO-5 Has the ability to independently evaluate professional problems and issues with an analytical and critical approach and to propose solutions
Examination
LO-3 Detects potential threats on the network using network security tools and techniques and implements defensive strategies against attacks PO-1 Has basic, current, and practical knowledge related to his/her profession
PO-3 Follows current developments and practices for his/her profession and uses them effectively
PO-5 Has the ability to independently evaluate professional problems and issues with an analytical and critical approach and to propose solutions
PO-7 Takes responsibility as a team member to solve unforeseen and complex problems encountered in applications related to his/her field
PO-9 Has social, scientific, cultural, and ethical values in the stages of data collection, implementation, and dissemination of results related to his/her field
Examination
PO: Programme Outcomes
MME:Method of measurement & Evaluation

Course Contents
To have knowledge about cybercrime, to provide network structures and security, to recognize and configure firewalls. Manage network devices. Securing servers.
Weekly Course Content
Week Subject Learning Activities and Teaching Methods
1 Introduction to Cyber Security and Basic Concepts Lecture, Q&A, Presentation
2 Types of Cyber Threats and Malicious Software (Malware) Lecture, Q&A, Presentation
3 Malware: Virus, Worm, Rootkit and Botnets Lecture, Q&A, Presentation
4 Authentication and Access Control Methods Lecture, Q&A, Presentation
5 Data Security and Encryption Methods Lecture, Q&A, Presentation
6 Cyber Crimes, Hacktivism and Social Engineering Lecture, Q&A, Presentation
7 Network Monitoring, Traffic Analysis and Firewalls Lecture, Q&A, Presentation
8 mid-term exam
9 Intrusion Detection and Prevention Systems Lecture, Q&A, Presentation
10 Scan and Vulnerability Detection Password cracking tools Lecture, Q&A, Presentation
11 Penetration Testing and Security Tests Lecture, Q&A, Presentation
12 WEb Security - Attack and Detection Methods Lecture, Q&A, Presentation
13 Firewalls and Intrusion Detection Systems Lecture, Q&A, Presentation
14 Cybersecurity Management and Applications Lecture, Q&A, Presentation
15 The Legal Aspects of Cyber Security and Forensic Informatics Lecture, Q&A, Presentation
16 final exam
Recommend Course Book / Supplementary Book/Reading
1 Altuntaş, A., & YAYIN, K. (2021). Kali Linux (Vol. 159). KODLAB YAYIN DAĞITIM YAZILIM LTD. ŞTİ..
2 Altınkaynak, M. (2018). Uygulamalı Siber Güvenlik ve Hacking. Abaküs Yayınları, İstanbul.
Required Course instruments and materials
Projection, computer.

Assessment Methods
Type of Assessment Week Hours Weight(%)
mid-term exam 40
Other assessment methods
1.Oral Examination
2.Quiz
3.Laboratory exam
4.Presentation
5.Report
6.Workshop
7.Performance Project
8.Term Paper
9.Project
final exam 60

Student Work Load
Type of Work Weekly Hours Number of Weeks Work Load
Weekly Course Hours (Theoretical+Practice) 2 14 28
Outside Class
       a) Reading 2 8 16
       b) Search in internet/Library 2 8 16
       c) Performance Project 0
       d) Prepare a workshop/Presentation/Report 0
       e) Term paper/Project 0
Oral Examination 0
Quiz 0
Laboratory exam 0
Own study for mid-term exam 2 7 14
mid-term exam 1 1 1
Own study for final exam 2 7 14
final exam 1 1 1
0
0
Total work load; 90