Course Description
Course | Code | Semester | T+P (Hour) | Credit | ECTS |
---|
CYBER SECURITY | BPR2266360 | Spring Semester | 3+0 | 3 | 5 |
Prerequisites Courses | |
Recommended Elective Courses | |
Language of Course | Turkish |
Course Level | Short Cycle (Associate's Degree) |
Course Type | Elective |
Course Coordinator | Lect. Beyza KOYULMUŞ |
Name of Lecturer(s) | Lect. Beyza KOYULMUŞ |
Assistant(s) | |
Aim | Aims to inform and develop information systems, network security, computer security, software security and security vulnerabilities of computer networks against security threats encountered in computer networks, to understand the threats and measures to be taken against cyber attacks. |
Course Content | This course contains; Introduction to the Course and General Information about the Course Objectives, Introduction to Security,Basic Security Concepts,Introduction to Cryptology,Types of Encryption,Network security; firewalls, intrusion detection and prevention systems,Network security; firewalls, intrusion detection and prevention systems-2,Secure Software Development,Security of Web Applications,Infiltration Trials,Investigation of Malicious Software,Network Security,Security Technologies and Security Models,Project Presentations,Project Presentations. |
Dersin Öğrenme Kazanımları | Teaching Methods | Assessment Methods |
Explains basic security concepts. | 10, 12, 14, 16, 19, 3, 5, 6, 8, 9 | A, E, F |
Defines the concepts of cryptology. | 12, 2 | A, E, F, G |
Ağ güvenliği; güvenlik duvarları, saldırı tespit ve önleme sistemlerini bilir. | 14, 6, 9 | A, E |
Develop secure software. | 14, 6, 8, 9 | A, E, F |
Analyzes malicious software. | 14, 6, 9 | A, E, F |
Uses security technologies and security models. | 14, 6, 8, 9 | A, E |
Teaching Methods: | 10: Discussion Method, 12: Problem Solving Method, 14: Self Study Method, 16: Question - Answer Technique, 19: Brainstorming Technique, 2: Project Based Learning Model, 3: Problem Baded Learning Model, 5: Cooperative Learning, 6: Experiential Learning, 8: Flipped Classroom Learning, 9: Lecture Method |
Assessment Methods: | A: Traditional Written Exam, E: Homework, F: Project Task, G: Quiz |
Course Outline
Order | Subjects | Preliminary Work |
---|
1 | Introduction to the Course and General Information about the Course Objectives, Introduction to Security | |
2 | Basic Security Concepts | |
3 | Introduction to Cryptology | |
4 | Types of Encryption | |
5 | Network security; firewalls, intrusion detection and prevention systems | |
6 | Network security; firewalls, intrusion detection and prevention systems-2 | |
7 | Secure Software Development | |
8 | Security of Web Applications | |
9 | Infiltration Trials | |
10 | Investigation of Malicious Software | |
11 | Network Security | |
12 | Security Technologies and Security Models | |
13 | Project Presentations | |
14 | Project Presentations | |
Course Contribution to Program Qualifications
Course Contribution to Program Qualifications |
No | Program Qualification | Contribution Level |
1 | 2 | 3 | 4 | 5 |
1 | Has the background in algorithms, programming, and application development in software engineering projects; and has the ability to use them together in business. | | | X | | |
2 | Chooses and uses the proper solution methods and special techniques for programming purpose. | | | | X | |
3 | Uses modern techniques and tools for programming applications. | | | X | | |
4 | Works effectively individually and in teams. | | | | X | |
5 | Implements and follows test cases of developed software and applications. | | | | | X |
6 | Has the awareness in workplace practices, worker health, environmental and workplace safety, professional and ethical responsibility, and legal issues about programming practices. | | | | | |
7 | Reaches information, and surveys resources for this purpose. | | | X | | |
8 | Aware of the necessity of life-long learning; follows technological advances and renews him/herself. | | | | X | |
9 | Communicates, oral and written, effectively using modern tools. | | | X | | |
10 | Aware of universal and social effects of software solutions and practices; develops new software tools for solving universal problems and social advance. | | | X | | |
11 | Keeps attention in clean and readable code design. | | X | | | |
12 | Considers and follows user centered design principles. | | | | | |
Assessment Methods
Contribution Level | Absolute Evaluation |
Rate of Midterm Exam to Success | | 40 |
Rate of Final Exam to Success | | 60 |
Total | | 100 |
ECTS / Workload Table |
Activities | Number of | Duration(Hour) | Total Workload(Hour) |
Course Hours | 0 | 0 | 0 |
Guided Problem Solving | 0 | 0 | 0 |
Resolution of Homework Problems and Submission as a Report | 0 | 0 | 0 |
Term Project | 0 | 0 | 0 |
Presentation of Project / Seminar | 0 | 0 | 0 |
Quiz | 0 | 0 | 0 |
Midterm Exam | 0 | 0 | 0 |
General Exam | 0 | 0 | 0 |
Performance Task, Maintenance Plan | 0 | 0 | 0 |
Total Workload(Hour) | 0 |
Dersin AKTS Kredisi = Toplam İş Yükü (Saat)/30*=(0/30) | 0 |
ECTS of the course: 30 hours of work is counted as 1 ECTS credit. |
Detail Informations of the Course
Course Description
Course | Code | Semester | T+P (Hour) | Credit | ECTS |
---|
CYBER SECURITY | BPR2266360 | Spring Semester | 3+0 | 3 | 5 |
Prerequisites Courses | |
Recommended Elective Courses | |
Language of Course | Turkish |
Course Level | Short Cycle (Associate's Degree) |
Course Type | Elective |
Course Coordinator | Lect. Beyza KOYULMUŞ |
Name of Lecturer(s) | Lect. Beyza KOYULMUŞ |
Assistant(s) | |
Aim | Aims to inform and develop information systems, network security, computer security, software security and security vulnerabilities of computer networks against security threats encountered in computer networks, to understand the threats and measures to be taken against cyber attacks. |
Course Content | This course contains; Introduction to the Course and General Information about the Course Objectives, Introduction to Security,Basic Security Concepts,Introduction to Cryptology,Types of Encryption,Network security; firewalls, intrusion detection and prevention systems,Network security; firewalls, intrusion detection and prevention systems-2,Secure Software Development,Security of Web Applications,Infiltration Trials,Investigation of Malicious Software,Network Security,Security Technologies and Security Models,Project Presentations,Project Presentations. |
Dersin Öğrenme Kazanımları | Teaching Methods | Assessment Methods |
Explains basic security concepts. | 10, 12, 14, 16, 19, 3, 5, 6, 8, 9 | A, E, F |
Defines the concepts of cryptology. | 12, 2 | A, E, F, G |
Ağ güvenliği; güvenlik duvarları, saldırı tespit ve önleme sistemlerini bilir. | 14, 6, 9 | A, E |
Develop secure software. | 14, 6, 8, 9 | A, E, F |
Analyzes malicious software. | 14, 6, 9 | A, E, F |
Uses security technologies and security models. | 14, 6, 8, 9 | A, E |
Teaching Methods: | 10: Discussion Method, 12: Problem Solving Method, 14: Self Study Method, 16: Question - Answer Technique, 19: Brainstorming Technique, 2: Project Based Learning Model, 3: Problem Baded Learning Model, 5: Cooperative Learning, 6: Experiential Learning, 8: Flipped Classroom Learning, 9: Lecture Method |
Assessment Methods: | A: Traditional Written Exam, E: Homework, F: Project Task, G: Quiz |
Course Outline
Order | Subjects | Preliminary Work |
---|
1 | Introduction to the Course and General Information about the Course Objectives, Introduction to Security | |
2 | Basic Security Concepts | |
3 | Introduction to Cryptology | |
4 | Types of Encryption | |
5 | Network security; firewalls, intrusion detection and prevention systems | |
6 | Network security; firewalls, intrusion detection and prevention systems-2 | |
7 | Secure Software Development | |
8 | Security of Web Applications | |
9 | Infiltration Trials | |
10 | Investigation of Malicious Software | |
11 | Network Security | |
12 | Security Technologies and Security Models | |
13 | Project Presentations | |
14 | Project Presentations | |
Course Contribution to Program Qualifications
Course Contribution to Program Qualifications |
No | Program Qualification | Contribution Level |
1 | 2 | 3 | 4 | 5 |
1 | Has the background in algorithms, programming, and application development in software engineering projects; and has the ability to use them together in business. | | | X | | |
2 | Chooses and uses the proper solution methods and special techniques for programming purpose. | | | | X | |
3 | Uses modern techniques and tools for programming applications. | | | X | | |
4 | Works effectively individually and in teams. | | | | X | |
5 | Implements and follows test cases of developed software and applications. | | | | | X |
6 | Has the awareness in workplace practices, worker health, environmental and workplace safety, professional and ethical responsibility, and legal issues about programming practices. | | | | | |
7 | Reaches information, and surveys resources for this purpose. | | | X | | |
8 | Aware of the necessity of life-long learning; follows technological advances and renews him/herself. | | | | X | |
9 | Communicates, oral and written, effectively using modern tools. | | | X | | |
10 | Aware of universal and social effects of software solutions and practices; develops new software tools for solving universal problems and social advance. | | | X | | |
11 | Keeps attention in clean and readable code design. | | X | | | |
12 | Considers and follows user centered design principles. | | | | | |
Assessment Methods
Contribution Level | Absolute Evaluation |
Rate of Midterm Exam to Success | | 40 |
Rate of Final Exam to Success | | 60 |
Total | | 100 |
Numerical Data
Ekleme Tarihi: 05/11/2023 - 20:23Son Güncelleme Tarihi: 05/11/2023 - 20:25
×- A-Z Programs
- Undergraduate
- Graduate
- Academic Calendar
- Double Major & Minor Programs
- Erasmus
- Prospective Students
- Registration
- Re-Enrolment
- Fees
- Directorate of Registrar’s Office
- FAQ
- Accommodation
- Scholarships
- Lateral and Vertical Transfer
- Summer School
- Preparation
- Transportation