|
YZM4034 | Cyber security | 2+0+0 | ECTS:4 | Year / Semester | Spring Semester | Level of Course | First Cycle | Status | Elective | Department | DEPARTMENT of SOFTWARE ENGINEERING | Prerequisites and co-requisites | None | Mode of Delivery | Face to face | Contact Hours | 14 weeks - 2 hours of lectures per week | Lecturer | Dr. Öğr. Üyesi Işılay BOZKURT | Co-Lecturer | | Language of instruction | Turkish | Professional practise ( internship ) | None | | The aim of the course: | The aim of this course is to provide basic knowledge about cyber security in the current situation, historical background, information laws, cyber infiltration and defense techniques. |
Learning Outcomes | CTPO | TOA | Upon successful completion of the course, the students will be able to : | | | LO - 1 : | Discuss the technologies used in cyber space. | 3,10,11 | 1,3 | LO - 2 : | Acquire basic knowledge of cybercrime and network security. | 3,10,11 | 1,3 | LO - 3 : | Have information about informatics law, international standards and counter-algebra. | 3,10,11 | | CTPO : Contribution to programme outcomes, TOA :Type of assessment (1: written exam, 2: Oral exam, 3: Homework assignment, 4: Laboratory exercise/exam, 5: Seminar / presentation, 6: Term paper), LO : Learning Outcome | |
Cyber security overview, Fundamentals of cyber security, Cyber security awareness, Malware, Cyber terrorism,Big data approaches for cyber security, Security in computer networks, TCP_IP Security, ISO / IEC-27032 Cyber security guide, Linux installation and basic commands, Security protocols and structures that use them, Basic security Technologies, Cyber security on mobile devices, Traffic analysis, Penetration tests |
|
Course Syllabus | Week | Subject | Related Notes / Files | Week 1 | Cyber security overview
| | Week 2 | Fundamentals of cyber security | | Week 3 | Cyber security awareness
| | Week 4 | Malware
| | Week 5 | Cyber terrorism | | Week 6 | Big data approaches for cyber security
| | Week 7 | Security in computer networks
| | Week 8 | TCP_IP Security
| | Week 9 | Mid-term exam | | Week 10 | Linux installation and basic commands | | Week 11 | ISO / IEC-27032 Cyber security guide | | Week 12 | Security protocols and structures that use them
| | Week 13 | Basic security technologies | | Week 14 | Cyber security on mobile devices | | Week 15 | Penetration tests | | Week 16 | End-of-term exam | | |
1 | Şeref Sağıroğlu ve Mustafa Alkan, Siber Güvenlik ve Savunma, Ankara 2018. | | 2 | Eşref Adalı, Bilgisayar ve Bilgi Güvenliği ve Yönetimi, İTÜ Ulusal Yazılım ve Sertifikasyon Merkezi, İstanbul 2016 | | |
1 | Marjie T. Britz, Computer Forensic and Cyber Crime, Pearson. | | 2 | H.Alparslan Akyıldız, Uygulamalarla Siber Güvenliğe Giriş, Gazi Kitapevi, Ankara | | |
Method of Assessment | Type of assessment | Week No | Date | Duration (hours) | Weight (%) | Mid-term exam | 9 | | 2 | 50 | End-of-term exam | 16 | | 2 | 50 | |
Student Work Load and its Distribution | Type of work | Duration (hours pw) | No of weeks / Number of activity | Hours in total per term | Yüz yüze eğitim | 2 | 14 | 28 | Sınıf dışı çalışma | 4 | 14 | 56 | Arasınav için hazırlık | 2 | 2 | 4 | Arasınav | 2 | 1 | 2 | Dönem sonu sınavı için hazırlık | 5 | 2 | 10 | Dönem sonu sınavı | 2 | 1 | 2 | Total work load | | | 102 |
|