|
|
| YZM4034 | Cyber Security and Applications | 2+0+0 | ECTS:4 | | Year / Semester | Spring Semester | | Level of Course | First Cycle | | Status | Elective | | Department | DEPARTMENT of SOFTWARE ENGINEERING | | Prerequisites and co-requisites | None | | Mode of Delivery | Face to face | | Contact Hours | 14 weeks - 2 hours of lectures per week | | Lecturer | Arş. Gör. Hakan AYDIN | | Co-Lecturer | | | Language of instruction | Turkish | | Professional practise ( internship ) | None | | | | The aim of the course: | | The aim of this course is to provide basic knowledge about cyber security in the current situation, historical background, information laws, cyber infiltration and defense techniques. |
| Learning Outcomes | CTPO | TOA | | Upon successful completion of the course, the students will be able to : | | | | LO - 1 : | Discuss the technologies used in cyber space. | 3 - 10 - 11 | 1,3 | | LO - 2 : | Acquire basic knowledge of cybercrime and network security. | 3 - 10 - 11 | 1,3 | | LO - 3 : | Have information about informatics law, international standards and counter-algebra. | 3 - 10 - 11 | | | CTPO : Contribution to programme outcomes, TOA :Type of assessment (1: written exam, 2: Oral exam, 3: Homework assignment, 4: Laboratory exercise/exam, 5: Seminar / presentation, 6: Term paper), LO : Learning Outcome | | |
| Cyber security overview, Fundamentals of cyber security, Cyber security awareness, Malware, Cyber terrorism,Big data approaches for cyber security, Security in computer networks, TCP_IP Security, ISO / IEC-27032 Cyber security guide, Linux installation and basic commands, Security protocols and structures that use them, Basic security Technologies, Cyber security on mobile devices, Traffic analysis, Penetration tests |
| |
| Course Syllabus | | Week | Subject | Related Notes / Files | | Week 1 | Cyber security overview
| | | Week 2 | Fundamentals of cyber security | | | Week 3 | Cyber security awareness
| | | Week 4 | Malware
| | | Week 5 | Cyber terrorism | | | Week 6 | Big data approaches for cyber security
| | | Week 7 | Security in computer networks
| | | Week 8 | TCP_IP Security
| | | Week 9 | Mid-term exam | | | Week 10 | Linux installation and basic commands | | | Week 11 | ISO / IEC-27032 Cyber security guide | | | Week 12 | Security protocols and structures that use them
| | | Week 13 | Basic security technologies | | | Week 14 | Cyber security on mobile devices | | | Week 15 | Penetration tests | | | Week 16 | End-of-term exam | | | |
| 1 | Şeref Sağıroğlu ve Mustafa Alkan, Siber Güvenlik ve Savunma, Ankara 2018. | | | 2 | Eşref Adalı, Bilgisayar ve Bilgi Güvenliği ve Yönetimi, İTÜ Ulusal Yazılım ve Sertifikasyon Merkezi, İstanbul 2016 | | | |
| 1 | Marjie T. Britz, Computer Forensic and Cyber Crime, Pearson. | | | 2 | H.Alparslan Akyıldız, Uygulamalarla Siber Güvenliğe Giriş, Gazi Kitapevi, Ankara | | | |
| Method of Assessment | | Type of assessment | Week No | Date | Duration (hours) | Weight (%) | | Mid-term exam | 9 | | 2 | 50 | | End-of-term exam | 16 | | 2 | 50 | | |
| Student Work Load and its Distribution | | Type of work | Duration (hours pw) | No of weeks / Number of activity | Hours in total per term | | Yüz yüze eğitim | 2 | 14 | 28 | | Sınıf dışı çalışma | 4 | 14 | 56 | | Arasınav için hazırlık | 2 | 2 | 4 | | Arasınav | 2 | 1 | 2 | | Dönem sonu sınavı için hazırlık | 5 | 2 | 10 | | Dönem sonu sınavı | 2 | 1 | 2 | | Total work load | | | 102 |
|