MYP266


Course Title Course Code Program Level
IT Security MYP226 Computer Technologies Associate Degree

Course Term
(Course Semester)
Teaching and Learning Methods
Credits
Theory Practice Lab Projects/Field Work Seminars/Workshops Other Total Credits ECTS Credits
04
(Spring)
42 0 0 71 113 3 5

Teaching Staff Öğr. Gör. Aslı GÖNCÜ
Language of Instruction Türkçe (Turkish)
Type Of Course Compulsory
Prerequisites
Recommended Optional Programme Component
Course Objectives The aim of this course is to introduce the students who take the course with the principles of individual and corporate information systems security. The course content includes: -elements of information systems, -human factor in system security and social engineering attacks, -basics of network structures and possible vulnerabilities - defense methods, -malware - working and protection methods, -active - passive attacks and protection methods, -encryption and encrypted communication methods, -Hackers (Black Hat hackers) and legal information security experts (White hat hackers), -Principles of establishing organizational security policies, -intrusion detection - prevention systems and methods of tracking the attacker from the evidence
Course Content Informatics and computer security issues, elements and processes will be emphasized and the steps to be taken for an advanced security will be explained. At the end of this process, efforts will be made to find answers to questions such as why informatics and computer security should be given importance and how IT security can be established in a basic sense.
Learning Outcomes (LO) Students who successfully complete the course are expected to learn the following topics: 1. Security levels of information systems 2. The importance of the human factor in IT security and social engineering attacks 3. System networks, vulnerabilities and attack types, protection methods 4. Malware and ways to protect it 5. Active and passive attack methods and methods of protection from them 6. Encryption methods and encrypted communication principles 7. Hackers and their reasons for action 8. Legal and illegal practices regarding information security
Mode of Delivery Face to face
Course Outline
Week Topics
1. Week Introducing of Information Security Course, Goals
2. Week What is Information Security? How to Classify? What is "Hacking"? What are Types of "Hackers"?
3. Week Computer and Access Security (Computer Login Security, Password Security, Software Upload and Update, File Access and Sharing Security, Backup)
4. Week Attack Types and Protection Methods -1 / Vulnerabilities in Institutions
5. Week Attack Types and Protection Methods -2
6. Week Social Engineering Attacks and Protection Methods-3
7. Week Midterm exam
8. Week Cyber Crimes
9. Week Cyber Attack Methods and Precautions
10. Week Intrusion Detection Systems-1
11. Week Intrusion Detection Systems-2
12. Week Encryption Science and Techniques-1
13. Week Encryption Science and Techniques-2
14. Week Final examination
Assessment
  Percentage(%)
Mid-term (%) 40
Quizes (%)
Homeworks/Term papers (%)
Practice (%)
Labs (%)
Projects/Field Work (%)
Seminars/Workshops (%)
Final (%) 60
Other (%)
Total(%) 100
Course Book (s) and/or References
Work Placement(s)
The Relationship between Program Qualifications (PQ) and Course Learning Outcomes (LO)

 

PQ1

PQ2

PQ3

PQ4

PQ5

PQ6

PQ7

PQ8

PQ9

PQ10

PQ11

LO1

4

 

 

 

 

 

 

 

 

 

 

LO2

4

 

 

 

 

 

 

 

 

 

4

LO3

4

5

5

3

 

 

 

 

 

 

4

LO4

4

5

5

 

 

 

 

 

 

 

4

LO5

4

5

5

 

 

 

 

 

 

 

4

LO6

4

3

 

 

 

 

 

 

 

 

3

LO7

4

 

 

 

 

 

 

 

 

 

4

LO8

4

 

 

 

 

 

 

 

 

 

5