Teaching Staff
|
Öğr. Gör. Cansu DOĞAN |
Language of Instruction |
Türkçe (Turkish) |
Type Of Course |
Compulsory |
Prerequisites |
|
Recommended Optional Programme Component |
|
Course Objectives |
With this course, the student will learn about cyber threats and attacks, recognize software and hardware security product technologies, follow the inovations and cutting edge in the field of cyber attack an defense, turn their knowledge into practice in the field of cyber security. |
Course Content |
In this course, it is aimed to discuss the cyber security definitions and elements, security vulnerabilities in software, software and hardware cyber security technologies and their purposes, encryption approaches in cryptology, network technology devices and web world technologies in terms of cyber security. |
Learning Outcomes (LO) |
• To know the importance of information security and awareness and individual and corporate security concepts.
• To know the Cyber Security Elements and to recognize the functions of software and hardware security products in line with these principles.
• To recognize the threats in the cyber environment, to know the life cycle of cyber attacks and to set up the system that can meet the cyber security requirements.
• To learn the working principles of symmetric and asymmetric encryption approaches in the field of cryptography.
• To know the operation of hardware and software processes required for secure communication on the web.
• To know the importance of Digital Signature, Hash Functions and Certificate Authorities, their working systematics and their contribution to the security dimension.
• To know network technology equipment, TCP/IP architecture, protocols used in this architecture and to have awareness of the vulnerabilities arising from the nature of these protocols and the cyber attacks that may arise. |
Mode of Delivery |
Distance Learning |
Course Outline |
Week |
Topics |
1. Week |
Introduction to Security Products Management |
2. Week |
Individual Security |
3. Week |
Corporate Security |
4. Week |
Cyber Security: Definitions and Components |
5. Week |
Cyber Security: Definitions and Components |
6. Week |
Cyber Wars and Awareness |
7. Week |
Cryptology : Symmetric Cipher |
8. Week |
Mid-Term Exam |
9. Week |
Cryptology : Asymmetric Cipher |
10. Week |
Cryptology : Digital Signature, Hash Functions |
11. Week |
Network Technologies : Network Hardware |
12. Week |
Network Technologies : Communication in The Network |
13. Week |
Network Technologies : Command-line Applications |
14. Week |
WEB Technologies |
|
Assessment |
|
Percentage(%) |
Mid-term (%) |
40 |
Quizes (%) |
|
Homeworks/Term papers (%) |
20 |
Practice (%) |
|
Labs (%) |
|
Projects/Field Work (%) |
|
Seminars/Workshops (%) |
|
Final (%) |
60 |
Other (%) |
|
Total(%) |
100 |
|
Course Book (s) and/or References |
1. Sağıroğlu Ş., Alkan M., “Siber Güvenlik ve Savunma – Farkındalık ve Caydırıcılık”, Grafiker Yayınları, 2018.
2. Sağıroğlu Ş., Şenol M., “Siber Güvenlik ve Savunma – Problemler ve Çözümler”, Grafiker Yayınları, 2019.
3. Yılmazel Ö., “Temel Bilgi Teknolojileri – II”, Anadolu Üniversitesi Yayınları, 2013.
4. “Siber Güvenlik Teknoloji ve Ürün Taksonomisi”, TÜBİTAK BİLGEM, 2017.
5. Course presentations |
Work Placement(s) |
|
The Relationship between Program Qualifications (PQ) and Course Learning Outcomes (LO) |
| PÇ1 | PÇ2 | PÇ3 | PÇ4 | PÇ5 | PÇ6 | PÇ7 | PÇ8 | PÇ9 | PÇ10 | ÖÇ1 | | 5 | 5 | 2 | 5 | | 2 | 2 | | 5 | ÖÇ2 | 3 | 5 | 5 | 3 | 5 | 2 | | | | 5 | ÖÇ3 | 4 | 4 | 5 | 4 | 5 | 3 | 5 | | 5 | 5 | ÖÇ4 | | 3 | 3 | | 4 | | | | 4 | 3 | ÖÇ5 | 5 | 5 | 5 | | 5 | 5 | | | 5 | 4 | ÖÇ6 | 4 | 5 | 5 | 2 | 5 | 4 | 5 | | | | ÖÇ7 | | 3 | 4 | 5 | 5 | | 5 | | | | ÖÇ8 | | 5 | 5 | 5 | | | | | | 4 |
|