Teaching Staff
|
Öğr. Gör. Aslı GÖNCÜ |
Language of Instruction |
Türkçe (Turkish) |
Type Of Course |
Compulsory |
Prerequisites |
|
Recommended Optional Programme Component |
|
Course Objectives |
The aim of this course is to introduce the students who take the course with the principles of individual and corporate information systems security. The course content includes:
-elements of information systems,
-human factor in system security and social engineering attacks,
-basics of network structures and possible vulnerabilities - defense methods,
-malware - working and protection methods,
-active - passive attacks and protection methods,
-encryption and encrypted communication methods,
-Hackers (Black Hat hackers) and legal information security experts (White hat hackers),
-Principles of establishing organizational security policies,
-intrusion detection - prevention systems and methods of tracking the attacker from the evidence |
Course Content |
Informatics and computer security issues, elements and processes will be emphasized and the steps to be taken for an advanced security will be explained. At the end of this process, efforts will be made to find answers to questions such as why informatics and computer security should be given importance and how IT security can be established in a basic sense. |
Learning Outcomes (LO) |
Students who successfully complete the course are expected to learn the following topics:
1. Security levels of information systems
2. The importance of the human factor in IT security and social engineering attacks
3. System networks, vulnerabilities and attack types, protection methods
4. Malware and ways to protect it
5. Active and passive attack methods and methods of protection from them
6. Encryption methods and encrypted communication principles
7. Hackers and their reasons for action
8. Legal and illegal practices regarding information security |
Mode of Delivery |
Face to face |
Course Outline |
Week |
Topics |
1. Week |
Introducing of Information Security Course, Goals |
2. Week |
What is Information Security? How to Classify?
What is "Hacking"? What are Types of "Hackers"? |
3. Week |
Computer and Access Security (Computer Login Security, Password Security, Software Upload and Update, File Access and Sharing Security, Backup) |
4. Week |
Attack Types and Protection Methods -1 / Vulnerabilities in Institutions |
5. Week |
Attack Types and Protection Methods -2 |
6. Week |
Social Engineering Attacks and Protection Methods-3 |
7. Week |
Midterm exam |
8. Week |
Cyber Crimes |
9. Week |
Cyber Attack Methods and Precautions |
10. Week |
Intrusion Detection Systems-1 |
11. Week |
Intrusion Detection Systems-2 |
12. Week |
Encryption Science and Techniques-1 |
13. Week |
Encryption Science and Techniques-2 |
14. Week |
Final examination |
|
Assessment |
|
Percentage(%) |
Mid-term (%) |
40 |
Quizes (%) |
|
Homeworks/Term papers (%) |
|
Practice (%) |
|
Labs (%) |
|
Projects/Field Work (%) |
|
Seminars/Workshops (%) |
|
Final (%) |
60 |
Other (%) |
|
Total(%) |
100 |
|
Course Book (s) and/or References |
|
Work Placement(s) |
|
The Relationship between Program Qualifications (PQ) and Course Learning Outcomes (LO) |
| PQ1 | PQ2 | PQ3 | PQ4 | PQ5 | PQ6 | PQ7 | PQ8 | PQ9 | PQ10 | PQ11 | LO1 | 4 | | | | | | | | | | | LO2 | 4 | | | | | | | | | | 4 | LO3 | 4 | 5 | 5 | 3 | | | | | | | 4 | LO4 | 4 | 5 | 5 | | | | | | | | 4 | LO5 | 4 | 5 | 5 | | | | | | | | 4 | LO6 | 4 | 3 | | | | | | | | | 3 | LO7 | 4 | | | | | | | | | | 4 | LO8 | 4 | | | | | | | | | | 5 |
|