DENTAL MEDICINE | |||||
Bachelor | TR-NQF-HE: Level 6 | QF-EHEA: First Cycle | EQF-LLL: Level 6 |
Course Code: | COP4471 | ||||||||
Ders İsmi: | Huawei-Information Security Management | ||||||||
Ders Yarıyılı: |
Spring Fall |
||||||||
Ders Kredileri: |
|
||||||||
Language of instruction: | English | ||||||||
Ders Koşulu: | |||||||||
Ders İş Deneyimini Gerektiriyor mu?: | No | ||||||||
Type of course: | Non-Departmental Elective | ||||||||
Course Level: |
|
||||||||
Mode of Delivery: | Face to face | ||||||||
Course Coordinator : | Dr. Öğr. Üyesi TARKAN AYDIN | ||||||||
Course Lecturer(s): | |||||||||
Course Assistants: |
Course Objectives: | "This course intends to provide an introduction to the increasingly important cyber security issues for academic students on an academic and sectoral basis. It is sustainable through a multidisciplinary approach and, in general, sectoral and technical concepts as well as administrative and political issues are examined in detail. The course aims to ensure that the student programs and careers through case studies, assignments, readings, in-class presentations and exams have sufficient knowledge awareness and managerial competence to ensure that advanced research on information security policy and management is adequate as time progresses. The students who take the course will concentrate on these areas by choosing two areas of expertise (Programming, Cloud Computing, Databases, Web, Operating Systems) within the course and they will gain sectoral and academic competence in the fields." |
Course Content: | Computer and Information Security, Access Control and Cryptography, Security in Programs and Programming, Web-User Direction in Information Security, Security in |
The students who have succeeded in this course;
|
Week | Subject | Related Preparation |
1) | Introduction to ınformation Security: What is Computer and Information Security? What are the Basic Concepts? | |
2) | Authorization, Access Control and Cryptography | |
3) | Programms and Programming I | |
4) | Programms and Programming II | |
5) | Web and Operating Systems | |
6) | Networks I | |
7) | Networks II | |
8) | Database | |
9) | Cloud Computing | |
10) | Privacy | |
11) | Management Methods and Incidents | |
12) | Legal Issues and Ethics | |
13) | Details of Cryptography | |
14) | New Issues in Information Security |
Course Notes / Textbooks: | "Pfleeger, Charles P., Pfleeger, Shari L., and Margulies, Jonathan. Security in Computing 5th Edition. Upper Saddle River, NJ: Prentice Hall, 2015. Print ISBN:978-0-13-408504-3 (SC) Rice, David. Geekonomics: The Real Cost of Insecure Software. Upper Saddle River, NJ: Pearson Education, 2008. Print ISBN: 978-0-32-21735973 (GS)" |
References: | |
Ders Öğrenme Kazanımları |
---|
Program Outcomes |
No Effect | 1 Lowest | 2 Low | 3 Average | 4 High | 5 Highest |
Program Outcomes | Level of Contribution |
Semester Requirements | Number of Activities | Level of Contribution |
Application | 2 | % 15 |
Homework Assignments | 5 | % 15 |
Midterms | 2 | % 30 |
Final | 1 | % 40 |
Total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 60 | |
PERCENTAGE OF FINAL WORK | % 40 | |
Total | % 100 |
Activities | Number of Activities | Duration (Hours) | Workload |
Course Hours | 3 | 14 | 42 |
Application | 2 | 10 | 20 |
Homework Assignments | 5 | 5 | 25 |
Midterms | 2 | 20 | 40 |
Final | 1 | 25 | 25 |
Total Workload | 152 |