CYS5021 Cyber SecurityBahçeşehir UniversityDegree Programs INFORMATION TECHNOLOGIES (ENGLISH, THESIS)General Information For StudentsDiploma SupplementErasmus Policy StatementNational QualificationsBologna Commission
INFORMATION TECHNOLOGIES (ENGLISH, THESIS)
Master TR-NQF-HE: Level 7 QF-EHEA: Second Cycle EQF-LLL: Level 7

Course Introduction and Application Information

Course Code Course Name Semester Theoretical Practical Credit ECTS
CYS5021 Cyber Security Spring 3 0 3 8
This catalog is for information purposes. Course status is determined by the relevant department at the beginning of semester.

Basic information

Language of instruction: English
Type of course: Departmental Elective
Course Level:
Mode of Delivery: Face to face
Course Coordinator : Dr. Öğr. Üyesi AHMET NACİ ÜNAL
Course Lecturer(s): Dr. Öğr. Üyesi YÜCEL BATU SALMAN
Recommended Optional Program Components: None
Course Objectives: This course will provide a basic introduction to of all aspects of cyber-security including business, policy and procedures, communications security, network security, security management, legal issues, and technical issues.

Learning Outcomes

The students who have succeeded in this course;
This course provides students basic knowledge and skills in the fundamental theories and practices of Cyber Security.

Course Content

Explanation of the course, its activity and its content. Advanced knowledge of the key concepts of cybersecurity, privacy, risk, legal regulations, and compliance associated with organizational information systems. Implementation and effects of cyber security concept on organizations. Information security management, standards. Guidelines, legal regulations and compliance. Ethics, security architecture and design. Security technologies; basic cryptography and its applications. Physical and environmental security, network security, general security operations. Software development security. Cyber forensics. Cyber risks.
Intrusion detection and prevention.

Weekly Detailed Course Contents

Week Subject Related Preparation
1) Explanation of the course, its activity and its content. Lecture notes.
2) Advanced knowledge of the key concepts of cybersecurity, privacy, risk, legal regulations, and compliance associated with organizational information systems. Lecture notes
3) Implementation and effects of cyber security concept on organizations. Lecture notes.
4) Information security management, standards. Lecture notes.
5) Guidelines, legal regulations and compliance. Lecture notes.
6) Ethics, security architecture and design. Lecture notes.
7) Security technologies; basic cryptography and its applications. Lecture notes.
8) Security technologies; basic cryptography and its applications. Lecture notes.
9) Physical and environmental security, network security, general security operations. Lecture notes.
10) Physical and environmental security, network security, general security operations. Lecture notes.
11) Software development security. Lecture notes.
12) Cyber forensics. Lecture notes.
13) Cyber risks. Lecture notes.
14) Intrusion detection and prevention. Lecture notes.

Sources

Course Notes / Textbooks: 1. "How to Measure Anything in Cybersecurity Risk", Douglas W. Hubbard and Richard Seiersen.
2. "Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems", Josiah Dykstra.
References: Lecture notes.

Evaluation System

Semester Requirements Number of Activities Level of Contribution
Attendance 10 % 0
Homework Assignments 4 % 10
Presentation 1 % 10
Midterms 1 % 20
Final 1 % 60
Total % 100
PERCENTAGE OF SEMESTER WORK % 40
PERCENTAGE OF FINAL WORK % 60
Total % 100

ECTS / Workload Table

Activities Number of Activities Duration (Hours) Workload
Course Hours 14 3 42
Study Hours Out of Class 14 5 70
Presentations / Seminar 2 3 6
Homework Assignments 4 8 32
Midterms 1 20 20
Final 1 20 20
Total Workload 190

Contribution of Learning Outcomes to Programme Outcomes

No Effect 1 Lowest 2 Low 3 Average 4 High 5 Highest
           
Program Outcomes Level of Contribution
1) Uses basic Software Engineering knowledge and competencies
2) Applies the software development ability that is necessary for software engineering applications.
3) Uses data structures and applies information about algorithm development.
4) Develops system programs on operating systems.
5) Defines computer organization, design and architectures.
6) Creates the structure of computer networks and network security.
7) Uses business intelligence, data mining and data analysis tools, applies techniques about them.
8) Develops database applications and WEB based programs.
9) Defines, analyzes, designs and manages information technologies projects.
10) Uses and develops technology-based environments and tools in education.
11) Detects, identifies and solves information technology needs of the business environment.
12) Uses the capabilities of information technologies within the rules of professional responsibility and ethics.