INFORMATION TECHNOLOGIES (TURKISH, THESIS) | |||||
Master | TR-NQF-HE: Level 7 | QF-EHEA: Second Cycle | EQF-LLL: Level 7 |
Course Code | Course Name | Semester | Theoretical | Practical | Credit | ECTS |
CYS5021 | Cyber Security | Fall Spring |
3 | 0 | 3 | 8 |
This catalog is for information purposes. Course status is determined by the relevant department at the beginning of semester. |
Language of instruction: | English |
Type of course: | Departmental Elective |
Course Level: | |
Mode of Delivery: | Face to face |
Course Coordinator : | Assist. Prof. AHMET NACİ ÜNAL |
Course Lecturer(s): |
Assoc. Prof. YÜCEL BATU SALMAN |
Recommended Optional Program Components: | None |
Course Objectives: | This course will provide a basic introduction to of all aspects of cyber-security including business, policy and procedures, communications security, network security, security management, legal issues, and technical issues. |
The students who have succeeded in this course; This course provides students basic knowledge and skills in the fundamental theories and practices of Cyber Security. |
Explanation of the course, its activity and its content. Advanced knowledge of the key concepts of cybersecurity, privacy, risk, legal regulations, and compliance associated with organizational information systems. Implementation and effects of cyber security concept on organizations. Information security management, standards. Guidelines, legal regulations and compliance. Ethics, security architecture and design. Security technologies; basic cryptography and its applications. Physical and environmental security, network security, general security operations. Software development security. Cyber forensics. Cyber risks. Intrusion detection and prevention. |
Week | Subject | Related Preparation |
1) | Explanation of the course, its activity and its content. | Lecture notes. |
2) | Advanced knowledge of the key concepts of cybersecurity, privacy, risk, legal regulations, and compliance associated with organizational information systems. | Lecture notes |
3) | Implementation and effects of cyber security concept on organizations. | Lecture notes. |
4) | Information security management, standards. | Lecture notes. |
5) | Guidelines, legal regulations and compliance. | Lecture notes. |
6) | Ethics, security architecture and design. | Lecture notes. |
7) | Security technologies; basic cryptography and its applications. | Lecture notes. |
8) | Security technologies; basic cryptography and its applications. | Lecture notes. |
9) | Physical and environmental security, network security, general security operations. | Lecture notes. |
10) | Physical and environmental security, network security, general security operations. | Lecture notes. |
11) | Software development security. | Lecture notes. |
12) | Cyber forensics. | Lecture notes. |
13) | Cyber risks. | Lecture notes. |
14) | Intrusion detection and prevention. | Lecture notes. |
Course Notes / Textbooks: | 1. "How to Measure Anything in Cybersecurity Risk", Douglas W. Hubbard and Richard Seiersen. 2. "Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems", Josiah Dykstra. |
References: | Lecture notes. |
Semester Requirements | Number of Activities | Level of Contribution |
Attendance | 10 | % 0 |
Homework Assignments | 4 | % 10 |
Presentation | 1 | % 10 |
Midterms | 1 | % 20 |
Final | 1 | % 60 |
Total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 40 | |
PERCENTAGE OF FINAL WORK | % 60 | |
Total | % 100 |
Activities | Number of Activities | Duration (Hours) | Workload |
Course Hours | 14 | 3 | 42 |
Study Hours Out of Class | 14 | 5 | 70 |
Presentations / Seminar | 2 | 3 | 6 |
Homework Assignments | 4 | 8 | 32 |
Midterms | 1 | 20 | 20 |
Final | 1 | 20 | 20 |
Total Workload | 190 |
No Effect | 1 Lowest | 2 Low | 3 Average | 4 High | 5 Highest |
Program Outcomes | Level of Contribution | |
1) | Follows the scientific literature in the field of Information Technology, critically analyzes it, and effectively utilizes it in solving complex IT problems. | |
2) | Designs, plans, implements, and manages original projects related to the field of Information Technology. | |
3) | Conducts independent studies in the field of Information Technology, assumes scientific responsibility, and evaluates the findings with a critical perspective. | |
4) | Presents the outcomes of research and projects effectively in written, oral, and visual forms, in accordance with academic and professional standards. | |
5) | Conducts independent research on specialized topics within the field, develops innovative and original ideas, and translates this knowledge into practice and technology. | |
6) | Effectively applies advanced theoretical knowledge and practical skills specific to the field of Information Technology; analyzes and develops current software, hardware, and system solutions. | |
7) | Acts in accordance with professional, scientific, and ethical principles; takes responsibility by considering the societal, environmental, and ethical impacts of IT applications. |