INFORMATION TECHNOLOGIES (ENGLISH, NON-THESIS) | |||||
Master | TR-NQF-HE: Level 7 | QF-EHEA: Second Cycle | EQF-LLL: Level 7 |
Course Code | Course Name | Semester | Theoretical | Practical | Credit | ECTS |
CYS5178 | Penetration Testing | Spring | 3 | 0 | 3 | 12 |
This catalog is for information purposes. Course status is determined by the relevant department at the beginning of semester. |
Language of instruction: | English |
Type of course: | Departmental Elective |
Course Level: | |
Mode of Delivery: | Face to face |
Course Coordinator : | Assist. Prof. AHMET NACİ ÜNAL |
Recommended Optional Program Components: | None |
Course Objectives: | Introducing the concept of penetration tests and learning penetration test steps. |
The students who have succeeded in this course; Students will have information about up-to-date topics such as penetration testing and vulnerability scanning. |
Basic concepts. Pentest. Planning. Target. Risks. Reporting. Basic Linux knowledge. Basic network information. Vulnerability scanning. Database penetration tests. Web applications penetration tests. |
Week | Subject | Related Preparation |
1) | Explanation of the course, its activity and its content. | Lecture notes. |
2) | Basic concepts. Pentest. Planning. Target. Risks. Reporting. | Lecture notes. |
3) | Basic Linux knowledge. | Lecture notes. |
4) | Basic Linux knowledge. | Lecture notes. |
5) | Basic network information. | Lecture notes. |
6) | Basic network information. | Lecture notes. |
7) | Vulnerability scanning. | Lecture notes. |
8) | Vulnerability scanning. | Lecture notes |
9) | Vulnerability scanning. | Lecture notes. |
10) | Database penetration tests. | Lecture notes |
11) | Database penetration tests. | Lecture notes |
12) | Database penetration tests. | Lecture notes |
13) | Web applications penetration tests. | Lecture notes |
14) | Web applications penetration tests | Lecture notes |
Course Notes / Textbooks: | "Advanced Penetration Testing: Hacking the World's Most Secure Networks 1st Edition". Wil Allsopp. |
References: | Ders notları. |
Semester Requirements | Number of Activities | Level of Contribution |
Attendance | 10 | % 0 |
Homework Assignments | 4 | % 10 |
Presentation | 1 | % 10 |
Midterms | 1 | % 20 |
Final | 1 | % 60 |
Total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 40 | |
PERCENTAGE OF FINAL WORK | % 60 | |
Total | % 100 |
Activities | Number of Activities | Duration (Hours) | Workload |
Course Hours | 14 | 3 | 42 |
Study Hours Out of Class | 14 | 12 | 168 |
Presentations / Seminar | 2 | 3 | 6 |
Homework Assignments | 4 | 8 | 32 |
Midterms | 1 | 20 | 20 |
Final | 1 | 20 | 20 |
Total Workload | 288 |
No Effect | 1 Lowest | 2 Low | 3 Average | 4 High | 5 Highest |
Program Outcomes | Level of Contribution | |
1) | Uses basic Software Engineering knowledge and competencies. | |
2) | Applies the software development ability that is necessary for software engineering applications. | |
3) | Uses data structures and applies information about algorithm development. | |
4) | Develops system programs on operating systems. | |
5) | Defines computer organization, design and architectures. | |
6) | Creates the structure of computer networks and network security. | |
7) | Uses business intelligence, data mining and data analysis tools, applies techniques about them. | |
8) | Develops database applications and WEB based programs. | |
9) | Defines, analyzes, designs and manages information technologies projects. | |
10) | Uses and develops technology-based environments and tools in education. | |
11) | Detects, identifies and solves information technology needs of the business environment. | |
12) | Uses the capabilities of information technologies within the rules of professional responsibility and ethics. |