CYBER SECURITY (ENGLISH, THESIS) | |||||
Master | TR-NQF-HE: Level 7 | QF-EHEA: Second Cycle | EQF-LLL: Level 7 |
Course Code | Course Name | Semester | Theoretical | Practical | Credit | ECTS |
CYS5178 | Penetration Testing | Spring Fall |
3 | 0 | 3 | 12 |
This catalog is for information purposes. Course status is determined by the relevant department at the beginning of semester. |
Language of instruction: | English |
Type of course: | Departmental Elective |
Course Level: | |
Mode of Delivery: | Face to face |
Course Coordinator : | Assist. Prof. AHMET NACİ ÜNAL |
Recommended Optional Program Components: | None |
Course Objectives: | Introducing the concept of penetration tests and learning penetration test steps. |
The students who have succeeded in this course; Students will have information about up-to-date topics such as penetration testing and vulnerability scanning. |
Basic concepts. Pentest. Planning. Target. Risks. Reporting. Basic Linux knowledge. Basic network information. Vulnerability scanning. Database penetration tests. Web applications penetration tests. |
Week | Subject | Related Preparation |
1) | Explanation of the course, its activity and its content. | Lecture notes. |
2) | Basic concepts. Pentest. Planning. Target. Risks. Reporting. | Lecture notes. |
3) | Basic Linux knowledge. | Lecture notes. |
4) | Basic Linux knowledge. | Lecture notes. |
5) | Basic network information. | Lecture notes. |
6) | Basic network information. | Lecture notes. |
7) | Vulnerability scanning. | Lecture notes. |
8) | Vulnerability scanning. | Lecture notes |
9) | Vulnerability scanning. | Lecture notes. |
10) | Database penetration tests. | Lecture notes |
11) | Database penetration tests. | Lecture notes |
12) | Database penetration tests. | Lecture notes |
13) | Web applications penetration tests. | Lecture notes |
14) | Web applications penetration tests | Lecture notes |
Course Notes / Textbooks: | "Advanced Penetration Testing: Hacking the World's Most Secure Networks 1st Edition". Wil Allsopp. |
References: | Ders notları. |
Semester Requirements | Number of Activities | Level of Contribution |
Attendance | 10 | % 0 |
Homework Assignments | 4 | % 10 |
Presentation | 1 | % 10 |
Midterms | 1 | % 20 |
Final | 1 | % 60 |
Total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 40 | |
PERCENTAGE OF FINAL WORK | % 60 | |
Total | % 100 |
Activities | Number of Activities | Duration (Hours) | Workload |
Course Hours | 14 | 3 | 42 |
Study Hours Out of Class | 14 | 12 | 168 |
Presentations / Seminar | 2 | 3 | 6 |
Homework Assignments | 4 | 8 | 32 |
Midterms | 1 | 20 | 20 |
Final | 1 | 20 | 20 |
Total Workload | 288 |
No Effect | 1 Lowest | 2 Low | 3 Average | 4 High | 5 Highest |
Program Outcomes | Level of Contribution | |
1) | Understand and implement advanced concepts of Siber Security | |
2) | Use math, science, and modern engineering tools to formulate and solve advenced siber security problems. | |
3) | Review the literature critically pertaining to his/her research projects, and connect the earlier literature to his/her own results | |
4) | Follow, interpret and analyze scientific researches in the field of engineering and use the knowledge in his/her field of study | |
5) | Work effectively in multi-disciplinary research teams | |
6) | Acquire scientific knowledge | |
7) | Find out new methods to improve his/her knowledge. | |
8) | Effectively express his/her research ideas and findings both orally and in writing | |
9) | Defend research outcomes at seminars and conferences. | |
10) | Prepare master thesis and articles about thesis subject clearly on the basis of published documents, thesis, etc. | |
11) | Demonstrate professional and ethical responsibility. |