Bachelor TR-NQF-HE: Level 6 QF-EHEA: First Cycle EQF-LLL: Level 6

Course Introduction and Application Information

Course Code Course Name Semester Theoretical Practical Credit ECTS
COP4456 BGA- Information Security Spring 3 0 3 6
This catalog is for information purposes. Course status is determined by the relevant department at the beginning of semester.

Basic information

Language of instruction: English
Type of course: Non-Departmental Elective
Course Level: Bachelor’s Degree (First Cycle)
Mode of Delivery: Face to face
Course Coordinator : Dr. Öğr. Üyesi GÖRKEM KAR
Course Objectives: This course is designed to teach students how to engage all functional levels within the enterprise to deliver information system security. To this end, the course addresses a range of topics, each of which is vital to securing the modern enterprise.
These topics include inter alia plans and policies, enterprise roles, security metrics, risk management, standards and regulations, physical security, and business continuity.
Each piece of the puzzle must be in place for the enterprise to achieve its security goals; adversaries will invariably find and exploit weak links.

Learning Outcomes

The students who have succeeded in this course;
1) Assess the current security landscape, including the nature of the threat, the general status of common vulnerabilities, and the likely consequences of security failures
2) Critique and assess the strengths and weaknesses of general cybersecurity models, including the CIA triad
3) Appraise the interrelationships among elements that comprise a modern security system, including hardware, software, policies, and people
4) Assess how all domains of security interact to achieve effective system-wide security at the enterprise level.
5) Compare the interrelationships among security roles and responsibilities in a modern information-driven enterprise—to include interrelationships across security domains (IT, physical, classification, personnel, and so on)
6) Assess the role of strategy and policy in determining the success of information security;
7) Estimate the possible consequences of misaligning enterprise strategy, security policy, and security plans,
8) Assess the role of good metrics and key performance indicators (KPIs) in security assessment and governance,
9) Create a good set of information security metrics
10) Evaluate the trends and patterns that will determine the future state of cybersecurity.

Course Content

The Security Environment ,Principles of Cybersecurity,Cybersecurity Management Concepts, Cybersecurity Management Concepts, Enterprise Roles and Structures, Strategy and Strategic Planning, Security Plans and Policies, Security Standards and Controls, Risk Management, Security Metrics and Key Performance Indicators (KPIs), Security Education Awareness, Training, Physical Security and Environmental Events, Contingency Planning , Security Education, Training, and Awarenes, The future of cybersecurity

Weekly Detailed Course Contents

Week Subject Related Preparation
1) The Security Environment Threats, vulnerabilities, and consequences Advanced persistent threats The state of security today Why security matters to TSE
2) "Principles of Cybersecurity • Cybersecurity models (the CIA triad, the star model, the Parkerian hexad) • Variations on a theme: computer security, information security, and information assurance "
3) "Cybersecurity Management Concepts: Security governance Management models, roles, and functions
4) " Enterprise Roles and Structures: Information security roles and positions Alternative enterprise structures and interfaces
5) " Strategy and Strategic Planning: • Strategy • Strategic planning and security strategy • The information security lifecycle • Architecting the enterprise "
6) " Security Plans and Policies: • Levels of planning • Planning misalignment • The System Security Plan (SSP) • Policy development and implementation
7) "Security Standards and Controls: • Security standards and controls • Certification and accreditation (C&A)
8) " Risk Management : • Principles of risk • Types of risk • Risk strategies • The Risk Management Framework (RMF)
9) " Security Metrics and Key Performance Indicators (KPIs) : • The challenge of security metrics • What makes a good metric • Approaches to security metrics • Metrics and FISMA "
10) " Security Education Awareness, Training: • Human factors in security • Developing and implementing a security training plan • Cross-domain training (IT and other security domains)
11) " Physical Security and Environmental Events : • Physical and environmental threats • Physical and environmental controls
12) " Contingency Planning Developing a contingency plan • Understanding the different types of contingency plan • Responding to events "
13) "Security Education, Training, and Awarenes • Human factors in security • Developing and implementing a security training plan • Cross-domain training (IT and other security domains)
14) "The future of cybersecurity • Key future uncertainties • Possible future scenarios • How to apply what you’ve learned


Course Notes / Textbooks: Information Security: Principles and Practice - Jon Erickson

Evaluation System

Semester Requirements Number of Activities Level of Contribution
Quizzes 2 % 10
Homework Assignments 3 % 15
Project 1 % 15
Midterms 1 % 20
Final 1 % 40
Total % 100
Total % 100

ECTS / Workload Table

Activities Number of Activities Duration (Hours) Workload
Course Hours 14 3 42
Study Hours Out of Class 14 3 42
Homework Assignments 3 7 21
Midterms 1 15 15
Final 1 25 25
Total Workload 145

Contribution of Learning Outcomes to Programme Outcomes

No Effect 1 Lowest 2 Low 3 Average 4 High 5 Highest
Program Outcomes Level of Contribution
1) To be able to critically interpret and discuss the theories, the concepts, the traditions, and the developments in the history of thought which are fundamental for the field of new media, journalism and communication.
2) To be able to attain written, oral and visual knowledge about technical equipment and software used in the process of news and the content production in new media, and to be able to acquire effective abilities to use them on a professional level.
3) To be able to get information about the institutional agents and generally about the sector operating in the field of new media, journalism and communication, and to be able to critically evaluate them.
4) To be able to comprehend the reactions of the readers, the listeners, the audiences and the users to the changing roles of media environments, and to be able to provide and circulate an original contents for them and to predict future trends.
5) To be able to apprehend the basic theories, the concepts and the thoughts related to neighbouring fields of new media and journalism in a critical manner.
6) To be able to grasp global and technological changes in the field of communication, and the relations due to with their effects on the local agents.
7) To be able to develop skills on gathering necessary data by using scientific methods, analyzing and circulating them in order to produce content.
8) To be able to develop acquired knowledge, skills and competence upon social aims by being legally and ethically responsible for a lifetime, and to be able to use them in order to provide social benefit.
9) To be able to operate collaborative projects with national/international colleagues in the field of new media, journalism and communication.
10) To be able to improve skills on creating works in various formats and which are qualified to be published on the prestigious national and international channels.