Language of instruction: |
English |
Type of course: |
Non-Departmental Elective |
Course Level: |
Bachelor’s Degree (First Cycle)
|
Mode of Delivery: |
Face to face
|
Course Coordinator : |
MEHMET ŞÜKRÜ KURAN |
Course Lecturer(s): |
Dr. Öğr. Üyesi CEMAL OKAN ŞAKAR
|
Course Objectives: |
As our lives increasingly depend on digital services, the need to protect our information from being maliciously disrupted or misused is really important. Threats to information security are global, persistent, and increasingly sophisticated. As the number of mobile users, digital applications and data networks increase, so do the opportunities for exploitation. Effective information security at the enterprise level requires participation, planning, and practice. It is an ongoing effort that requires management and staff to work together. The Cybersecurity and Information Systems Security Course will provide learners with principles of data and technology that frame and define cybersecurity along with the knowledge and skills to design a secure network infrastructure. Learners will gain insight into the importance of cybersecurity and the integral role of cybersecurity professionals. Topics include assembling the design team, modeling threats, and analyzing security risks in order to meet business requirements for securing computers in a networked environment. The course encourages decision-making skills through real-life scenarios that the target audience may encounter. You are given the task of collecting the information and sorting through the details to resolve the given security requirement. These topics also include plans and policies, enterprise roles, security metrics, risk management, standards and regulations, physical security, and business continuity.
|
Week |
Subject |
Related Preparation |
1) |
"The Security Environment
• Threats, vulnerabilities, and consequences
• Advanced persistent threats
• The state of security today
• Why security matters
Principles of Cybersecurity
• The interrelated components of the computing environment
"
|
|
2) |
"Principles of Cybersecurity (cont.)
• Cybersecurity models (the CIA triad, the star model, the Parkerian hexad)
• Computer security, information security, and information assurance
Cybersecurity Management Concepts & Access Control
• Security governance
• Management models, roles, and functions
"
|
|
3) |
"Enterprise Roles and Structures & Security Operations and Administration
• Information security roles and positions
• Alternative enterprise structures and interfaces
"
|
|
4) |
"Strategy and Strategic Planning
• Strategy
• Risk Identification, Monitoring and Analysis
• Strategic planning and security strategy
• The information security lifecycle
• Architecting the enterprise
"
|
|
5) |
Security Plans and Policies
• Levels of planning
• Incident Response and Recovery
• Planning misalignment
• The System Security Plan (SSP)
• Policy development and implementation
Laws and Regulatory Requirements
|
|
6) |
Security Standards and Controls
• Security standards and controls
Certification and accreditation (C&A)
|
|
7) |
Risk Management
• Principles of risk
• Types of risk
• Risk strategies
The Risk Management Framework (RMF)
|
|
8) |
Security Metrics and Key Performance Indicators (KPIs)
• The challenge of security metrics
• What makes a good metric?
• Approaches to security metrics
Metrics and FISMA
|
|
9) |
Physical Security and Environmental Events
• Physical and environmental threats
• Physical and environmental controls
|
|
10) |
Contingency Planning
• Developing a contingency plan
• Understanding the different types of contingency plan
Responding to events
|
|
11) |
Security Education, Training, and Awareness
• Human factors in security
• Developing and implementing a security training plan
Cross-domain training (IT and other security domains)
|
|
12) |
"Managing information security
• The purpose of certification and accreditation
• Trends in certification and accreditation
• Cryptography
"
|
|
13) |
"Incident Response
• Incident categories
• Incident response
Incident recovery
The future of cybersecurity
• Key future uncertainties
• Possible future scenarios
How to apply what you’ve learned"
|
|
14) |
General Review
|
|
|
Program Outcomes |
Level of Contribution |
1) |
To be able to examine, interpret data and assess ideas with the scientific methods in the area of EU studies. |
2 |
2) |
To be able to inform authorities and institutions in the area of EU studies, to be able to transfer ideas and proposals supported by quantitative and qualitative data about the problems. |
2 |
3) |
To be introduced to and to get involved in other disciplines that EU studies are strongly related with (political science, international relations, law, economics, sociology, etc.) and to be able to conduct multi-disciplinary research and analysis on European politics. |
3 |
4) |
To be able to evaluate current news on European Union and Turkey-EU relations and identify, analyze current issues relating to the EU’s politics and policies. |
2 |
5) |
To be able to use English in written and oral communication in general and in the field of EU studies in particular. |
1 |
6) |
To have ethical, social and scientific values throughout the processes of collecting, interpreting, disseminating and implementing data related to EU studies. |
1 |
7) |
To be able to assess the historical development, functioning of the institutions and decision-making system and common policies of the European Union throughout its economic and political integration in a supranational framework. |
2 |
8) |
To be able to evaluate the current legal, financial and institutional changes that the EU is going through. |
2 |
9) |
To explain the dynamics of enlargement processes of the EU by identifying the main actors and institutions involved and compare previous enlargement processes and accession process of Turkey. |
2 |
10) |
To be able to analyze the influence of the EU on political, social and economic system of Turkey. |
2 |
11) |
To acquire insight in EU project culture and to build up project preparation skills in line with EU format and develop the ability to work in groups and cooperate with peers. |
2 |
12) |
To be able to recognize theories and concepts used by the discipline of international relations and relate them to the historical development of the EU as a unique post-War political project. |
3 |