Bachelor TR-NQF-HE: Level 6 QF-EHEA: First Cycle EQF-LLL: Level 6

Course Introduction and Application Information

Course Code Course Name Semester Theoretical Practical Credit ECTS
COP4467 Wissen Academi- Cybersecurity & Information Systems Security Fall 3 0 3 6
This catalog is for information purposes. Course status is determined by the relevant department at the beginning of semester.

Basic information

Language of instruction: English
Type of course: Non-Departmental Elective
Course Level: Bachelor’s Degree (First Cycle)
Mode of Delivery: Face to face
Course Coordinator : MEHMET ŞÜKRÜ KURAN
Course Lecturer(s): Dr. Öğr. Üyesi CEMAL OKAN ŞAKAR
Course Objectives: As our lives increasingly depend on digital services, the need to protect our information from being maliciously disrupted or misused is really important. Threats to information security are global, persistent, and increasingly sophisticated. As the number of mobile users, digital applications and data networks increase, so do the opportunities for exploitation. Effective information security at the enterprise level requires participation, planning, and practice. It is an ongoing effort that requires management and staff to work together. The Cybersecurity and Information Systems Security Course will provide learners with principles of data and technology that frame and define cybersecurity along with the knowledge and skills to design a secure network infrastructure. Learners will gain insight into the importance of cybersecurity and the integral role of cybersecurity professionals. Topics include assembling the design team, modeling threats, and analyzing security risks in order to meet business requirements for securing computers in a networked environment. The course encourages decision-making skills through real-life scenarios that the target audience may encounter. You are given the task of collecting the information and sorting through the details to resolve the given security requirement. These topics also include plans and policies, enterprise roles, security metrics, risk management, standards and regulations, physical security, and business continuity.

Learning Outcomes

The students who have succeeded in this course;
1) Explain the core information assurance (IA) principles
2) Understand Cybersecurity Concepts and Information Systems Security Subjects
3) Identify the key components of cybersecurity network architecture
4) Distinguish system and application security threats and vulnerabilities
5) Evaluate the principles of risk and conduct a notional risk management exercise
6) Compare and contrast logical and physical security

Course Content

The Cybersecurity and Information Systems Security Course will provide learners with principles of data and technology that frame and define cybersecurity along with the knowledge and skills to design a secure network infrastructure. In the content of this course, information systems security concepts, security threats in information systems, actions to prevent attack types, principles of risk management in cyber security and logical/physical security concepts will be covered.

Weekly Detailed Course Contents

Week Subject Related Preparation
1) "The Security Environment • Threats, vulnerabilities, and consequences • Advanced persistent threats • The state of security today • Why security matters Principles of Cybersecurity • The interrelated components of the computing environment "
2) "Principles of Cybersecurity (cont.) • Cybersecurity models (the CIA triad, the star model, the Parkerian hexad) • Computer security, information security, and information assurance Cybersecurity Management Concepts & Access Control • Security governance • Management models, roles, and functions "
3) "Enterprise Roles and Structures & Security Operations and Administration • Information security roles and positions • Alternative enterprise structures and interfaces "
4) "Strategy and Strategic Planning • Strategy • Risk Identification, Monitoring and Analysis • Strategic planning and security strategy • The information security lifecycle • Architecting the enterprise "
5) Security Plans and Policies • Levels of planning • Incident Response and Recovery • Planning misalignment • The System Security Plan (SSP) • Policy development and implementation Laws and Regulatory Requirements
6) Security Standards and Controls • Security standards and controls Certification and accreditation (C&A)
7) Risk Management • Principles of risk • Types of risk • Risk strategies The Risk Management Framework (RMF)
8) Security Metrics and Key Performance Indicators (KPIs) • The challenge of security metrics • What makes a good metric? • Approaches to security metrics Metrics and FISMA
9) Physical Security and Environmental Events • Physical and environmental threats • Physical and environmental controls
10) Contingency Planning • Developing a contingency plan • Understanding the different types of contingency plan Responding to events
11) Security Education, Training, and Awareness • Human factors in security • Developing and implementing a security training plan Cross-domain training (IT and other security domains)
12) "Managing information security • The purpose of certification and accreditation • Trends in certification and accreditation • Cryptography "
13) "Incident Response • Incident categories • Incident response Incident recovery The future of cybersecurity • Key future uncertainties • Possible future scenarios How to apply what you’ve learned"
14) General Review


Course Notes / Textbooks: SSCP Systems Security Certified Practitioner All-in-One - Darril Gibson - ISBN: 978-0071771566

Evaluation System

Semester Requirements Number of Activities Level of Contribution
Attendance 10 % 10
Homework Assignments 1 % 20
Midterms 1 % 30
Final 1 % 40
Total % 100
Total % 100

Contribution of Learning Outcomes to Programme Outcomes

No Effect 1 Lowest 2 Low 3 Average 4 High 5 Highest
Program Outcomes Level of Contribution
1) To be able to critically interpret and discuss the theories, the concepts, the traditions, and the developments in the history of thought which are fundamental for the field of new media, journalism and communication.
2) To be able to attain written, oral and visual knowledge about technical equipment and software used in the process of news and the content production in new media, and to be able to acquire effective abilities to use them on a professional level.
3) To be able to get information about the institutional agents and generally about the sector operating in the field of new media, journalism and communication, and to be able to critically evaluate them.
4) To be able to comprehend the reactions of the readers, the listeners, the audiences and the users to the changing roles of media environments, and to be able to provide and circulate an original contents for them and to predict future trends.
5) To be able to apprehend the basic theories, the concepts and the thoughts related to neighbouring fields of new media and journalism in a critical manner.
6) To be able to grasp global and technological changes in the field of communication, and the relations due to with their effects on the local agents.
7) To be able to develop skills on gathering necessary data by using scientific methods, analyzing and circulating them in order to produce content.
8) To be able to develop acquired knowledge, skills and competence upon social aims by being legally and ethically responsible for a lifetime, and to be able to use them in order to provide social benefit.
9) To be able to operate collaborative projects with national/international colleagues in the field of new media, journalism and communication.
10) To be able to improve skills on creating works in various formats and which are qualified to be published on the prestigious national and international channels.