Language of instruction: |
English |
Type of course: |
Non-Departmental Elective |
Course Level: |
Bachelor’s Degree (First Cycle)
|
Mode of Delivery: |
Face to face
|
Course Coordinator : |
MEHMET ŞÜKRÜ KURAN |
Course Lecturer(s): |
Dr. Öğr. Üyesi CEMAL OKAN ŞAKAR
|
Course Objectives: |
As our lives increasingly depend on digital services, the need to protect our information from being maliciously disrupted or misused is really important. Threats to information security are global, persistent, and increasingly sophisticated. As the number of mobile users, digital applications and data networks increase, so do the opportunities for exploitation. Effective information security at the enterprise level requires participation, planning, and practice. It is an ongoing effort that requires management and staff to work together. The Cybersecurity and Information Systems Security Course will provide learners with principles of data and technology that frame and define cybersecurity along with the knowledge and skills to design a secure network infrastructure. Learners will gain insight into the importance of cybersecurity and the integral role of cybersecurity professionals. Topics include assembling the design team, modeling threats, and analyzing security risks in order to meet business requirements for securing computers in a networked environment. The course encourages decision-making skills through real-life scenarios that the target audience may encounter. You are given the task of collecting the information and sorting through the details to resolve the given security requirement. These topics also include plans and policies, enterprise roles, security metrics, risk management, standards and regulations, physical security, and business continuity.
|
Week |
Subject |
Related Preparation |
1) |
"The Security Environment
• Threats, vulnerabilities, and consequences
• Advanced persistent threats
• The state of security today
• Why security matters
Principles of Cybersecurity
• The interrelated components of the computing environment
"
|
|
2) |
"Principles of Cybersecurity (cont.)
• Cybersecurity models (the CIA triad, the star model, the Parkerian hexad)
• Computer security, information security, and information assurance
Cybersecurity Management Concepts & Access Control
• Security governance
• Management models, roles, and functions
"
|
|
3) |
"Enterprise Roles and Structures & Security Operations and Administration
• Information security roles and positions
• Alternative enterprise structures and interfaces
"
|
|
4) |
"Strategy and Strategic Planning
• Strategy
• Risk Identification, Monitoring and Analysis
• Strategic planning and security strategy
• The information security lifecycle
• Architecting the enterprise
"
|
|
5) |
Security Plans and Policies
• Levels of planning
• Incident Response and Recovery
• Planning misalignment
• The System Security Plan (SSP)
• Policy development and implementation
Laws and Regulatory Requirements
|
|
6) |
Security Standards and Controls
• Security standards and controls
Certification and accreditation (C&A)
|
|
7) |
Risk Management
• Principles of risk
• Types of risk
• Risk strategies
The Risk Management Framework (RMF)
|
|
8) |
Security Metrics and Key Performance Indicators (KPIs)
• The challenge of security metrics
• What makes a good metric?
• Approaches to security metrics
Metrics and FISMA
|
|
9) |
Physical Security and Environmental Events
• Physical and environmental threats
• Physical and environmental controls
|
|
10) |
Contingency Planning
• Developing a contingency plan
• Understanding the different types of contingency plan
Responding to events
|
|
11) |
Security Education, Training, and Awareness
• Human factors in security
• Developing and implementing a security training plan
Cross-domain training (IT and other security domains)
|
|
12) |
"Managing information security
• The purpose of certification and accreditation
• Trends in certification and accreditation
• Cryptography
"
|
|
13) |
"Incident Response
• Incident categories
• Incident response
Incident recovery
The future of cybersecurity
• Key future uncertainties
• Possible future scenarios
How to apply what you’ve learned"
|
|
14) |
General Review
|
|
|
Program Outcomes |
Level of Contribution |
1) |
Be able to specify functional and non-functional attributes of software projects, processes and products. |
|
2) |
Be able to design software architecture, components, interfaces and subcomponents of a system for complex engineering problems. |
|
3) |
Be able to develop a complex software system with in terms of code development, verification, testing and debugging. |
|
4) |
Be able to verify software by testing its program behavior through expected results for a complex engineering problem. |
|
5) |
Be able to maintain a complex software system due to working environment changes, new user demands and software errors that occur during operation. |
|
6) |
Be able to monitor and control changes in the complex software system, to integrate the software with other systems, and to plan and manage new releases systematically. |
|
7) |
Be able to identify, evaluate, measure, manage and apply complex software system life cycle processes in software development by working within and interdisciplinary teams. |
|
8) |
Be able to use various tools and methods to collect software requirements, design, develop, test and maintain software under realistic constraints and conditions in complex engineering problems. |
|
9) |
Be able to define basic quality metrics, apply software life cycle processes, measure software quality, identify quality model characteristics, apply standards and be able to use them to analyze, design, develop, verify and test complex software system. |
|
10) |
Be able to gain technical information about other disciplines such as sustainable development that have common boundaries with software engineering such as mathematics, science, computer engineering, industrial engineering, systems engineering, economics, management and be able to create innovative ideas in entrepreneurship activities. |
|
11) |
Be able to grasp software engineering culture and concept of ethics and have the basic information of applying them in the software engineering and learn and successfully apply necessary technical skills through professional life. |
|
12) |
Be able to write active reports using foreign languages and Turkish, understand written reports, prepare design and production reports, make effective presentations, give clear and understandable instructions. |
|
13) |
Be able to have knowledge about the effects of engineering applications on health, environment and security in universal and societal dimensions and the problems of engineering in the era and the legal consequences of engineering solutions. |
|