CYBER SECURITY (ENGLISH, NONTHESIS) | |||||
Master | TR-NQF-HE: Level 7 | QF-EHEA: Second Cycle | EQF-LLL: Level 7 |
Course Code | Course Name | Semester | Theoretical | Practical | Credit | ECTS |
SEN5604 | Information Security Management | Spring | 3 | 0 | 3 | 8 |
The course opens with the approval of the Department at the beginning of each semester |
Language of instruction: | En |
Type of course: | Must Course |
Course Level: | |
Mode of Delivery: | Face to face |
Course Coordinator : | Prof. Dr. ADEM KARAHOCA |
Course Lecturer(s): |
Dr. Öğr. Üyesi ORHAN GÖKÇÖL Dr. Öğr. Üyesi BETÜL ERDOĞDU ŞAKAR |
Course Objectives: | The aim of this course is to learn how the information can be held securely in businesses and to discuss the information security from managerial perspective. Moreover, the standards and approaches which are used for information security management are will be discussed. The standard of information security management which is ISO27001 is going to be discussed in detail. |
The students who have succeeded in this course; 1. Identify the characteristic features (Confidentiality, Integrity and Availability) of Information Security 2. Identify and establish the principles of Information Security Management Business Environments 3. Define the roles and responsibilities related to information security 4. Define and prioritize assets, assets to identify the threats 5. Calculate and manage information security risks 6. Define an Information Security Strategy and Architecture 7. Apply a real project using the ISO27001 standard |
The content of this course is composed of Basics of IS, Threats, Program structure of IS and development cycle of ISM, Policies of IS, Classification of assets, Access control and physical security, IS Rick Analysis/ Final distribution of projects, IS Risk Management, Business continuity management, ISM frame systems and ISO27001, IS infringed events management, IS Legal Issues/Final project intermediate controls. |
Week | Subject | Related Preparation | |
1) | Introduction, general concepts | ||
2) | Basics of IS, Threats | ||
3) | Program structure of IS and development cycle of ISM | ||
4) | Policies of IS | ||
5) | Classification of assets | ||
6) | Access control and physical security | ||
7) | IS Rick Analysis/ Final distribution of projects | ||
8) | IS Risk Management | ||
9) | Business continuity management | ||
10) | ISM frame systems and ISO27001 | ||
11) | ISO27001 | ||
12) | IS infringed events management | ||
13) | IS Legal Issues/Final project intermediate controls | ||
14) | Team project presentations |
Course Notes: | SO27001 BGYS standardı Çeşitli online kaynaklar Online Ders notları |
References: | Yok |
Semester Requirements | Number of Activities | Level of Contribution |
Attendance | % 0 | |
Laboratory | % 0 | |
Application | % 0 | |
Field Work | % 0 | |
Special Course Internship (Work Placement) | % 0 | |
Quizzes | 3 | % 15 |
Homework Assignments | 5 | % 5 |
Presentation | % 0 | |
Project | 8 | % 20 |
Seminar | % 0 | |
Midterms | 2 | % 20 |
Preliminary Jury | % 0 | |
Final | 1 | % 40 |
Paper Submission | % 0 | |
Jury | % 0 | |
Bütünleme | % 0 | |
Total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 40 | |
PERCENTAGE OF FINAL WORK | % 60 | |
Total | % 100 |
Activities | Number of Activities | Duration (Hours) | Workload |
Course Hours | 14 | 3 | 42 |
Laboratory | 0 | 0 | 0 |
Application | 14 | 1 | 14 |
Special Course Internship (Work Placement) | 14 | 7 | 98 |
Field Work | 0 | 0 | 0 |
Study Hours Out of Class | 0 | 0 | 0 |
Presentations / Seminar | 0 | 0 | 0 |
Project | 0 | 0 | 0 |
Homework Assignments | 0 | 0 | 0 |
Quizzes | 0 | 0 | 0 |
Preliminary Jury | 0 | 0 | 0 |
Midterms | 1 | 23 | 23 |
Paper Submission | 0 | 0 | 0 |
Jury | 0 | 0 | 0 |
Final | 1 | 23 | 23 |
Total Workload | 200 |
No Effect | 1 Lowest | 2 Low | 3 Average | 4 High | 5 Highest |
Program Outcomes | Level of Contribution | |
1) | Being able to develop and deepen their knowledge at the level of expertise in the same or a different field, based on undergraduate level qualifications. | 4 |
1) | Being able to independently carry out a work that requires expertise in the field. | 5 |
1) | To be able to supervise and teach these values by observing social, scientific, cultural and ethical values in the stages of collecting, interpreting, applying and announcing the data related to the field. | 4 |
1) | To be able to critically evaluate the knowledge and skills acquired in the field of expertise and to direct their learning. | 4 |
1) | To be able to interpret and create new knowledge by integrating the knowledge gained in the field with the knowledge from different disciplines, | 4 |
1) | To be able to systematically transfer current developments in the field and their own studies to groups in and outside the field, in written, verbal and visual forms, by supporting them with quantitative and qualitative data. | 4 |
2) | To be able to comprehend the interdisciplinary interaction with which the field is related. | 5 |
2) | To be able to use the theoretical and applied knowledge at the level of expertise acquired in the field. | 4 |
2) | To be able to critically examine social relations and the norms that guide these relations, to develop them and take action to change them when necessary. | 4 |
2) | To be able to develop strategy, policy and implementation plans in the fields related to the field and to evaluate the obtained results within the framework of quality processes. | 5 |
2) | To be able to develop new strategic approaches for the solution of complex and unpredictable problems encountered in applications related to the field and to produce solutions by taking responsibility. | 5 |
3) | To be able to use the knowledge, problem solving and/or application skills they have internalized in their field in interdisciplinary studies. | 4 |
3) | Being able to lead in environments that require the resolution of problems related to the field. | 5 |
3) | To be able to solve the problems encountered in the field by using research methods. | 5 |