INFORMATION TECHNOLOGIES (TURKISH, THESIS)
Master TR-NQF-HE: Level 7 QF-EHEA: Second Cycle EQF-LLL: Level 7

Course Introduction and Application Information

Course Code Course Name Semester Theoretical Practical Credit ECTS
CYS5123 Web Application Security: Hacking and Defence Fall
Spring
3 0 3 12
The course opens with the approval of the Department at the beginning of each semester

Basic information

Language of instruction: En
Type of course: Departmental Elective
Course Level:
Mode of Delivery: Face to face
Course Coordinator : Dr. Öğr. Üyesi AHMET NACİ ÜNAL
Course Objectives: Teaching organizational management methods of information security. Discussing data access models. Discussing information security policies.

Learning Outputs

The students who have succeeded in this course;
Information management. Data access models. Information management legislation. Auditing and certification of information management processes will be though.

Course Content

Introduction of data security principles. Standards defining data security levels. Standards regarding user security levels. Classification of data stored in the information systems. Classification of user access levels from security perspective. Access monitoring, auditing and reporting with respect to defined user and data security levels. Information management strategies and policies. Introducing national and international information management legislation.

Weekly Detailed Course Contents

Week Subject Related Preparation
1) Course outline Lecturer notes
2) Information security and access Lecturer notes
3) Confidentiality levels and access levels Lecturer notes
4) Access models Lecturer notes
5) Confidentiality classification methods Lecturer notes
6) Auditing access Lecturer notes
7) Undeniability of access Lecturer notes
8) Information management concept Lecturer notes
9) Information management policies Lecturer notes
10) Information management standards Lecturer notes
11) Certification of information management Lecturer notes
12) National and international information management principles Lecturer notes
13) Daily topics Lecturer notes
14) Daily topics Lecturer notes

Sources

Course Notes: Management of Information Security, 4th Ed., Michael E. Whitman, Herbert J. Mattord, 2013, Cengage Learning. Fundamentals Of Information Systems Security, 2nd Ed., David Kim, Michael G. Solomon, 2013, Jones & Bartlett Learning.
References: Ders notları

Evaluation System

Semester Requirements Number of Activities Level of Contribution
Attendance 10 % 0
Laboratory 0 % 0
Application 0 % 0
Field Work 0 % 0
Special Course Internship (Work Placement) 0 % 0
Quizzes 0 % 0
Homework Assignments 4 % 10
Presentation 1 % 10
Project 0 % 0
Seminar 0 % 0
Midterms 1 % 20
Preliminary Jury 0 % 0
Final 1 % 60
Paper Submission 0 % 0
Jury 0 % 0
Bütünleme % 0
Total % 100
PERCENTAGE OF SEMESTER WORK % 40
PERCENTAGE OF FINAL WORK % 60
Total % 100

ECTS / Workload Table

Activities Number of Activities Duration (Hours) Workload
Course Hours 14 3 42
Laboratory 0 0 0
Application 0 0 0
Special Course Internship (Work Placement) 0 0 0
Field Work 0 0 0
Study Hours Out of Class 14 12 168
Presentations / Seminar 2 3 6
Project 0 0 0
Homework Assignments 4 8 32
Quizzes 0 0 0
Preliminary Jury 0 0 0
Midterms 1 20 20
Paper Submission 0 0 0
Jury 0 0 0
Final 1 20 20
Total Workload 288

Contribution of Learning Outcomes to Programme Outcomes

No Effect 1 Lowest 2 Low 3 Average 4 High 5 Highest
           
Program Outcomes Level of Contribution
1) Uses basic Software Engineering knowledge and competencies.
2) Applies the software development ability that is necessary for software engineering applications.
3) Uses data structures and applies information about algorithm development.
4) Develops system programs on operating systems.
5) Develops system programs on operating systems.
6) Creates the structure of computer networks and network security.
7) Uses business intelligence, data mining and data analysis tools, applies techniques about them.
8) Develops database applications and WEB based programs.
9) Defines, analyzes, designs and manages information technologies projects.
10) Uses and develops technology-based environments and tools in education.
11) Detects, identifies and solves information technology needs of the business environment.
12) Uses the capabilities of information technologies within the rules of professional responsibility and ethics.