COMPUTER ENGINEERING (ENGLISH, INTEGRATED PHD) | |||||
PhD | TR-NQF-HE: Level 7 | QF-EHEA: Second Cycle | EQF-LLL: Level 7 |
Course Code | Course Name | Semester | Theoretical | Practical | Credit | ECTS |
CYS5123 | Web Application Security: Hacking and Defence | Fall | 3 | 0 | 3 | 6 |
The course opens with the approval of the Department at the beginning of each semester |
Language of instruction: | En |
Type of course: | Departmental Elective |
Course Level: | |
Mode of Delivery: | Face to face |
Course Coordinator : | Assist. Prof. AHMET NACİ ÜNAL |
Course Objectives: | Teaching organizational management methods of information security. Discussing data access models. Discussing information security policies. |
The students who have succeeded in this course; Information management. Data access models. Information management legislation. Auditing and certification of information management processes will be though. |
Introduction of data security principles. Standards defining data security levels. Standards regarding user security levels. Classification of data stored in the information systems. Classification of user access levels from security perspective. Access monitoring, auditing and reporting with respect to defined user and data security levels. Information management strategies and policies. Introducing national and international information management legislation. |
Week | Subject | Related Preparation | |
1) | Course outline | Lecturer notes | |
2) | Information security and access | Lecturer notes | |
3) | Confidentiality levels and access levels | Lecturer notes | |
4) | Access models | Lecturer notes | |
5) | Confidentiality classification methods | Lecturer notes | |
6) | Auditing access | Lecturer notes | |
7) | Undeniability of access | Lecturer notes | |
8) | Information management concept | Lecturer notes | |
9) | Information management policies | Lecturer notes | |
10) | Information management standards | Lecturer notes | |
11) | Certification of information management | Lecturer notes | |
12) | National and international information management principles | Lecturer notes | |
13) | Daily topics | Lecturer notes | |
14) | Daily topics | Lecturer notes |
Course Notes: | Management of Information Security, 4th Ed., Michael E. Whitman, Herbert J. Mattord, 2013, Cengage Learning. Fundamentals Of Information Systems Security, 2nd Ed., David Kim, Michael G. Solomon, 2013, Jones & Bartlett Learning. |
References: | Ders notları |
Semester Requirements | Number of Activities | Level of Contribution |
Attendance | 10 | % 0 |
Laboratory | 0 | % 0 |
Application | 0 | % 0 |
Field Work | 0 | % 0 |
Special Course Internship (Work Placement) | 0 | % 0 |
Quizzes | 0 | % 0 |
Homework Assignments | 4 | % 10 |
Presentation | 1 | % 10 |
Project | 0 | % 0 |
Seminar | 0 | % 0 |
Midterms | 1 | % 20 |
Preliminary Jury | 0 | % 0 |
Final | 1 | % 60 |
Paper Submission | 0 | % 0 |
Jury | 0 | % 0 |
Bütünleme | % 0 | |
Total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 40 | |
PERCENTAGE OF FINAL WORK | % 60 | |
Total | % 100 |
Activities | Number of Activities | Duration (Hours) | Workload |
Course Hours | 14 | 3 | 42 |
Laboratory | 0 | 0 | 0 |
Application | 0 | 0 | 0 |
Special Course Internship (Work Placement) | 0 | 0 | 0 |
Field Work | 0 | 0 | 0 |
Study Hours Out of Class | 14 | 12 | 168 |
Presentations / Seminar | 2 | 3 | 6 |
Project | 0 | 0 | 0 |
Homework Assignments | 4 | 8 | 32 |
Quizzes | 0 | 0 | 0 |
Preliminary Jury | 0 | 0 | 0 |
Midterms | 1 | 20 | 20 |
Paper Submission | 0 | 0 | 0 |
Jury | 0 | 0 | 0 |
Final | 1 | 20 | 20 |
Total Workload | 288 |
No Effect | 1 Lowest | 2 Low | 3 Average | 4 High | 5 Highest |
Program Outcomes | Level of Contribution |