1 |
Literature Review |
Introduction to Cyber Security |
Lecture |
2 |
Literature Review |
Relations Between New Media and Cyber Security |
Lecture |
3 |
Literature Review |
Malicious Software, Web Attacks and Counter Measures |
Lecture |
4 |
Literature Review, Using Visual and Written Sources |
Computer Forensics and Cybercrime |
Lecture & Question and Answer & Discussion |
5 |
Literature Review, Using Visual and Written Sources |
Cybercrime |
Lecture & Question and Answer & Discussion |
6 |
Literature Review, Using Visual and Written Sources |
Resistance to Cybercrime |
Lecture & Question and Answer & Discussion |
7 |
Literature Review |
Operating System and Network Security |
Lecture |
8 |
- |
MID-TERM EXAM |
- |
9 |
Literature Review |
Cloud Computing, Data Base, Security of Data Warehouse |
Lecture |
10 |
Literature Review, Using Visual and Written Sources |
Electronic Commerce and Cyber Security |
Lecture & Question and Answer & Discussion |
11 |
Literature Review, Using Visual and Written Sources |
Personal Data Protection. Authors Royalties and Cyber Security |
Lecture & Question and Answer & Discussion |
12 |
Literature Review, Using Visual and Written Sources |
Social engineering, Propaganda and Social Effects |
Lecture & Question and Answer & Discussion |
13 |
Literature Review, Using Visual and Written Sources |
Cyber World, Network Society, Cyber Culture |
Lecture |
14 |
Literature Review, Using Visual and Written Sources |
Cyber World, Network Society, Cyber Culture |
Lecture |
15 |
Literature Review, Using Visual and Written Sources |
Cyber Warfare and Cyber Terrorism |
Lecture & Question and Answer & Discussion |
16 |
- |
FINAL EXAM |
- |
17 |
- |
FINAL EXAM |
- |