| 1 |
Review of relevant sections of lecture notes |
Introduction to Cyber Law and Cyber Crimes (Basic Concepts, Definitions) |
1: Lecture, 2: Question-Answer, 3: Discussion |
| 2 |
Review of relevant sections of lecture notes |
Cyber Crimes and Example Cases |
1: Lecture, 2: Question-Answer, 3: Discussion |
| 3 |
Review of relevant sections of lecture notes |
Cyber Crimes and Their Types in Turkey and the World |
1: Lecture, 2: Question-Answer, 3: Discussion |
| 4 |
Review of relevant sections of lecture notes |
Entering the Information System |
1: Lecture, 2: Question-Answer, 3: Discussion |
| 5 |
Review of relevant sections of lecture notes |
Blocking, Disrupting, Destroying, or Changing the Information System |
1: Lecture, 2: Question-Answer, 3: Discussion |
| 6 |
Review of relevant sections of lecture notes |
Abuse of Debit and Credit Cards; Online Fraud |
1: Lecture, 2: Question-Answer, 3: Discussion |
| 7 |
Review of relevant sections of lecture notes |
Search, Copy, and Seizure of Computers, Computer Programs, and Files |
1: Lecture, 2: Question-Answer, 3: Discussion |
| 8 |
Review of relevant sections of lecture notes |
European Convention on Cybercrime, Council of Europe Digital Evidence Guide and International Legislation |
1: Lecture, 2: Question-Answer, 3: Discussion |
| 9 |
Review of relevant sections of lecture notes |
Law No. 5561 and Internet Access Blockages, Responsibilities of Internet Service Providers |
1: Lecture, 2: Question-Answer, 3: Discussion |
| 10 |
- |
MID-TERM EXAM |
- |
| 11 |
Review of relevant sections of lecture notes |
Personal Data Protection Law (Concept of Data and Protection of Personal Data) |
1: Lecture, 2: Question-Answer, 3: Discussion |
| 12 |
Review of relevant sections of lecture notes |
Electronic Commerce |
1: Lecture, 2: Question-Answer, 3: Discussion |
| 13 |
Review of relevant sections of lecture notes |
Fundamentals of Computer Forensics, Environments where evidence can be found, Computer Forensics Tools |
1: Lecture, 2: Question-Answer, 3: Discussion |
| 14 |
Review of relevant sections of lecture notes |
Intervention in Cyber Crimes, and Crime Scene Investigation Expert Witness Legislation B |
1: Lecture, 2: Question-Answer, 3: Discussion |
| 15 |
Review of relevant sections of lecture notes |
Preparation of Expert Report, Examination of Case Studies |
1: Lecture, 2: Question-Answer, 3: Discussion |
| 16 |
- |
FINAL EXAM |
- |
| 17 |
- |
FINAL EXAM |
- |