1 |
Review of relevant sections of lecture notes |
Introduction to Cyber Law and Cyber Crimes (Basic Concepts, Definitions) |
1: Lecture, 2: Question-Answer, 3: Discussion |
2 |
Review of relevant sections of lecture notes |
Cyber Crimes and Example Cases |
1: Lecture, 2: Question-Answer, 3: Discussion |
3 |
Review of relevant sections of lecture notes |
Cyber Crimes and Their Types in Turkey and the World |
1: Lecture, 2: Question-Answer, 3: Discussion |
4 |
Review of relevant sections of lecture notes |
Entering the Information System |
1: Lecture, 2: Question-Answer, 3: Discussion |
5 |
Review of relevant sections of lecture notes |
Blocking, Disrupting, Destroying, or Changing the Information System |
1: Lecture, 2: Question-Answer, 3: Discussion |
6 |
Review of relevant sections of lecture notes |
Abuse of Debit and Credit Cards; Online Fraud |
1: Lecture, 2: Question-Answer, 3: Discussion |
7 |
Review of relevant sections of lecture notes |
Search, Copy, and Seizure of Computers, Computer Programs, and Files |
1: Lecture, 2: Question-Answer, 3: Discussion |
8 |
- |
MID-TERM EXAM |
- |
9 |
Review of relevant sections of lecture notes |
European Convention on Cybercrime, Council of Europe Digital Evidence Guide and International Legislation |
1: Lecture, 2: Question-Answer, 3: Discussion |
10 |
Review of relevant sections of lecture notes |
Law No. 5561 and Internet Access Blockages, Responsibilities of Internet Service Providers |
1: Lecture, 2: Question-Answer, 3: Discussion |
11 |
Review of relevant sections of lecture notes |
Personal Data Protection Law (Concept of Data and Protection of Personal Data) |
1: Lecture, 2: Question-Answer, 3: Discussion |
12 |
Review of relevant sections of lecture notes |
Electronic Commerce |
1: Lecture, 2: Question-Answer, 3: Discussion |
13 |
Review of relevant sections of lecture notes |
Fundamentals of Computer Forensics, Environments where evidence can be found, Computer Forensics Tools |
1: Lecture, 2: Question-Answer, 3: Discussion |
14 |
Review of relevant sections of lecture notes |
Intervention in Cyber Crimes, and Crime Scene Investigation Expert Witness Legislation B |
1: Lecture, 2: Question-Answer, 3: Discussion |
15 |
Review of relevant sections of lecture notes |
Preparation of Expert Report, Examination of Case Studies |
1: Lecture, 2: Question-Answer, 3: Discussion |
16 |
- |
FINAL EXAM |
- |
17 |
- |
FINAL EXAM |
- |