| 1 | 
                                Review of relevant sections of lecture notes | 
                                Introduction to Cyber Law and Cyber Crimes (Basic Concepts, Definitions) | 
                                1: Lecture, 2: Question-Answer, 3: Discussion | 
                            
                            
                                | 2 | 
                                Review of relevant sections of lecture notes | 
                                Cyber Crimes and Example Cases | 
                                1: Lecture, 2: Question-Answer, 3: Discussion | 
                            
                            
                                | 3 | 
                                Review of relevant sections of lecture notes | 
                                Cyber Crimes and Their Types in Turkey and the World | 
                                1: Lecture, 2: Question-Answer, 3: Discussion | 
                            
                            
                                | 4 | 
                                Review of relevant sections of lecture notes | 
                                Entering the Information System | 
                                1: Lecture, 2: Question-Answer, 3: Discussion | 
                            
                            
                                | 5 | 
                                Review of relevant sections of lecture notes | 
                                Blocking, Disrupting, Destroying, or Changing the Information System | 
                                1: Lecture, 2: Question-Answer, 3: Discussion | 
                            
                            
                                | 6 | 
                                Review of relevant sections of lecture notes | 
                                Abuse of Debit and Credit Cards; Online Fraud | 
                                1: Lecture, 2: Question-Answer, 3: Discussion | 
                            
                            
                                | 7 | 
                                Review of relevant sections of lecture notes | 
                                Search, Copy, and Seizure of Computers, Computer Programs, and Files | 
                                1: Lecture, 2: Question-Answer, 3: Discussion | 
                            
                            
                                | 8 | 
                                Review of relevant sections of lecture notes | 
                                European Convention on Cybercrime, Council of Europe Digital Evidence Guide and International Legislation | 
                                1: Lecture, 2: Question-Answer, 3: Discussion | 
                            
                            
                                | 9 | 
                                Review of relevant sections of lecture notes | 
                                Law No. 5561 and Internet Access Blockages, Responsibilities of Internet Service Providers | 
                                1: Lecture, 2: Question-Answer, 3: Discussion | 
                            
                            
                                | 10 | 
                                - | 
                                MID-TERM EXAM | 
                                - | 
                            
                            
                                | 11 | 
                                Review of relevant sections of lecture notes | 
                                Personal Data Protection Law (Concept of Data and Protection of Personal Data) | 
                                1: Lecture, 2: Question-Answer, 3: Discussion | 
                            
                            
                                | 12 | 
                                Review of relevant sections of lecture notes | 
                                Electronic Commerce | 
                                1: Lecture, 2: Question-Answer, 3: Discussion | 
                            
                            
                                | 13 | 
                                Review of relevant sections of lecture notes | 
                                Fundamentals of Computer Forensics, Environments where evidence can be found, Computer Forensics Tools | 
                                1: Lecture, 2: Question-Answer, 3: Discussion | 
                            
                            
                                | 14 | 
                                Review of relevant sections of lecture notes | 
                                Intervention in Cyber Crimes, and Crime Scene Investigation Expert Witness Legislation B | 
                                1: Lecture, 2: Question-Answer, 3: Discussion | 
                            
                            
                                | 15 | 
                                Review of relevant sections of lecture notes | 
                                Preparation of Expert Report, Examination of Case Studies | 
                                1: Lecture, 2: Question-Answer, 3: Discussion | 
                            
                            
                                | 16 | 
                                - | 
                                FINAL EXAM | 
                                - | 
                            
                            
                                | 17 | 
                                - | 
                                FINAL EXAM | 
                                - |