Code |
Name of the Course Unit |
Semester |
In-Class Hours (T+P) |
Credit |
ECTS Credit |
BGT251 |
CYBER SECURITY |
3 |
3 |
3 |
8 |
GENERAL INFORMATION |
Language of Instruction : |
Turkish |
Level of the Course Unit : |
, TYY: + , EQF-LLL: , QF-EHEA: |
Type of the Course : |
Compulsory |
Mode of Delivery of the Course Unit |
- |
Coordinator of the Course Unit |
|
Instructor(s) of the Course Unit |
|
Course Prerequisite |
No |
OBJECTIVES AND CONTENTS |
Objectives of the Course Unit: |
This course aims to provide an understanding of the basic concepts of basic cyber security and to have a general knowledge about internet security along with threats to digital assets in the field of cyber security. |
Contents of the Course Unit: |
This course will cover the basic concepts of cybersecurity, user authentication methods, access controls, cloud computing and database security, malware, DoS and DDoS attacks, intrusion detection and prevention systems (IDS and IPS), buffer overflows, software and operating system security, symmetric encryption, public key cryptography, internet security protocols, wireless network security, and the legal and ethical dimensions of cybersecurity. |
KEY LEARNING OUTCOMES OF THE COURSE UNIT (On successful completion of this course unit, students/learners will or will be able to) |
Explain cybersecurity concepts and learn their fundamental principles. |
Identify security threats and understand appropriate countermeasures. |
Demonstrate appropriate behavior and professional and ethical responsibility in accordance with ethical principles in cybersecurity. |
WEEKLY COURSE CONTENTS AND STUDY MATERIALS FOR PRELIMINARY & FURTHER STUDY |
Week |
Preparatory |
Topics(Subjects) |
Method |
1 |
- |
Cyber Security Basic Concepts |
Lecture, Application |
2 |
Research |
User Authentication |
Lecture, Application |
3 |
Research |
Access Controls |
Lecture, Application |
4 |
Research |
Cloud Computing Security |
Lecture, Application |
5 |
Research |
Database Security |
Lecture, Application |
6 |
Research |
Malware |
Lecture, Application |
7 |
Research |
DoS and DDoS |
Lecture, Application |
8 |
- |
MID-TERM EXAM |
- |
9 |
Research |
IDS |
Lecture, Application |
10 |
Research |
Firewall ve IPS |
Lecture, Application |
11 |
Research |
Buffer Overflow |
Lecture, Application |
12 |
Research |
Software and Operating System Security |
Lecture, Application |
13 |
Research |
Symmetric Encryption, Public Key Cryptography |
Lecture, Application |
14 |
Research |
Internet Security Protocols and Standards |
Lecture, Application |
15 |
Research |
Wireless Network Security, Legal and Ethical Aspects of Cyber Security |
Lecture, Application |
16 |
- |
FINAL EXAM |
- |
17 |
- |
FINAL EXAM |
- |
SOURCE MATERIALS & RECOMMENDED READING |
Computer Security, William Stallings and Lawrie Brown, Pearson Publishing, 3rd Edition |
Pekel, A. (2024). Cyber Security Management; Threats and Countermeasures. |
Özkaya, E. (2019). Cyber Security. Buzdağı Publications. |
Aslanbakan, E. (2016). Cyber Security and Hacking Methods. |
ASSESSMENT |
Assessment & Grading of In-Term Activities |
Number of Activities |
Degree of Contribution (%) |
Description |
Examination Method |
Mid-Term Exam |
1 |
50 |
|
|
Final Exam |
1 |
50 |
|
|
TOTAL |
2 |
100 |
|
|
Level of Contribution |
0 |
1 |
2 |
3 |
4 |
5 |
CONTRIBUTION OF THE COURSE UNIT TO THE PROGRAMME LEARNING OUTCOMES
KNOWLEDGE |
Theoretical |
|
Programme Learning Outcomes |
Level of Contribution |
0 |
1 |
2 |
3 |
4 |
5 |
1 |
Knows the necessary terms and information in the computer field.
|
|
|
|
|
|
|
2 |
Gains knowledge of the concept of information security.
|
|
|
|
|
|
|
KNOWLEDGE |
Factual |
|
Programme Learning Outcomes |
Level of Contribution |
0 |
1 |
2 |
3 |
4 |
5 |
1 |
Gains the ability to learn the necessary concepts in the computer field.
|
|
|
|
|
|
|
SKILLS |
Cognitive |
|
Programme Learning Outcomes |
Level of Contribution |
0 |
1 |
2 |
3 |
4 |
5 |
1 |
Ability to identify, define, formulate and solve complex Information Security problems; for this purpose, the ability to select and apply appropriate analysis and modeling methods
|
|
|
|
|
|
|
SKILLS |
Practical |
|
Programme Learning Outcomes |
Level of Contribution |
0 |
1 |
2 |
3 |
4 |
5 |
1 |
Ability to design a complex computer-based system, process, security to meet specific requirements under realistic constraints and conditions; for this purpose, the ability to apply modern design methods.
|
|
|
|
|
|
|
OCCUPATIONAL |
Autonomy & Responsibility |
|
Programme Learning Outcomes |
Level of Contribution |
0 |
1 |
2 |
3 |
4 |
5 |
1 |
Ability to design, conduct experiments, collect data, analyze and interpret results for examining Information Security problems
|
|
|
|
|
|
|
2 |
Ability to work effectively within the discipline of Information Security and in multi-disciplinary teams; individual study skills
|
|
|
|
|
|
|
3 |
Professional and ethical responsibility awareness
|
|
|
|
|
|
|
4 |
Knowledge of project management and business practices such as risk management and change management; awareness of entrepreneurship, innovation and sustainable development
|
|
|
|
|
|
|
OCCUPATIONAL |
Learning to Learn |
|
Programme Learning Outcomes |
Level of Contribution |
0 |
1 |
2 |
3 |
4 |
5 |
1 |
Ability to develop, select and use modern techniques and tools required for Information Security applications
|
|
|
|
|
|
|
2 |
Awareness of the necessity of lifelong learning; ability to access information, follow developments in science and technology, and constantly renew oneself
|
|
|
|
|
|
|
OCCUPATIONAL |
Communication & Social |
|
Programme Learning Outcomes |
Level of Contribution |
0 |
1 |
2 |
3 |
4 |
5 |
1 |
Ability to communicate effectively in Turkish orally and in writing, foreign language knowledge
|
|
|
|
|
|
|
OCCUPATIONAL |
Occupational and/or Vocational |
|
Programme Learning Outcomes |
Level of Contribution |
0 |
1 |
2 |
3 |
4 |
5 |
1 |
Information about the effects of Information Security practices on health, environment and security in universal and social dimensions and the problems of the age; Awareness of the legal consequences of Information Security solutions
|
|
|
|
|
|
|
WORKLOAD & ECTS CREDITS OF THE COURSE UNIT |
Workload for Learning & Teaching Activities |
Type of the Learning Activites |
Learning Activities (# of week) |
Duration (hours, h) |
Workload (h) |
Lecture & In-Class Activities |
14 |
3 |
42 |
Preliminary & Further Study |
14 |
3 |
42 |
Land Surveying |
0 |
0 |
0 |
Group Work |
2 |
4 |
8 |
Laboratory |
14 |
2 |
28 |
Reading |
0 |
0 |
0 |
Assignment (Homework) |
0 |
0 |
0 |
Project Work |
4 |
4 |
16 |
Seminar |
0 |
0 |
0 |
Internship |
0 |
0 |
0 |
Technical Visit |
0 |
0 |
0 |
Web Based Learning |
0 |
0 |
0 |
Implementation/Application/Practice |
0 |
0 |
0 |
Practice at a workplace |
0 |
0 |
0 |
Occupational Activity |
0 |
0 |
0 |
Social Activity |
0 |
0 |
0 |
Thesis Work |
0 |
0 |
0 |
Field Study |
0 |
0 |
0 |
Report Writing |
0 |
0 |
0 |
Final Exam |
1 |
1 |
1 |
Preparation for the Final Exam |
14 |
3 |
42 |
Mid-Term Exam |
1 |
1 |
1 |
Preparation for the Mid-Term Exam |
7 |
3 |
21 |
Short Exam |
0 |
0 |
0 |
Preparation for the Short Exam |
0 |
0 |
0 |
TOTAL |
71 |
0 |
201 |
|
Total Workload of the Course Unit |
201 |
|
|
Workload (h) / 25.5 |
7,9 |
|
|
ECTS Credits allocated for the Course Unit |
8,0 |
|