Learning Outcomes |
PO |
MME |
The students who succeeded in this course: |
|
|
LO-1 |
It will have general information about internet and web architecture. |
PO-49 Have knowledge about internet security.
|
Examination Oral Examination |
LO-2 |
Detecting and preventing attacks on Web application servers |
PO-49 Have knowledge about internet security.
|
Examination Oral Examination |
LO-3 |
The servers will be able to make the necessary security settings. |
PO-49 Have knowledge about internet security.
|
Examination Oral Examination |
LO-4 |
They will be able to do backup systems. |
PO-49 Have knowledge about internet security.
|
Examination Oral Examination |
PO: Programme Outcomes MME:Method of measurement & Evaluation |
Course Contents |
Web Applications Concepts of Security, Data and Information Concepts, Ethernet Technology, Ethernet and OSI Models, Wireless Technologies, Mobile Phone Technologies, MAC and IP Network Elements, Network Attack Risks, Network Communication Threats, Social Engineering Concepts, Attack Methods, Security Methods, tools and applications, Emergency planning, Network troubleshooting. |
Weekly Course Content |
Week |
Subject |
Learning Activities and Teaching Methods |
1 |
Web Applications Security Concept |
Lecture, Question and Answer |
2 |
Data and information concepts |
Lecture, Question and Answer |
3 |
Ethernet Technology |
Lecture, Question and Answer |
4 |
Ethernet and OSI Model |
Lecture, Question and Answer |
5 |
Wireless Technologies |
Lecture, Question and Answer |
6 |
Mobile Phone Technologies |
Lecture, Question and Answer |
7 |
Network connectors
MAC and IP concepts |
Lecture, Question and Answer |
8 |
mid-term exam |
|
9 |
Network attack risks
Network communication threats |
Lecture, Question and Answer |
10 |
Social engineering concept
Attack methods |
Lecture, Question and Answer |
11 |
Security methods, tools and applications |
Lecture, Question and Answer |
12 |
Emergency planning |
Lecture, Question and Answer |
13 |
Network troubleshooting |
Lecture, Question and Answer |
14 |
Student presentations |
Lecture, Question and Answer |
15 |
Student presentations |
Lecture, Question and Answer |
16 |
final exam |
|
Recommend Course Book / Supplementary Book/Reading |
1 |
Ders slaytları, çıktıları. |
2 |
Ağ ve Yazılım Güvenliği, Furkan ÇONTAR, KODLAB |
3 |
Bilgisayar Ağlarında Saldırı ve Savunma, Gökhan USTA, Seçkin Yayıncılık |
4 |
Bilgi Sistemleri Güvenliğinin Temelleri, David Kim, Michael G. Solomon, Çeviri Editörü: Dr.Öğr.Üyesi Özgü CAN, Nobel Yayıncılık |
Required Course instruments and materials |
Lecture notes, Projector, Computer |