Learning Outcomes |
PO |
MME |
The students who succeeded in this course: |
|
|
LO-1 |
Know the concepts of cybercrime and ethics |
PO-8 Has information about Windows and Linux based networks PO-19 Have a basic knowledge and skills about computer electronics, operating and network systems and make installation, maintenance and repair.
|
Examination |
LO-2 |
Knows the safe structures that can be used in network design |
PO-6 Determines software and hardware problems and finds solutions PO-17 Make installation and maintenance the system, if necessary, with a knowledge and skill of knowing and using the tools, machines and apparatus in the field of computer programming. PO-19 Have a basic knowledge and skills about computer electronics, operating and network systems and make installation, maintenance and repair.
|
Examination |
LO-3 |
Have information about encryption methods |
PO-19 Have a basic knowledge and skills about computer electronics, operating and network systems and make installation, maintenance and repair.
|
|
PO: Programme Outcomes MME:Method of measurement & Evaluation |
Course Contents |
To have knowledge about cybercrime, to provide network structures and security, to recognize and configure firewalls. Manage network devices. Securing servers. |
Weekly Course Content |
Week |
Subject |
Learning Activities and Teaching Methods |
1 |
Information Security, What is Cyber Security? |
Lecture, Question & Answer |
2 |
Encryption methods. Authentication of identity and information content. |
Lecture, Question & Answer |
3 |
Security in wireless networks |
Lecture, Question & Answer |
4 |
Firewalls and configuration |
Lecture
Laboratory Applications
Question answer |
5 |
Antivirus software and intrusion detection systems. DDoS blocking systems. |
Lecture, Question & Answer |
6 |
Hidden channels and tunneling in TCP / IP |
Lecture, Question & Answer |
7 |
Virtual Private Networks (VPN) and related security methods |
Lecture, Question & Answer |
8 |
mid-term exam |
|
9 |
Cyber Attack Methods-
Information Collection Tools |
Lecture
Laboratory Applications
Question answer |
10 |
Scan and Vulnerability Detection Password cracking tools |
Lecture
Laboratory Applications
Question answer |
11 |
Penetration tests |
Lecture
Laboratory Applications
Question answer |
12 |
WEb Security - Attack and Detection Methods |
Lecture
Laboratory Applications
Question answer |
13 |
Secure network architecture. Hardware security and protection |
Lecture
Laboratory Applications
Question answer |
14 |
Security in web applications |
Lecture, Question & Answer |
15 |
The Legal Aspects of Cyber Security and Forensic Informatics |
Lecture, Question & Answer |
16 |
final exam |
|
Recommend Course Book / Supplementary Book/Reading |
1 |
Altuntaş, A., & YAYIN, K. (2021). Kali Linux (Vol. 159). KODLAB YAYIN DAĞITIM YAZILIM LTD. ŞTİ.. |
2 |
Altınkaynak, M. (2018). Uygulamalı Siber Güvenlik ve Hacking. Abaküs Yayınları, İstanbul. |
Required Course instruments and materials |
Projection, computer. |