Nevşehir Hacı Bektaş Veli University Course Catalogue

Information Of Programmes

VOCATIONAL SCHOOL OF NEVŞEHİR / KNT217 - CONTROL AND AUTOMATION

Code: KNT217 Course Title: SMART GRIDS Theoretical+Practice: 2+1 ECTS: 3
Year/Semester of Study 2 / Fall Semester
Level of Course Short Cycle Degree Programme
Type of Course Optional
Department CONTROL AND AUTOMATION
Pre-requisities and Co-requisites None
Mode of Delivery Face to Face
Teaching Period 14 Weeks
Name of Lecturer HİLAL MUTLU (hilalbasal@nevsehir.edu.tr)
Name of Lecturer(s)
Language of Instruction Turkish
Work Placement(s) None
Objectives of the Course
The aim of this course is to gain knowledge and skills about basic concepts of information security, basic technologies of information security, and fundamentals of information security risk management.

Learning Outcomes PO MME
The students who succeeded in this course:
LO-1 can ensure the security of computer networks and servers used in these networks. PO-18 Using information technologies, it presents its knowledge and skills to other people and institutions. When necessary, verbal and written communication facilities are used and act within the framework of professional ethics.
PO-28 Practices what they have learned in lessons by using them in a business and learns the working conditions of business life.
Examination
LO-2 can understand the subject of security algorithms for programming. PO-7 Creates an algorithm for any program and writes it in at least one of the advanced program languages.
PO-28 Practices what they have learned in lessons by using them in a business and learns the working conditions of business life.
Examination
LO-3 can recognize cyber attack methods and ensure that necessary precautions are taken. PO-18 Using information technologies, it presents its knowledge and skills to other people and institutions. When necessary, verbal and written communication facilities are used and act within the framework of professional ethics.
PO-28 Practices what they have learned in lessons by using them in a business and learns the working conditions of business life.
Examination
LO-4 can perform the monitoring and management of security products. PO-18 Using information technologies, it presents its knowledge and skills to other people and institutions. When necessary, verbal and written communication facilities are used and act within the framework of professional ethics.
PO-28 Practices what they have learned in lessons by using them in a business and learns the working conditions of business life.
Examination
LO-5 can manage security software and hardware against attack events that require urgent intervention. PO-18 Using information technologies, it presents its knowledge and skills to other people and institutions. When necessary, verbal and written communication facilities are used and act within the framework of professional ethics.
PO-28 Practices what they have learned in lessons by using them in a business and learns the working conditions of business life.
Examination
LO-6 can comprehend basic level of database and web programming. PO-18 Using information technologies, it presents its knowledge and skills to other people and institutions. When necessary, verbal and written communication facilities are used and act within the framework of professional ethics.
PO-28 Practices what they have learned in lessons by using them in a business and learns the working conditions of business life.
Examination
PO: Programme Outcomes
MME:Method of measurement & Evaluation

Course Contents
Basic introduction to information security and technologies, basic issues in information security, developments in information security technologies, understanding information security using practical and theoretical tools in new media.
Weekly Course Content
Week Subject Learning Activities and Teaching Methods
1 Definition of information security Method of Narration
2 Technologies used in information security. Method of Narration
3 Management of security products. Lecture, question answer, discussion
4 Privacy and law in information security. Lecture, question answer, discussion
5 Data and network security Method of Narration
6 Communication of network systems Method of Narration
7 Personal information security and importance Lecture, question answer, discussion
8 mid-term exam
9 Cyber ​​attack methods Lecture, question answer, discussion
10 Penetration detection systems Lecture, question answer, discussion
11 Biometric security systems Lecture, question answer, discussion
12 Authorization and encryption Lecture, question answer, discussion
13 Security with encryption: digitaRisk Kontrol Stratejileri l signatures Lecture, question answer, discussion
14 Risk management definition and Risk Assessment Lecture, question answer, discussion
15 Risk Control Strategies Lecture, question answer, discussion
16 final exam
Recommend Course Book / Supplementary Book/Reading
1 Mehmet Uzunoğlu, O. E. (2013). Akıllı Şebekelere Giriş. NOBEL AKADEMİK YAYINCILIK.
2 Keyhani, A. (2013). Yenilenebilir Enerji Sistemlerinde Akıllı Şebeke Tasarımı. TMMOB.
Required Course instruments and materials

Assessment Methods
Type of Assessment Week Hours Weight(%)
mid-term exam 8 1 40
Other assessment methods
1.Oral Examination
2.Quiz
3.Laboratory exam
4.Presentation
5.Report
6.Workshop
7.Performance Project
8.Term Paper
9.Project
final exam 16 1 60

Student Work Load
Type of Work Weekly Hours Number of Weeks Work Load
Weekly Course Hours (Theoretical+Practice) 3 14 42
Outside Class
       a) Reading 2 4 8
       b) Search in internet/Library 2 4 8
       c) Performance Project 0
       d) Prepare a workshop/Presentation/Report 2 5 10
       e) Term paper/Project 0
Oral Examination 0
Quiz 0
Laboratory exam 0
Own study for mid-term exam 2 5 10
mid-term exam 1 1 1
Own study for final exam 2 5 10
final exam 1 1 1
0
0
Total work load; 90