|
|||||
Year/Semester of Study | 2 / Fall Semester | ||||
Level of Course | Short Cycle Degree Programme | ||||
Type of Course | Optional | ||||
Department | CONTROL AND AUTOMATION | ||||
Pre-requisities and Co-requisites | None | ||||
Mode of Delivery | Face to Face | ||||
Teaching Period | 14 Weeks | ||||
Name of Lecturer | HİLAL MUTLU (hilalbasal@nevsehir.edu.tr) | ||||
Name of Lecturer(s) | |||||
Language of Instruction | Turkish | ||||
Work Placement(s) | None | ||||
Objectives of the Course | |||||
The aim of this course is to gain knowledge and skills about basic concepts of information security, basic technologies of information security, and fundamentals of information security risk management. |
Learning Outcomes | PO | MME | |
The students who succeeded in this course: | |||
LO-1 | can ensure the security of computer networks and servers used in these networks. |
PO-18 Using information technologies, it presents its knowledge and skills to other people and institutions. When necessary, verbal and written communication facilities are used and act within the framework of professional ethics. PO-28 Practices what they have learned in lessons by using them in a business and learns the working conditions of business life. |
Examination |
LO-2 | can understand the subject of security algorithms for programming. |
PO-7 Creates an algorithm for any program and writes it in at least one of the advanced program languages. PO-28 Practices what they have learned in lessons by using them in a business and learns the working conditions of business life. |
Examination |
LO-3 | can recognize cyber attack methods and ensure that necessary precautions are taken. |
PO-18 Using information technologies, it presents its knowledge and skills to other people and institutions. When necessary, verbal and written communication facilities are used and act within the framework of professional ethics. PO-28 Practices what they have learned in lessons by using them in a business and learns the working conditions of business life. |
Examination |
LO-4 | can perform the monitoring and management of security products. |
PO-18 Using information technologies, it presents its knowledge and skills to other people and institutions. When necessary, verbal and written communication facilities are used and act within the framework of professional ethics. PO-28 Practices what they have learned in lessons by using them in a business and learns the working conditions of business life. |
Examination |
LO-5 | can manage security software and hardware against attack events that require urgent intervention. |
PO-18 Using information technologies, it presents its knowledge and skills to other people and institutions. When necessary, verbal and written communication facilities are used and act within the framework of professional ethics. PO-28 Practices what they have learned in lessons by using them in a business and learns the working conditions of business life. |
Examination |
LO-6 | can comprehend basic level of database and web programming. |
PO-18 Using information technologies, it presents its knowledge and skills to other people and institutions. When necessary, verbal and written communication facilities are used and act within the framework of professional ethics. PO-28 Practices what they have learned in lessons by using them in a business and learns the working conditions of business life. |
Examination |
PO: Programme Outcomes MME:Method of measurement & Evaluation |
Course Contents | ||
Basic introduction to information security and technologies, basic issues in information security, developments in information security technologies, understanding information security using practical and theoretical tools in new media. | ||
Weekly Course Content | ||
Week | Subject | Learning Activities and Teaching Methods |
1 | Definition of information security | Method of Narration |
2 | Technologies used in information security. | Method of Narration |
3 | Management of security products. | Lecture, question answer, discussion |
4 | Privacy and law in information security. | Lecture, question answer, discussion |
5 | Data and network security | Method of Narration |
6 | Communication of network systems | Method of Narration |
7 | Personal information security and importance | Lecture, question answer, discussion |
8 | mid-term exam | |
9 | Cyber attack methods | Lecture, question answer, discussion |
10 | Penetration detection systems | Lecture, question answer, discussion |
11 | Biometric security systems | Lecture, question answer, discussion |
12 | Authorization and encryption | Lecture, question answer, discussion |
13 | Security with encryption: digitaRisk Kontrol Stratejileri l signatures | Lecture, question answer, discussion |
14 | Risk management definition and Risk Assessment | Lecture, question answer, discussion |
15 | Risk Control Strategies | Lecture, question answer, discussion |
16 | final exam | |
Recommend Course Book / Supplementary Book/Reading | ||
1 | Mehmet Uzunoğlu, O. E. (2013). Akıllı Şebekelere Giriş. NOBEL AKADEMİK YAYINCILIK. | |
2 | Keyhani, A. (2013). Yenilenebilir Enerji Sistemlerinde Akıllı Şebeke Tasarımı. TMMOB. | |
Required Course instruments and materials | ||
Assessment Methods | |||
Type of Assessment | Week | Hours | Weight(%) |
mid-term exam | 8 | 1 | 40 |
Other assessment methods | |||
1.Oral Examination | |||
2.Quiz | |||
3.Laboratory exam | |||
4.Presentation | |||
5.Report | |||
6.Workshop | |||
7.Performance Project | |||
8.Term Paper | |||
9.Project | |||
final exam | 16 | 1 | 60 |
Student Work Load | |||
Type of Work | Weekly Hours | Number of Weeks | Work Load |
Weekly Course Hours (Theoretical+Practice) | 3 | 14 | 42 |
Outside Class | |||
a) Reading | 2 | 4 | 8 |
b) Search in internet/Library | 2 | 4 | 8 |
c) Performance Project | 0 | ||
d) Prepare a workshop/Presentation/Report | 2 | 5 | 10 |
e) Term paper/Project | 0 | ||
Oral Examination | 0 | ||
Quiz | 0 | ||
Laboratory exam | 0 | ||
Own study for mid-term exam | 2 | 5 | 10 |
mid-term exam | 1 | 1 | 1 |
Own study for final exam | 2 | 5 | 10 |
final exam | 1 | 1 | 1 |
0 | |||
0 | |||
Total work load; | 90 |