Course Information


Course Information
Course Title Code Semester L+U Hour Credits ECTS
INTRODUCTION TO CYBERSECURITY SGM109 1. Semester 2 + 0 2.0 4.0

Prerequisites None

Language of Instruction Turkish
Course Level Associate's Degree
Course Type Compulsory
Mode of delivery
Course Coordinator
Instructors Mehmet Batuhan ÖZDAŞ
Assistants
Goals The course aims to introduce students to cybersecurity, covering basic concepts, defense and attack methods in the 'Cybersecurity Analyst and Operator' program. Students learn about cyber threats, attacker motivations, and gain knowledge on protecting systems and networks. Ethical considerations are emphasized, promoting compliance with laws and ethical boundaries. The course raises awareness about internet security and cybersecurity culture.
Course Content Cyber Ethics, Cryptography Building Blocks, User Authentication Passwords, Biometrics, and Alternatives, Authentication Protocols and Key Establishment, Operating System Security and Access Control, Software Security, Exploits and Privilege Escalation, Malicious Software, Public Key Certificate Management and Usage Examples, Web and Browser Security, Personal Data Rights, GDPR/KVKK Regulations, Firewalls and Tunnels, Intrusion Detection and Network-Based Attacks
Learning Outcomes 1) Have awareness about ethical boundaries and demonstrate behaviour in accordance with laws and regulations in internet usage, digital interactions, and cybersecurity applications
2) Explain fundamental concepts in the field of cybersecurity, such as information security, cyber attacks, security policies, firewalls, malicious software, and authentication; Establish relationships between these concepts and relevant key terms.
3) Recognize and analyse different types of cyber threats. Comprehend attack methods and common techniques that cyber attackers can use. Gain a basic understanding to develop defense strategies

Weekly Topics (Content)
Week Topics Teaching and Learning Methods and Techniques Study Materials
1. Week Fundamental Concepts Lecture; Question Answer; Problem Solving

Problem Based Learning
Homework Presentation (Including Preparation Time)
2. Week Basic Principles, Cyber Ethics Lecture; Question Answer; Problem Solving

Problem Based Learning
Homework Presentation (Including Preparation Time)
3. Week Cryptography Building Blocks Lecture; Question Answer; Problem Solving

Problem Based Learning
Homework Presentation (Including Preparation Time)
4. Week User Authentication Lecture; Question Answer; Problem Solving

Problem Based Learning
Homework Presentation (Including Preparation Time)
5. Week Passwords, Biometrics, and Alternatives Lecture; Question Answer; Problem Solving

Problem Based Learning
Homework Presentation (Including Preparation Time)
6. Week Authentication Protocols and Key Establishment Lecture; Question Answer; Problem Solving

Problem Based Learning
Homework Presentation (Including Preparation Time)
7. Week Operating System Security and Access Control Lecture; Question Answer; Problem Solving

Problem Based Learning
Homework Presentation (Including Preparation Time)
8. Week Midterm Exam, Software Security Lecture; Question Answer; Problem Solving

Problem Based Learning
Homework Presentation (Including Preparation Time)
9. Week Exploits and Privilege Escalation Lecture; Question Answer; Problem Solving

Problem Based Learning
Homework Presentation (Including Preparation Time)
10. Week Malicious Software Lecture; Question Answer; Problem Solving

Problem Based Learning
Homework Presentation (Including Preparation Time)
11. Week Public Key Certificate Management and Usage Examples Lecture; Question Answer; Problem Solving

Problem Based Learning
Homework Presentation (Including Preparation Time)
12. Week Web and Browser Security, Personal Data Rights, GDPR/KVKK Regulations Lecture; Question Answer; Problem Solving

Problem Based Learning
Homework Presentation (Including Preparation Time)
13. Week Firewalls and Tunnels Lecture; Question Answer; Problem Solving

Problem Based Learning
Homework Presentation (Including Preparation Time)
14. Week Intrusion Detection and Network-Based Attacks Lecture; Question Answer; Problem Solving

Problem Based Learning
Homework Presentation (Including Preparation Time)

Sources Used in This Course
Recommended Sources
Paul C. van Oorschot, Siber Güvenliğe Giriş, çeviri: Prof. Dr. Kemal Bıçakcı (2021), Palme Yayınevi.
Paul C. van Oorschot. Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin (2021), Springer.

Relations with Education Attainment Program Course Competencies
Program RequirementsContribution LevelDK1DK2DK3
PY15000
PY25055
PY35000
PY45005
PY55000

*DK = Course's Contrubution.
0 1 2 3 4 5
Level of contribution None Very Low Low Fair High Very High
.

ECTS credits and course workload
Event Quantity Duration (Hour) Total Workload (Hour)
Course Duration (Total weeks*Hours per week) 14 2
Work Hour outside Classroom (Preparation, strengthening) 14 3
Homework 3 6
Quiz 5 1
Midterm Exam 1 2
Time to prepare for Midterm Exam 1 8
Final Exam 1 2
Time to prepare for Final Exam 1 14
Total Workload
Total Workload / 30 (s)
ECTS Credit of the Course
Quick Access Hızlı Erişim Genişlet
Course Information