Course Information


Course Information
Course Title Code Semester L+U Hour Credits ECTS
CYBER SECURITY 805100715040 3 + 0 3.0 8.0

Prerequisites None

Language of Instruction Turkish
Course Level Graduate Degree
Course Type Compulsory
Mode of delivery
Course Coordinator
Instructors Erinç KARATAŞ
Assistants
Goals The main aim of the course is to provide the understanding of information security by using practical and theoretical tools. It is designed to provide students with the basic topics and discussions on information security and the developments in information security technologies.
Course Content Overview of Information Security, Information Security Technical Infrastructure Components; CIA approach; Information Security Threats, Information Security Program Structure, Information Security Policies, Asset Classification and Evaluation, Access Control, Physical Security, ISO27001 Information Security Standard, Information Security Related Legislation , Information Security-Oriented IT Management, Encryption Tools. User Authorization Approval. Access Control. Intrusion Detection. Malware. Service-Blocking Attacks. Firewalls. Secure Transactions. Buffer Overflow. Software Security. Physical Security The Human Factor. Symmetric encryption and message security. Projects.
Learning Outcomes 1) To learn concepts related to information security and its technologies
2) To learn the use and theories of information security models
3) To develop an understanding for Information Security infrastructure technologies and strategies
4) Safety analysis for the given case and learn what measures to take

Weekly Topics (Content)
Week Topics Teaching and Learning Methods and Techniques Study Materials
1. Week Overview of Information Security Concept; Information Security Technical Infrastructure Elements; CIA approach Lecture

Problem Based Learning
Activity (Web Search, Library Work, Trip, Observation, Interview etc.)
2. Week Information Security Threats; Structure of Information Security Program; Information Security Policies; Asset Classification and Evaluation; Lecture

Problem Based Learning
Activity (Web Search, Library Work, Trip, Observation, Interview etc.)
3. Week Access Control; Physical Security Lecture

Problem Based Learning
Activity (Web Search, Library Work, Trip, Observation, Interview etc.)
4. Week ISO27001 Information Security Standard Lecture

Problem Based Learning
Activity (Web Search, Library Work, Trip, Observation, Interview etc.)
5. Week Information Security Focused IT Management Lecture

Problem Based Learning
Activity (Web Search, Library Work, Trip, Observation, Interview etc.)
6. Week Encryption Tools Lecture

Problem Based Learning
Activity (Web Search, Library Work, Trip, Observation, Interview etc.)
7. Week User Authorization Approval. Access Controlled. Intrusion Detection. Malware Software Lecture

Problem Based Learning
Activity (Web Search, Library Work, Trip, Observation, Interview etc.)
8. Week Denial of Service Attacks Lecture

Problem Based Learning
Activity (Web Search, Library Work, Trip, Observation, Interview etc.)
9. Week Firewalls. Secure Transaction. Buffer Overflow Errors Lecture

Problem Based Learning
Activity (Web Search, Library Work, Trip, Observation, Interview etc.)
10. Week Software Security. Physical Security and Human Factor Lecture

Problem Based Learning
Activity (Web Search, Library Work, Trip, Observation, Interview etc.)
11. Week Symmetric encryption and Message Security Lecture

Problem Based Learning
Activity (Web Search, Library Work, Trip, Observation, Interview etc.)
12. Week Legal Regulations on Information Security Lecture

Problem Based Learning
Activity (Web Search, Library Work, Trip, Observation, Interview etc.)
13. Week Evaluation of Student Projects Discussion

Activity (Web Search, Library Work, Trip, Observation, Interview etc.)
14. Week Evaluation of Student Projects Discussion

Activity (Web Search, Library Work, Trip, Observation, Interview etc.)

Sources Used in This Course
Recommended Sources
Cryptography and Network Security (4th Edition) Principles and Practices, William Stallings
Merkow. ,S. M. (2005). Information security: Principles and Practices (2nd Edition).
Nayak, U. And Rao, U. (2014). The InfoSec Handbook: An Introduction to Information Security.
Raggad, B. G. (2010). Information Security Management: Concepts and Practice.

Relations with Education Attainment Program Course Competencies
Program RequirementsContribution LevelDK1DK2DK3DK4
PY154000
PY1850500
PY2550050
PY3050004

*DK = Course's Contrubution.
0 1 2 3 4 5
Level of contribution None Very Low Low Fair High Very High
.

ECTS credits and course workload
Event Quantity Duration (Hour) Total Workload (Hour)
Course Duration (Total weeks*Hours per week) 14 3
Work Hour outside Classroom (Preparation, strengthening) 14 3
Homework 14 3
Midterm Exam 1 1
Time to prepare for Midterm Exam 1 20
Final Exam 1 1
Time to prepare for Final Exam 1 50
14 3
Total Workload
Total Workload / 30 (s)
ECTS Credit of the Course
Quick Access Hızlı Erişim Genişlet
Course Information