| Academic Unit: |
Computer Engineering Department, Faculty of Engieering and Natural Sciences |
| Mode of Delivery: |
Face to face |
| Prerequisites: |
None |
| Language of Instruction: |
English |
| Level of Course Unit: |
Undergraduate |
| Course Coordinator: |
İlktan AR |
| Course Lecturer(s): |
İlktan AR |
| Course Objectives: |
This course provides a study of cybersecurity terminology, principles, and technologies. Fundamental topics covered include cyber threats and vulnerabilities, information security frameworks, network infrastructure security, wireless network security, cryptography, defence-in-depth security strategy, information security policy, and security management. The goal is to develop a strong foundation for further study in advanced topics of cybersecurity. |
| Course Contents: |
Networks and the Internet, Computer Security, Malware, Encryption, Security Policies, Vulnerability Scanning, and Cybersecurity Engineering. |
| Learning Outcomes of the Course Unit (LO): |
- 1- Ability to explain the fundamental concepts of the cyber security discipline,
- 2- Identify potential cyber-attacks, as well as cyber defence tools, methods and components to repel attacks,
- 3- Explain principles of cybersecurity and how they should be applied in the development of security mechanisms and policies,
- 4- Utilize engineering tools in cybersecurity.
|
| Planned Learning Activities and Teaching Methods: |
Lectures, In-Class discussion. |
| Week | Subjects | Related Preperation |
LO |
| 1 |
Introduction to Computer Security |
Textbook chapter 1. |
1 |
| 2 |
Networks and the Internet |
Textbook chapter 2. |
1 |
| 3 |
Cyber Stalking, Fraud, and Abuse |
Textbook chapter 3. |
1,2 |
| 4 |
Denial of Service Attacks |
Textbook chapter 4. |
1,2 |
| 5 |
Malware |
Textbook chapter 5. |
1,2 |
| 6 |
Techniques Used by Hackers and Industrial Espionage in Cyberspace |
Textbook chapter 6&7. |
1,2 |
| 7 |
First Midterm |
|
1,2 |
| 8 |
Encryption |
Textbook chapter 8. |
1,3 |
| 9 |
Computer Security Technology |
Textbook chapter 9. |
1,3 |
| 10 |
Security Policies |
Textbook chapter 10. |
1,3 |
| 11 |
Network Scanning and Vulnerability Scanning |
Textbook chapter 11. |
1,2,3 |
| 12 |
Second Midterm |
|
1,2,3 |
| 13 |
Introduction to Forensics |
Textbook chapter 14. |
1,2,3,4 |
| 14 |
Cybersecurity Engineering |
Textbook chapter 15. |
1,2,4 |
At Kadir Has University, a Semester is 14 weeks; The weeks 15 and 16 are reserved for final exams.
THE RELATIONSHIP BETWEEN COURSE LEARNING OUTCOMES (LO) AND PROGRAM QUALIFICATIONS (PQ)
| # |
PQ1 |
PQ2 |
PQ3 |
PQ4 |
PQ5 |
PQ6 |
PQ7 |
PQ8 |
PQ9 |
PQ10 |
PQ11 |
| LO1 |
|
|
|
|
|
|
|
|
|
|
|
| LO2 |
|
|
|
|
|
|
|
|
|
|
|
| LO3 |
|
|
|
|
|
|
|
|
|
|
|
| LO4 |
|
|
|
|
|
|
|
|
|
|
|
Contribution: 1 Low, 2 Average, 3 High