COURSE DESCRIPTION AND APPLICATION INFORMATION

Course Name Code Semester T+A+L (hour/week) Type (C / O) Local Credit ECTS
Cybersecurity CMPE 453 Fall 03+00+00 Elective 3 5
Academic Unit: Computer Engineering Department, Faculty of Engieering and Natural Sciences
Mode of Delivery: Face to face
Prerequisites: None
Language of Instruction: English
Level of Course Unit: Undergraduate
Course Coordinator: İlktan AR
Course Lecturer(s): İlktan AR
Course Objectives: This course provides a study of cybersecurity terminology, principles, and technologies. Fundamental topics covered include cyber threats and vulnerabilities, information security frameworks, network infrastructure security, wireless network security, cryptography, defence-in-depth security strategy, information security policy, and security management. The goal is to develop a strong foundation for further study in advanced topics of cybersecurity.
Course Contents: Networks and the Internet, Computer Security, Malware, Encryption, Security Policies, Vulnerability Scanning, and Cybersecurity Engineering.
Learning Outcomes of the Course Unit (LO):
  • 1- Ability to explain the fundamental concepts of the cyber security discipline,
  • 2- Identify potential cyber-attacks, as well as cyber defence tools, methods and components to repel attacks,
  • 3- Explain principles of cybersecurity and how they should be applied in the development of security mechanisms and policies,
  • 4- Utilize engineering tools in cybersecurity.
Planned Learning Activities and Teaching Methods: Lectures, In-Class discussion.


WEEKLY SUBJECTS AND RELATED PREPARATIONS

WeekSubjectsRelated Preperation LO
1 Introduction to Computer Security Textbook chapter 1. 1
2 Networks and the Internet Textbook chapter 2. 1
3 Cyber Stalking, Fraud, and Abuse Textbook chapter 3. 1,2
4 Denial of Service Attacks Textbook chapter 4. 1,2
5 Malware Textbook chapter 5. 1,2
6 Techniques Used by Hackers and Industrial Espionage in Cyberspace Textbook chapter 6&7. 1,2
7 First Midterm 1,2
8 Encryption Textbook chapter 8. 1,3
9 Computer Security Technology Textbook chapter 9. 1,3
10 Security Policies Textbook chapter 10. 1,3
11 Network Scanning and Vulnerability Scanning Textbook chapter 11. 1,2,3
12 Second Midterm 1,2,3
13 Introduction to Forensics Textbook chapter 14. 1,2,3,4
14 Cybersecurity Engineering Textbook chapter 15. 1,2,4


REQUIRED AND RECOMMENDED READING

Easttom, W. (2023). Computer security fundamentals (5th ed.). Pearson IT Cybersecurity Curriculum (ITCC). ISBN-13: 978-0137984787


OTHER COURSE RESOURCES

Lecture notes.


ASSESSMENT METHODS AND CRITERIA

Semester RequirementsNumberPercentage of Grade (%)
Midterms / Oral Exams / Quizes 2 60
Final Exam 1 40
Total: 3 100


WORKLOAD

EventsCountDuration (Hours)Total Workload (hour)
Course Hours14342
Midterms / Oral Exams / Quizes22754
Final Exam12929
Total Workload (hour):125


THE RELATIONSHIP BETWEEN COURSE LEARNING OUTCOMES (LO) AND PROGRAM QUALIFICATIONS (PQ)

# PQ1 PQ2 PQ3 PQ4 PQ5 PQ6 PQ7 PQ8 PQ9 PQ10 PQ11
LO1                      
LO2                      
LO3                      
LO4