Course Objectives: |
This course aims to teach the threats that may occur in computer and network systems, the risks posed by these threats and the measures that can be taken against these threats. |
Course Content: |
Firewall types, intrusion detection and blocking systems, session intervention in TCP / IP communication, Firewall, IDS / IPS and content filtering systems bypass, Web filtering solutions, FTP, DNS, HTTP, HTTPS etc. protocols, vulnerability scanning and discovery systems, security of wireless networks, VPN and encryption technologies, Firefox plug-ins used for security purposes, features of UTM firewall technologies and UTM application control |
Course Learning Outcomes (CLOs) are those describing the knowledge, skills and competencies that students are expected to achieve upon successful completion of the course. In this context, Course Learning Outcomes defined for this course unit are as follows:
|
|
Knowledge
(Described as Theoritical and/or Factual Knowledge.)
|
1) Knows to bypass IDS / IPS and content filtering systems.
|
2) Knows VPN and encryption technologies.
|
3) Knows web filtering solutions.
|
4) Knows UTM security technologies.
|
5) Knows how to interfere with session in TCP / IP communication.
|
Skills
(Describe as Cognitive and/or Practical Skills.)
|
Competences
(Described as "Ability of the learner to apply knowledge and skills autonomously with responsibility", "Learning to learn"," Communication and social" and "Field specific" competences.)
|
Week |
Subject |
Materials Sharing * |
|
Related Preparation |
Further Study |
1) |
Firewall and types |
Cemal Taner, Herkes için Siber Güvenlik, Abaküs Kitap, 2017. Reading the related chapter and other resources to be obtained
|
|
2) |
Intrusion detection and prevention systems |
Cemal Taner, Herkes için Siber Güvenlik, Abaküs Kitap, 2017. Reading the related chapter and other resources to be obtained
|
|
3) |
Session intervention in TCP / IP communication |
Cemal Taner, Herkes için Siber Güvenlik, Abaküs Kitap, 2017. Reading the related chapter and other resources to be obtained
|
|
4) |
Vulnerability scanning and detection systems |
Cemal Taner, Herkes için Siber Güvenlik, Abaküs Kitap, 2017. Reading the related chapter and other resources to be obtained
|
|
5) |
Web filtering solutions |
Cemal Taner, Herkes için Siber Güvenlik, Abaküs Kitap, 2017. Reading the related chapter and other resources to be obtained
|
|
6) |
FTP, DNS, HTTP, HTTPS etc. protocols |
Cemal Taner, Herkes için Siber Güvenlik, Abaküs Kitap, 2017. Reading the related chapter and other resources to be obtained
|
|
7) |
Cloud-based firewall solutions |
Cemal Taner, Herkes için Siber Güvenlik, Abaküs Kitap, 2017. Reading the related chapter and other resources to be obtained
|
|
8) |
Midterm |
|
|
9) |
Security of wireless networks |
Cemal Taner, Herkes için Siber Güvenlik, Abaküs Kitap, 2017. Reading the related chapter and other resources to be obtained
|
|
10) |
VPN and encryption technologies |
Cemal Taner, Herkes için Siber Güvenlik, Abaküs Kitap, 2017. Reading the related chapter and other resources to be obtained
|
|
11) |
UTM technologies |
Cemal Taner, Herkes için Siber Güvenlik, Abaküs Kitap, 2017. Reading the related chapter and other resources to be obtained
|
|
12) |
Features of UTM firewall technologies |
Cemal Taner, Herkes için Siber Güvenlik, Abaküs Kitap, 2017. Reading the related chapter and other resources to be obtained
|
|
13) |
Advanced Logging and Monitoring |
Cemal Taner, Herkes için Siber Güvenlik, Abaküs Kitap, 2017. Reading the related chapter and other resources to be obtained
|
|
14) |
Firewall, IDS / IPS and bypass content filtering systems |
Cemal Taner, Herkes için Siber Güvenlik, Abaküs Kitap, 2017. Reading the related chapter and other resources to be obtained
|
|
15) |
Final |
|
|
Course Notes / Textbooks: |
Cemal Taner, 2019; Herkes için Siber Güvenlik, Abaküs Kitap
|
References: |
Murat Yokuş, 2018; Nmap ile Ağ Keşfi, Pusula Yayıncılık
Mustafa Altınkaynak, 2017; Uygulamalı Siber Güvenlik ve Hacking, Abaküs Kitap
Murat Yıldırımoğlu, 2015; Her Yönüyle İnternetin Altyapısı - TCP / IP, Pusula Yayıncılık
Cemal Taner, 2017; Ağ Yöneticiliğinin Temelleri, Abaküs Kitap
Cebrail Taşkın, 2018; Ağ Teknolojileri ve Telekomünikasyon, Pusula Yayıncılık
Besim Altınok, 2018; Kablosuz Ağ Güvenliği, Abaküs Kitap
Furkan Çontar, 2016; Ağ ve Yazılım Güvenliği, Kodlab
|
|
Programme Learning Outcomes |
Contribution Level (from 1 to 5) |
1) |
Follow the patches of information technology systems published against known cyber security gaps. |
2 |
1) |
Lists the tasks and responsibilities required to identify and prevent any exploitation of hardware. |
1 |
1) |
Acquires competency of analyzing and solving the problems. |
1 |
1) |
Explains the basic, theoretical and practical information in the field of information security technology. |
|
1) |
Experiences all processes in business life. |
1 |
1) |
Defines the corporate cyber security rules and guidelines.
|
4 |
2) |
Lists the tasks and responsibilities required to identify and prevent any abuse that may occur in software components. |
5 |
2) |
Takes part in activities related to the field of education in a business operating in the field. |
1 |
2) |
Know and analyze cyber assets in terms of information security. |
|
2) |
Has awareness for ethical and social responsibility. |
1 |
2) |
Information Security Creates procedure and control components |
5 |
2) |
Explains the importance of authorizing users as much as they can. |
1 |
3) |
Explains the necessary policies and processes for effective event management. |
1 |
3) |
Questions the application with theoretical knowledge. |
5 |
3) |
Identify non-technological tools and methods against cyber attack. |
5 |
3) |
Experience the cyber security risk management system. |
|
3) |
Lists the tasks and responsibilities required to identify and prevent any abuse that may occur in local area networks. |
5 |
3) |
Takes responsibility as a team member in works and operations of his/her field. |
1 |
4) |
Explains the importance of monitoring the cyber systems for the correct structuring of the powers, the realization of the realized, failed or failed cyber attacks, the timely response to the protection and the fulfillment of the legal requirements. |
5 |
4) |
Is aware of written, verbal communication and interaction. |
1 |
4) |
Applies the theoretical knowledge learned in business life for a semester. |
|
4) |
Identifies the methods and methods of technological methods against cyber attack. |
3 |
4) |
Compiles the knowledge and experience gained in the field. |
5 |
5) |
Follows the developments of advanced technology and digital transformation. |
1 |
5) |
Acquires the competencies defined as the institutional outcomes of Beykoz University on the basic level, inline with the expectations of business world and the society. |
|
5) |
User training and security awareness describes the importance of cyberspace. |
2 |
6) |
Acquires the awareness for lifelong learning. |
1 |
6) |
Recall national and international legislation and regulations related to the field of Information Security Technology. |
1 |
7) |
Defines the fundamentals of programming and algorithm information. |
1 |
7) |
Has awareness about citizenship competency. |
1 |
8) |
Evaluates the developments of his/her field with the understanding of an entrepreneur. |
1 |
9) |
Acquires communication in a Foreign Language (English) competence defined on the level of at least A2 in European Language Portfolio. (In programs whose medium of instruction is English, on the level of B1). |
1 |
WORKLOAD OF TEACHING & LEARNING ACTIVITIES |
Teaching & Learning Activities |
# of Activities per semester |
Duration (hour) |
Total Workload |
Course |
14 |
2 |
28 |
Laboratory |
14 |
1 |
14 |
Application |
0 |
0 |
0 |
Special Course Internship (Work Placement) |
0 |
0 |
0 |
Field Work |
0 |
0 |
0 |
Study Hours Out of Class |
0 |
0 |
0 |
Presentations / Seminar |
0 |
0 |
0 |
Project |
0 |
0 |
0 |
Homework Assignments |
1 |
5 |
5 |
Total Workload of Teaching & Learning Activities |
- |
- |
47 |
WORKLOAD OF ASSESMENT & EVALUATION ACTIVITIES |
Assesment & Evaluation Activities |
# of Activities per semester |
Duration (hour) |
Total Workload |
Quizzes |
2 |
8 |
16 |
Midterms |
1 |
12 |
12 |
Semester Final Exam |
1 |
15 |
15 |
Total Workload of Assesment & Evaluation Activities |
- |
- |
43 |
TOTAL WORKLOAD (Teaching & Learning + Assesment & Evaluation Activities) |
90 |
ECTS CREDITS OF THE COURSE (Total Workload/25.5 h) |
4 |