Course Learning Outcomes (CLOs) are those describing the knowledge, skills and competencies that students are expected to achieve upon successful completion of the course. In this context, Course Learning Outcomes defined for this course unit are as follows:
| Week |
Subject |
Materials Sharing * |
|
Related Preparation |
Further Study |
| 1) |
Introduction to database and security
|
Yusuf Anıl Akduygu, Oracle Veritabanı Güvenliği ve Sızma Testleri, Kodlab Yayıncılık, 2018. Reading the related chapter and other resources to be obtained
|
|
| 2) |
DDL and DML statements
|
Yusuf Anıl Akduygu, Oracle Veritabanı Güvenliği ve Sızma Testleri, Kodlab Yayıncılık, 2018. Reading the related chapter and other resources to be obtained
|
|
| 3) |
Writing DML queries and DCL statements
|
Yusuf Anıl Akduygu, Oracle Veritabanı Güvenliği ve Sızma Testleri, Kodlab Yayıncılık, 2018. Reading the related chapter and other resources to be obtained
|
|
| 4) |
TCL and stored procedures
|
Yusuf Anıl Akduygu, Oracle Veritabanı Güvenliği ve Sızma Testleri, Kodlab Yayıncılık, 2018. Reading the related chapter and other resources to be obtained
|
|
| 5) |
Stored procedures
|
Yusuf Anıl Akduygu, Oracle Veritabanı Güvenliği ve Sızma Testleri, Kodlab Yayıncılık, 2018. Reading the related chapter and other resources to be obtained
|
|
| 6) |
Triggers, union and join statements
|
Yusuf Anıl Akduygu, Oracle Veritabanı Güvenliği ve Sızma Testleri, Kodlab Yayıncılık, 2018. Reading the related chapter and other resources to be obtained
|
|
| 7) |
Database attack and defense methods
|
Yusuf Anıl Akduygu, Oracle Veritabanı Güvenliği ve Sızma Testleri, Kodlab Yayıncılık, 2018. Reading the related chapter and other resources to be obtained
|
|
| 8) |
Midterm |
|
|
| 9) |
Brute Force attacks and defense
|
Yusuf Anıl Akduygu, Oracle Veritabanı Güvenliği ve Sızma Testleri, Kodlab Yayıncılık, 2018. Reading the related chapter and other resources to be obtained
|
|
| 10) |
SQL injection attacks
|
Yusuf Anıl Akduygu, Oracle Veritabanı Güvenliği ve Sızma Testleri, Kodlab Yayıncılık, 2018. Reading the related chapter and other resources to be obtained
|
|
| 11) |
SQL injection saldırıları ve savunma |
Yusuf Anıl Akduygu, Oracle Veritabanı Güvenliği ve Sızma Testleri, Kodlab Yayıncılık, 2018. Reading the related chapter and other resources to be obtained
|
|
| 12) |
Automatic recording of DML transactions (trigger) |
Yusuf Anıl Akduygu, Oracle Veritabanı Güvenliği ve Sızma Testleri, Kodlab Yayıncılık, 2018. Reading the related chapter and other resources to be obtained
|
|
| 13) |
Automatic recording of DML transactions (change data capture)
|
Yusuf Anıl Akduygu, Oracle Veritabanı Güvenliği ve Sızma Testleri, Kodlab Yayıncılık, 2018. Reading the related chapter and other resources to be obtained
|
|
| 14) |
Database backup
|
Yusuf Anıl Akduygu, Oracle Veritabanı Güvenliği ve Sızma Testleri, Kodlab Yayıncılık, 2018. Reading the related chapter and other resources to be obtained
|
|
| 15) |
User security management
|
Yusuf Anıl Akduygu, Oracle Veritabanı Güvenliği ve Sızma Testleri, Kodlab Yayıncılık, 2018. Reading the related chapter and other resources to be obtained
|
|
| 16) |
Final Exam |
|
|
| |
Programme Learning Outcomes |
Contribution Level (from 1 to 5) |
| 1) |
Explains the basic, theoretical and practical information in the field of information security technology. |
|
| 1) |
Acquires competency of analyzing and solving the problems. |
5 |
| 1) |
Lists the tasks and responsibilities required to identify and prevent any exploitation of hardware. |
1 |
| 1) |
Follow the patches of information technology systems published against known cyber security gaps. |
1 |
| 1) |
Experiences all processes in business life. |
1 |
| 1) |
Defines the corporate cyber security rules and guidelines.
|
2 |
| 2) |
Lists the tasks and responsibilities required to identify and prevent any abuse that may occur in software components. |
4 |
| 2) |
Information Security Creates procedure and control components |
5 |
| 2) |
Has awareness for ethical and social responsibility. |
1 |
| 2) |
Know and analyze cyber assets in terms of information security. |
|
| 2) |
Explains the importance of authorizing users as much as they can. |
1 |
| 2) |
Takes part in activities related to the field of education in a business operating in the field. |
1 |
| 3) |
Questions the application with theoretical knowledge. |
5 |
| 3) |
Lists the tasks and responsibilities required to identify and prevent any abuse that may occur in local area networks. |
1 |
| 3) |
Experience the cyber security risk management system. |
|
| 3) |
Takes responsibility as a team member in works and operations of his/her field. |
1 |
| 3) |
Identify non-technological tools and methods against cyber attack. |
5 |
| 3) |
Explains the necessary policies and processes for effective event management. |
1 |
| 4) |
Identifies the methods and methods of technological methods against cyber attack. |
1 |
| 4) |
Compiles the knowledge and experience gained in the field. |
5 |
| 4) |
Explains the importance of monitoring the cyber systems for the correct structuring of the powers, the realization of the realized, failed or failed cyber attacks, the timely response to the protection and the fulfillment of the legal requirements. |
5 |
| 4) |
Applies the theoretical knowledge learned in business life for a semester. |
|
| 4) |
Is aware of written, verbal communication and interaction. |
1 |
| 5) |
User training and security awareness describes the importance of cyberspace. |
1 |
| 5) |
Acquires the competencies defined as the institutional outcomes of Beykoz University on the basic level, inline with the expectations of business world and the society. |
|
| 5) |
Follows the developments of advanced technology and digital transformation. |
2 |
| 6) |
Recall national and international legislation and regulations related to the field of Information Security Technology. |
1 |
| 6) |
Acquires the awareness for lifelong learning. |
1 |
| 7) |
Has awareness about citizenship competency. |
1 |
| 7) |
Defines the fundamentals of programming and algorithm information. |
1 |
| 8) |
Evaluates the developments of his/her field with the understanding of an entrepreneur. |
1 |
| 9) |
Acquires communication in a Foreign Language (English) competence defined on the level of at least A2 in European Language Portfolio. (In programs whose medium of instruction is English, on the level of B1). |
1 |
| WORKLOAD OF TEACHING & LEARNING ACTIVITIES |
| Teaching & Learning Activities |
# of Activities per semester |
Duration (hour) |
Total Workload |
| Course |
14 |
1 |
14 |
| Laboratory |
14 |
1 |
14 |
| Application |
0 |
0 |
0 |
| Special Course Internship (Work Placement) |
0 |
0 |
0 |
| Field Work |
0 |
0 |
0 |
| Study Hours Out of Class |
0 |
0 |
0 |
| Presentations / Seminar |
0 |
0 |
0 |
| Project |
0 |
0 |
0 |
| Homework Assignments |
1 |
10 |
10 |
| Total Workload of Teaching & Learning Activities |
- |
- |
38 |
| WORKLOAD OF ASSESMENT & EVALUATION ACTIVITIES |
| Assesment & Evaluation Activities |
# of Activities per semester |
Duration (hour) |
Total Workload |
| Quizzes |
2 |
12 |
24 |
| Midterms |
1 |
15 |
15 |
| Semester Final Exam |
1 |
18 |
18 |
| Total Workload of Assesment & Evaluation Activities |
- |
- |
57 |
| TOTAL WORKLOAD (Teaching & Learning + Assesment & Evaluation Activities) |
95 |
| ECTS CREDITS OF THE COURSE (Total Workload/25.5 h) |
4 |