HOME INSTITUTIONAL INFORMATIONINFORMATION ON DEGREE PROGRAMMES Information Security TechnologyCERTIFICATE PROGRAMMESUSEFUL INFORMATION, RESOURCES & SERVICES FOR STUDENTSUSEFUL LINKS AND DOCUMENTSADITIONAL & SUPPORTING INFORMATION

SECTION I: GENERAL INFORMATION ABOUT THE COURSE

Course Code Course Name Year Semester Theoretical Practical Credit ECTS
50011METOZ-BGP0101 Introduction To Cybersecurity 1 Fall 2 0 2 5
Course Type : Compulsory
Cycle: Associate      TQF-HE:5. Master`s Degree      QF-EHEA:Short Cycle      EQF-LLL:5. Master`s Degree
Language of Instruction: Turkish
Prerequisities and Co-requisities: N/A
Mode of Delivery: Face to face
Name of Coordinator: Instructor AHU KARABULUT
Dersin Öğretim Eleman(lar)ı:
Dersin Kategorisi: Programme Specific

SECTION II: INTRODUCTION TO THE COURSE

Course Objectives & Content

Course Objectives: Security weaknesses in the information and communication systems can lead to the failure or misuse of these systems, loss of life, large-scale economic damage, deterioration of public order and / or violation of national security. With this course, it is aimed to understand the security weaknesses / threats existing in information systems and to raise awareness about the measures to be taken against cyber attacks.
Course Content: Virtual machine setup for Lab, introduction to Linux operation, basic network concepts, targeted information gathering and vulnerability analysis, Reverse Shell Bind Shell concepts, exploit development, explotation framework and automated tools, network security tests, file transfers and tunneling techniques, password attacks, DOS (Denail of Service) decommission attack tests, security tests for wireless networks, web openings and testing methods, security test applications on voip networks, social engineering, pivoting, pentest report writing

Course Learning Outcomes (CLOs)

Course Learning Outcomes (CLOs) are those describing the knowledge, skills and competencies that students are expected to achieve upon successful completion of the course. In this context, Course Learning Outcomes defined for this course unit are as follows:
Knowledge (Described as Theoritical and/or Factual Knowledge.)
Skills (Describe as Cognitive and/or Practical Skills.)
  1) Uses basic Linux commands.
  2) Detects at the basic level network security vulnerabilities and takes necessary security measures.
  3) Recognizes the vulnerabilities that can occur in web applications.
Competences (Described as "Ability of the learner to apply knowledge and skills autonomously with responsibility", "Learning to learn"," Communication and social" and "Field specific" competences.)
  1) Learns cyber security applications.
  2) Learn to collect information about vulnerabilities in systems.
  3) earn basic encryption structures.

Weekly Course Schedule

Week Subject
Materials Sharing *
Related Preparation Further Study
1) Introduction to cyber security: basic concepts M. Alparslan Akyıldız, Uygulamalarla Siber Güvenliğe Giriş, Gazi Kitabevi, 2020. Reading the related chapter and other resources to be obtained
2) Primitive symmetric encryption algorithms M. Alparslan Akyıldız, Uygulamalarla Siber Güvenliğe Giriş, Gazi Kitabevi, 2020. Reading the related chapter and other resources to be obtained
3) Primitive symmetric encryption algorithms M. Alparslan Akyıldız, Uygulamalarla Siber Güvenliğe Giriş, Gazi Kitabevi, 2020. Reading the related chapter and other resources to be obtained
4) Block cipher algorithms M. Alparslan Akyıldız, Uygulamalarla Siber Güvenliğe Giriş, Gazi Kitabevi, 2020. Reading the related chapter and other resources to be obtained
5) Block cipher algorithms M. Alparslan Akyıldız, Uygulamalarla Siber Güvenliğe Giriş, Gazi Kitabevi, 2020. Reading the related chapter and other resources to be obtained
6) Streaming encryption algorithms M. Alparslan Akyıldız, Uygulamalarla Siber Güvenliğe Giriş, Gazi Kitabevi, 2020. Reading the related chapter and other resources to be obtained
7) MAC and Hash Algorithms M. Alparslan Akyıldız, Uygulamalarla Siber Güvenliğe Giriş, Gazi Kitabevi, 2020. Reading the related chapter and other resources to be obtained
8) Midterm
9) Asymmetric encryption algorithms M. Alparslan Akyıldız, Uygulamalarla Siber Güvenliğe Giriş, Gazi Kitabevi, 2020. Reading the related chapter and other resources to be obtained
10) Asymmetric encryption algorithms, Attack types and Security Protocols M. Alparslan Akyıldız, Uygulamalarla Siber Güvenliğe Giriş, Gazi Kitabevi, 2020. Reading the related chapter and other resources to be obtained
11) Malware and analysis M. Alparslan Akyıldız, Uygulamalarla Siber Güvenliğe Giriş, Gazi Kitabevi, 2020. Reading the related chapter and other resources to be obtained
12) Installation environment and basic Linux commands M. Alparslan Akyıldız, Uygulamalarla Siber Güvenliğe Giriş, Gazi Kitabevi, 2020. Reading the related chapter and other resources to be obtained
13) Linux basic commands and Basic network concept M. Alparslan Akyıldız, Uygulamalarla Siber Güvenliğe Giriş, Gazi Kitabevi, 2020. Reading the related chapter and other resources to be obtained
14) Project presentation M. Alparslan Akyıldız, Uygulamalarla Siber Güvenliğe Giriş, Gazi Kitabevi, 2020. Reading the related chapter and other resources to be obtained
16) Final Exam
*These fields provides students with course materials for their pre- and further study before and after the course delivered.

Recommended or Required Reading & Other Learning Resources/Tools

Course Notes / Textbooks: M. Alparslan Akyıldız, 2020; Uygulamalarla Siber Güvenliğe Giriş, Gazi Kitabevi
References: Cemal Taner, 2019; Herkes için Siber Güvenlik, Abaküs Kitap
Mustafa Altınkaynak, 2017; Uygulamalı Siber Güvenlik ve Hacking, Abaküs Kitap
Ömer Çıtak, 2018; Ethical Hacking, Abaküs Kitap
Erdal Özkaya, 2020; Siber Güvenlik: Saldırı ve Savunma Stratejileri, Buzdağı Yayınevi

SECTION III: RELATIONSHIP BETWEEN COURSE UNIT AND COURSE LEARNING OUTCOMES (CLOs)

(The matrix below shows how the course learning outcomes (CLOs) associates with programme learning outcomes (both KPLOs & SPLOs) and, if exist, the level of quantitative contribution to them.)

Relationship Between CLOs & PLOs

(KPLOs and SPLOs are the abbreviations for Key & Sub- Programme Learning Outcomes, respectively. )
CLOs/PLOs KPLO 1 KPLO 2 KPLO 3 KPLO 4 KPLO 5
1 2 3 4 5 6 7 1 2 3 1 2 3 4 1 2 3 4 1 2 3 4 5 6 7 8 9
CLO1
CLO2
CLO3
CLO4
CLO5
CLO6

Level of Contribution of the Course to PLOs

No Effect 1 Lowest 2 Low 3 Average 4 High 5 Highest
           
Programme Learning Outcomes Contribution Level (from 1 to 5)
1) Explains the basic, theoretical and practical information in the field of information security technology. 5
2) Know and analyze cyber assets in terms of information security. 5
3) Experience the cyber security risk management system. 5
4) Applies the theoretical knowledge learned in business life for a semester. 1
5) Acquires the competencies defined as the institutional outcomes of Beykoz University on the basic level, inline with the expectations of business world and the society. 1

SECTION IV: TEACHING-LEARNING & ASSESMENT-EVALUATION METHODS OF THE COURSE

Teaching & Learning Methods of the Course

(All teaching and learning methods used at the university are managed systematically. Upon proposals of the programme units, they are assessed by the relevant academic boards and, if found appropriate, they are included among the university list. Programmes, then, choose the appropriate methods in line with their programme design from this list. Likewise, appropriate methods to be used for the course units can be chosen among those defined for the programme.)
Teaching and Learning Methods defined at the Programme Level
Teaching and Learning Methods Defined for the Course
Lectures
Discussion
Case Study
Problem Solving
Demonstration
Views
Laboratory
Reading
Homework
Project Preparation
Thesis Preparation
Peer Education
Seminar
Technical Visit
Course Conference
Brain Storming
Questions Answers
Individual and Group Work
Role Playing-Animation-Improvisation
Active Participation in Class

Assessment & Evaluation Methods of the Course

(All assessment and evaluation methods used at the university are managed systematically. Upon proposals of the programme units, they are assessed by the relevant academic boards and, if found appropriate, they are included among the university list. Programmes, then, choose the appropriate methods in line with their programme design from this list. Likewise, appropriate methods to be used for the course units can be chosen among those defined for the programme.)
Aassessment and evaluation Methods defined at the Programme Level
Assessment and Evaluation Methods defined for the Course
Midterm
Presentation
Final Exam
Quiz
Report Evaluation
Homework Evaluation
Oral Exam
Thesis Defense
Jury Evaluation
Practice Exam
Evaluation of Implementation Training in the Workplace
Active Participation in Class
Participation in Discussions

Relationship Between CLOs & Teaching-Learning, Assesment-Evaluation Methods of the Course

(The matrix below shows the teaching-learning and assessment-evaluation methods designated for the course unit in relation to the course learning outcomes.)
LEARNING & TEACHING METHODS
COURSE LEARNING OUTCOMES
ASSESMENT & EVALUATION METHODS
CLO1 CLO2 CLO3 CLO4 CLO5 CLO6
-Lectures -Midterm
-Discussion -Presentation
-Case Study -Final Exam
-Problem Solving -Quiz
-Demonstration -Report Evaluation
-Views -Homework Evaluation
-Laboratory -Oral Exam
-Reading -Thesis Defense
-Homework -Jury Evaluation
-Project Preparation -Practice Exam
-Thesis Preparation -Evaluation of Implementation Training in the Workplace
-Peer Education -Active Participation in Class
-Seminar - Participation in Discussions
-Technical Visit
-Course Conference
-Brain Storming
-Questions Answers
-Individual and Group Work
-Role Playing-Animation-Improvisation
-Active Participation in Class

Contribution of Assesment & Evalution Activities to Final Grade of the Course

Measurement and Evaluation Methods # of practice per semester Level of Contribution
Quizzes 1 % 10.00
Project 1 % 10.00
Midterms 1 % 30.00
Semester Final Exam 1 % 50.00
Total % 100
PERCENTAGE OF SEMESTER WORK % 50
PERCENTAGE OF FINAL WORK % 50
Total % 100

SECTION V: WORKLOAD & ECTS CREDITS ALLOCATED FOR THE COURSE

WORKLOAD OF TEACHING & LEARNING ACTIVITIES
Teaching & Learning Activities # of Activities per semester Duration (hour) Total Workload
Course 14 3 42
Laboratory 0 0 0
Application 0 0 0
Special Course Internship (Work Placement) 0 0 0
Field Work 0 0 0
Study Hours Out of Class 14 2 28
Presentations / Seminar 0 0 0
Project 0 0 0
Homework Assignments 1 10 10
Total Workload of Teaching & Learning Activities - - 80
WORKLOAD OF ASSESMENT & EVALUATION ACTIVITIES
Assesment & Evaluation Activities # of Activities per semester Duration (hour) Total Workload
Quizzes 2 6 12
Midterms 1 15 15
Semester Final Exam 1 20 20
Total Workload of Assesment & Evaluation Activities - - 47
TOTAL WORKLOAD (Teaching & Learning + Assesment & Evaluation Activities) 127
ECTS CREDITS OF THE COURSE (Total Workload/25.5 h) 5