Course Learning Outcomes (CLOs) are those describing the knowledge, skills and competencies that students are expected to achieve upon successful completion of the course. In this context, Course Learning Outcomes defined for this course unit are as follows:
|
|
Knowledge
(Described as Theoritical and/or Factual Knowledge.)
|
1) Have information about cyber attack and defense processes.
|
Skills
(Describe as Cognitive and/or Practical Skills.)
|
1) Knows the basic concepts of information security.
|
Competences
(Described as "Ability of the learner to apply knowledge and skills autonomously with responsibility", "Learning to learn"," Communication and social" and "Field specific" competences.)
|
1) Produces different applications for attack and defense methods on Virtual Laboratory.
|
2) After learning the basic concepts, it produces applications through a virtual laboratory.
|
3) Get help from peers when necessary to complete their deficiencies.
|
Week |
Subject |
Materials Sharing * |
|
Related Preparation |
Further Study |
1) |
Basic cyber concepts and network concepts
|
Erdal Özkaya, Siber Güvenlik: Saldırı ve Savunma Stratejileri, Buzdağı Yayınevi, 2020. Reading the related chapter and other resources to be obtained
|
|
2) |
Linux network commands and Wireless networks
|
Erdal Özkaya, Siber Güvenlik: Saldırı ve Savunma Stratejileri, Buzdağı Yayınevi, 2020. Reading the related chapter and other resources to be obtained
|
|
3) |
Cyber attack types
|
Erdal Özkaya, Siber Güvenlik: Saldırı ve Savunma Stratejileri, Buzdağı Yayınevi, 2020. Reading the related chapter and other resources to be obtained
|
|
4) |
Wireless network attacks
|
Erdal Özkaya, Siber Güvenlik: Saldırı ve Savunma Stratejileri, Buzdağı Yayınevi, 2020. Reading the related chapter and other resources to be obtained
|
|
5) |
Passive / Active information collection and vulnerability analysis
|
Erdal Özkaya, Siber Güvenlik: Saldırı ve Savunma Stratejileri, Buzdağı Yayınevi, 2020. Reading the related chapter and other resources to be obtained
|
|
6) |
Passive / Active information collection and vulnerability analysis
|
Erdal Özkaya, Siber Güvenlik: Saldırı ve Savunma Stratejileri, Buzdağı Yayınevi, 2020. Reading the related chapter and other resources to be obtained
|
|
7) |
Man-in-the-middle attacks and method of protection
|
Erdal Özkaya, Siber Güvenlik: Saldırı ve Savunma Stratejileri, Buzdağı Yayınevi, 2020. Reading the related chapter and other resources to be obtained
|
|
8) |
Midterm |
|
|
9) |
Computer attack
|
Erdal Özkaya, Siber Güvenlik: Saldırı ve Savunma Stratejileri, Buzdağı Yayınevi, 2020. Reading the related chapter and other resources to be obtained
|
|
10) |
Attacking users: installing veil, creating backdoor
|
Erdal Özkaya, Siber Güvenlik: Saldırı ve Savunma Stratejileri, Buzdağı Yayınevi, 2020. Reading the related chapter and other resources to be obtained
|
|
11) |
Social engineering
|
Erdal Özkaya, Siber Güvenlik: Saldırı ve Savunma Stratejileri, Buzdağı Yayınevi, 2020. Reading the related chapter and other resources to be obtained
|
|
12) |
Beef |
Erdal Özkaya, Siber Güvenlik: Saldırı ve Savunma Stratejileri, Buzdağı Yayınevi, 2020. Reading the related chapter and other resources to be obtained
|
|
13) |
Social engineering
|
Erdal Özkaya, Siber Güvenlik: Saldırı ve Savunma Stratejileri, Buzdağı Yayınevi, 2020. Reading the related chapter and other resources to be obtained
|
|
14) |
Social media security
|
Erdal Özkaya, Siber Güvenlik: Saldırı ve Savunma Stratejileri, Buzdağı Yayınevi, 2020. Reading the related chapter and other resources to be obtained
|
|
15) |
Cyber attack and models |
Erdal Özkaya, Siber Güvenlik: Saldırı ve Savunma Stratejileri, Buzdağı Yayınevi, 2020. Reading the related chapter and other resources to be obtained
|
|
16) |
Final Exam |
|
|
Course Notes / Textbooks: |
Erdal Özkaya, 2020; Siber Güvenlik: Saldırı ve Savunma Stratejileri, Buzdağı Yayınevi
|
References: |
M. Alparslan Akyıldız, 2020; Uygulamalarla Siber Güvenliğe Giriş, Gazi Kitabevi
Cemal Taner, 2019; Herkes için Siber Güvenlik, Abaküs Kitap
P. W. Singer, Allan Friedman, 2015; Siber Güvenlik ve Siber Savaş, Buzdağı Yayınevi
Mustafa Altınkaynak, 2017; Uygulamalı Siber Güvenlik ve Hacking, Abaküs Kitap
Enes Aslanbakan, 2016; Bilgi Güvenliği ve Hacking,Pusula Yayıncılık
|
(KPLOs and SPLOs are the abbreviations for Key & Sub- Programme Learning Outcomes, respectively. )
|
Programme Learning Outcomes |
Contribution Level (from 1 to 5) |
1) |
Explains the basic, theoretical and practical information in the field of information security technology. |
5 |
|
1.1 Defines the corporate cyber security rules and guidelines.
|
5 |
|
1.2 Information Security Creates procedure and control components |
5 |
|
1.3 Identify non-technological tools and methods against cyber attack. |
5 |
|
1.4 Identifies the methods and methods of technological methods against cyber attack. |
5 |
|
1.5 User training and security awareness describes the importance of cyberspace. |
3 |
|
1.6 Recall national and international legislation and regulations related to the field of Information Security Technology. |
1 |
|
1.7 Defines the fundamentals of programming and algorithm information. |
1 |
|
|
|
2) |
Know and analyze cyber assets in terms of information security. |
4 |
|
2.1 Lists the tasks and responsibilities required to identify and prevent any exploitation of hardware. |
4 |
|
2.2 Lists the tasks and responsibilities required to identify and prevent any abuse that may occur in software components. |
3 |
|
2.3 Lists the tasks and responsibilities required to identify and prevent any abuse that may occur in local area networks. |
5 |
|
|
|
3) |
Experience the cyber security risk management system. |
5 |
|
3.1 Follow the patches of information technology systems published against known cyber security gaps. |
5 |
|
3.2 Explains the importance of authorizing users as much as they can. |
1 |
|
3.3 Explains the necessary policies and processes for effective event management. |
1 |
|
3.4 Explains the importance of monitoring the cyber systems for the correct structuring of the powers, the realization of the realized, failed or failed cyber attacks, the timely response to the protection and the fulfillment of the legal requirements. |
5 |
4) |
Applies the theoretical knowledge learned in business life for a semester. |
1 |
|
4.1 Experiences all processes in business life. |
1 |
|
4.2 Takes part in activities related to the field of education in a business operating in the field. |
1 |
|
4.3 Questions the application with theoretical knowledge. |
5 |
|
4.4 Compiles the knowledge and experience gained in the field. |
5 |
5) |
Acquires the competencies defined as the institutional outcomes of Beykoz University on the basic level, inline with the expectations of business world and the society. |
5 |
|
5.1 Acquires competency of analyzing and solving the problems. |
5 |
|
5.2 Has awareness for ethical and social responsibility. |
|
|
5.3 Takes responsibility as a team member in works and operations of his/her field. |
2 |
|
5.4 Is aware of written, verbal communication and interaction. |
1 |
|
5.5 Follows the developments of advanced technology and digital transformation. |
1 |
|
5.6 Acquires the awareness for lifelong learning. |
1 |
|
5.7 Has awareness about citizenship competency. |
1 |
|
5.8 Evaluates the developments of his/her field with the understanding of an entrepreneur. |
1 |
|
5.9 Acquires communication in a Foreign Language (English) competence defined on the level of at least A2 in European Language Portfolio. (In programs whose medium of instruction is English, on the level of B1). |
1 |
|
|
|
WORKLOAD OF TEACHING & LEARNING ACTIVITIES |
Teaching & Learning Activities |
# of Activities per semester |
Duration (hour) |
Total Workload |
Course |
14 |
4 |
56 |
Laboratory |
14 |
1 |
14 |
Application |
14 |
1 |
14 |
Special Course Internship (Work Placement) |
0 |
0 |
0 |
Field Work |
0 |
0 |
0 |
Study Hours Out of Class |
0 |
0 |
0 |
Presentations / Seminar |
0 |
0 |
0 |
Project |
0 |
0 |
0 |
Homework Assignments |
1 |
15 |
15 |
Total Workload of Teaching & Learning Activities |
- |
- |
99 |
WORKLOAD OF ASSESMENT & EVALUATION ACTIVITIES |
Assesment & Evaluation Activities |
# of Activities per semester |
Duration (hour) |
Total Workload |
Quizzes |
2 |
10 |
20 |
Midterms |
1 |
10 |
10 |
Semester Final Exam |
1 |
15 |
15 |
Total Workload of Assesment & Evaluation Activities |
- |
- |
45 |
TOTAL WORKLOAD (Teaching & Learning + Assesment & Evaluation Activities) |
144 |
ECTS CREDITS OF THE COURSE (Total Workload/25.5 h) |
6 |