Computer Programming
Course Details

KTO KARATAY UNIVERSITY
Trade and Industry Vocational School
Programme of Computer Programming
Course Details
Trade and Industry Vocational School
Programme of Computer Programming
Course Details

| Course Code | Course Name | Year | Period | Semester | T+A+L | Credit | ECTS |
|---|---|---|---|---|---|---|---|
| 03841200 | Internet Safety | 2 | Spring | 4 | 2+1+0 | 5 | 5 |
| Course Type | Elective |
| Course Cycle | Associate (Short Cycle) (TQF-HE: Level 5 / QF-EHEA: Short Cycle / EQF-LLL: Level 5) |
| Course Language | Turkish |
| Methods and Techniques | 1. Teorik Anlatım: Konular ders kapsamında teorik olarak anlatılır. Öğrenciler programlamanın temel kavramlarını ve algoritmaların mantığını kavrayabilmeleri için konu anlatımları dinler. 2. Uygulamalı Çalışmalar: Öğrenciler, teorik olarak anlatılan konuların uygulamasını yapmak için ders eğitmeni mentorlüğünde çeşitli örneklerle çalışmalar gerçekleştirir. Kazanımlar elde edilmeye çalışılır. 3. Adım Adım Çözümleme: Karşılaşılan problemler adım adım çözülerek her adımın nasıl işlediği açıklanır. Bu yöntemle öğrencilerin konulara daha hakim olması sağlanır. 4.Gerçek Hayat Örnekleri: Konuların daha iyi anlaşılması için gerçek hayattan örnekler ve problem senaryoları sunulur. Böylece öğrenciler öğrendiklerini pratikte nasıl kullanacağını görür. 5. Laboratuvar Föyleri ve Quizler: Haftalık laboratuvar föyleri ve sınav öncesi quizler ile öğrencilerin ilerlemesi değerlendirilir, konuların anlaşılıp anlaşılmadığı takip edilir. |
| Mode of Delivery | Face to Face |
| Prerequisites | Dersin herhangi bir ön koşulu bulunmamaktadır. Tüm öğrencilere temel seviyeden başlanarak eğitim verilmektedir. |
| Coordinator | - |
| Instructor(s) | Lect. Uğur POLAT |
| Instructor Assistant(s) | - |
Course Instructor(s)
| Name and Surname | Room | E-Mail Address | Internal | Meeting Hours |
|---|---|---|---|---|
| Lect. Uğur POLAT | TSMYO-T213 | [email protected] | 7860 | Monday 15.00-16.00 |
Course Content
1. Introduction to Internet Security and Basic Concepts
2. Network Security and Network Layers
3. Encryption and Cryptography Fundamentals
4. Authentication and Access Control
5. Malware and Types
6. Social Engineering Attacks
7. Web Security
8. Mobile Security and IoT Security
9. Network Monitoring and Security Testing
10. Security Protocols and Standards
11. Cyber Threats and Emergency Management
12. Current Cyber Security Trends and Future Perspective
2. Network Security and Network Layers
3. Encryption and Cryptography Fundamentals
4. Authentication and Access Control
5. Malware and Types
6. Social Engineering Attacks
7. Web Security
8. Mobile Security and IoT Security
9. Network Monitoring and Security Testing
10. Security Protocols and Standards
11. Cyber Threats and Emergency Management
12. Current Cyber Security Trends and Future Perspective
Objectives of the Course
The aim of this course is to provide students with comprehensive information about internet security concepts, types of threats, and methods of protection from cyber attacks. Students will learn the basic principles and security protocols required to ensure the security of the internet infrastructure, and will experience network security, authentication, encryption, and data protection techniques in practice.
The course also aims to analyze security vulnerabilities, identify types of malware, and encourage safe internet use. At the end of the course, students will be able to develop defense strategies against security threats and will have a basic knowledge of cyber security.
The course also aims to analyze security vulnerabilities, identify types of malware, and encourage safe internet use. At the end of the course, students will be able to develop defense strategies against security threats and will have a basic knowledge of cyber security.
Contribution of the Course to Field Teaching
| Basic Vocational Courses | |
| Specialization / Field Courses | X |
| Support Courses | |
| Transferable Skills Courses | X |
| Humanities, Communication and Management Skills Courses |
Relationships between Course Learning Outcomes and Program Outcomes
| Relationship Levels | ||||
| Lowest | Low | Medium | High | Highest |
| 1 | 2 | 3 | 4 | 5 |
| # | Program Learning Outcomes | Level |
|---|---|---|
| P4 | Effectively uses information technologies (software, programs, animations, etc.) related to her/his profession. | 5 |
| P1 | He/she has basic, current and applied information about his/her profession. | 5 |
| P3 | He/She follows current developments and practices in his profession and uses them effectively. | 5 |
| P5 | Has the ability to independently evaluate professional problems and issues with an analytical and critical approach and propose solutions. | 4 |
| P6 | Can present his/her thoughts effectively through written and verbal communication at the level of knowledge and skills and expresses them in an understandable manner. | 3 |
| P11 | Creates algorithms and data structures and performs mathematical calculations. | 4 |
| P14 | Tests software and fixes bugs. | 5 |
Course Learning Outcomes
| Upon the successful completion of this course, students will be able to: | |||
|---|---|---|---|
| No | Learning Outcomes | Outcome Relationship | Measurement Method ** |
| O1 | Knows the basic elements of a computer. | P.1.1 | 1,6,7 |
| O2 | Knows how to use the internet and do research. | P.1.2 | 1,6,7 |
| O3 | Can perform basic mathematical analyses related to his/her profession. | P.1.3 | 1,6,7 |
| O4 | Knows current techniques for data analysis. | P.3.1 | 1,6,7 |
| O5 | Must know and use current software development platforms. | P.3.2 | 1,6,7 |
| O6 | Addresses complex problems and produces creative solutions. | P.3.3 | 6,7 |
| O7 | Have basic analysis knowledge. | P.3.5 | 1,6,7 |
| O8 | Knows how to develop algorithms and creates a data structure appropriate to the algorithm. | P.11.1 | 1,6,7 |
| O9 | Knows and uses current Information Technology platforms. | P.11.2 | 1,6,7 |
| O10 | Has knowledge of current programming languages. | P.11.3 | 1,6,7 |
| O11 | Has knowledge in the field of Digital Systems. | P.11.7 | 6,7 |
| O12 | Tests software and fixes bugs. | P.14.1 | 1,6,7 |
| ** Written Exam: 1, Oral Exam: 2, Homework: 3, Lab./Exam: 4, Seminar/Presentation: 5, Term Paper: 6, Application: 7 | |||
Weekly Detailed Course Contents
| Week | Topics |
|---|---|
| 1 | Introduction to Internet Security and Basic Concepts |
| 2 | Network Security and Network Layers |
| 3 | Encryption and Cryptography Fundamentals |
| 4 | Authentication and Access Control |
| 5 | Malware and Its Types |
| 6 | Social Engineering Attacks |
| 7 | Pre-Exam Quiz and General Review |
| 8 | Mid-term Exam |
| 9 | Web Security |
| 10 | Mobile Security and IoT Security |
| 11 | Network Monitoring and Security Testing |
| 12 | Security Protocols and Standards |
| 13 | Cyber Threats and Emergency Management |
| 14 | Current Cyber Security Trends and Future Perspective |
| 15 | Pre-Exam Quiz and General Review |
| 16 | Final Exam |
Textbook or Material
| Resources | Matt Bishop, "Computer Security: Art and Science " |
| Ross J. Anderson, "Security Engineering: A Guide to Building Dependable Distributed Systems" , 2nd Edition |
Evaluation Method and Passing Criteria
| In-Term Studies | Quantity | Percentage |
|---|---|---|
| Attendance | - | - |
| Laboratory | - | - |
| Practice | - | - |
| Field Study | - | - |
| Course Specific Internship (If Any) | - | - |
| Homework | - | - |
| Presentation | - | - |
| Projects | 1 | 20 (%) |
| Seminar | - | - |
| Quiz | 2 | 10 (%) |
| Listening | - | - |
| Midterms | 1 | 30 (%) |
| Final Exam | 1 | 40 (%) |
| Total | 100 (%) | |
ECTS / Working Load Table
| Quantity | Duration | Total Work Load | |
|---|---|---|---|
| Course Week Number and Time | 16 | 4 | 64 |
| Out-of-Class Study Time (Pre-study, Library, Reinforcement) | 14 | 2 | 28 |
| Midterms | 1 | 6 | 6 |
| Quiz | 2 | 1 | 2 |
| Homework | 0 | 0 | 0 |
| Practice | 0 | 0 | 0 |
| Laboratory | 0 | 0 | 0 |
| Project | 1 | 30 | 30 |
| Workshop | 0 | 0 | 0 |
| Presentation/Seminar Preparation | 1 | 4 | 4 |
| Fieldwork | 0 | 0 | 0 |
| Final Exam | 1 | 16 | 16 |
| Other | 0 | 0 | 0 |
| Total Work Load: | 150 | ||
| Total Work Load / 30 | 5 | ||
| Course ECTS Credits: | 5 | ||
Course - Learning Outcomes Matrix
| Relationship Levels | ||||
| Lowest | Low | Medium | High | Highest |
| 1 | 2 | 3 | 4 | 5 |
| # | Learning Outcomes | P1 | P3 | P11 | P14 |
|---|---|---|---|---|---|
| O1 | Knows the basic elements of a computer. | 5 | - | - | - |
| O2 | Knows how to use the internet and do research. | 4 | - | - | - |
| O3 | Can perform basic mathematical analyses related to his/her profession. | 4 | - | - | - |
| O4 | Knows current techniques for data analysis. | - | 5 | - | - |
| O5 | Must know and use current software development platforms. | - | 5 | - | - |
| O6 | Addresses complex problems and produces creative solutions. | - | 5 | - | - |
| O7 | Have basic analysis knowledge. | - | 5 | - | - |
| O8 | Knows how to develop algorithms and creates a data structure appropriate to the algorithm. | - | - | 5 | - |
| O9 | Knows and uses current Information Technology platforms. | - | - | 5 | - |
| O10 | Has knowledge of current programming languages. | - | - | 5 | - |
| O11 | Has knowledge in the field of Digital Systems. | - | - | 5 | - |
| O12 | Tests software and fixes bugs. | - | - | - | 5 |
