Your transaction is in progress.
Please Wait...
Course Details
KTO KARATAY UNIVERSITY
Trade and Industry Vocational School
Programme of Computer Programming
Course Details
Course Code Course Name Year Period Semester T+A+L Credit ECTS
03841200 Internet Safety 2 Spring 4 2+1+0 5 5
Course Type Elective
Course Cycle Associate (Short Cycle) (TQF-HE: Level 5 / QF-EHEA: Short Cycle / EQF-LLL: Level 5)
Course Language Turkish
Methods and Techniques 1. Teorik Anlatım: Konular ders kapsamında teorik olarak anlatılır. Öğrenciler programlamanın temel kavramlarını ve algoritmaların mantığını kavrayabilmeleri için konu anlatımları dinler. 2. Uygulamalı Çalışmalar: Öğrenciler, teorik olarak anlatılan konuların uygulamasını yapmak için ders eğitmeni mentorlüğünde çeşitli örneklerle çalışmalar gerçekleştirir. Kazanımlar elde edilmeye çalışılır. 3. Adım Adım Çözümleme: Karşılaşılan problemler adım adım çözülerek her adımın nasıl işlediği açıklanır. Bu yöntemle öğrencilerin konulara daha hakim olması sağlanır. 4.Gerçek Hayat Örnekleri: Konuların daha iyi anlaşılması için gerçek hayattan örnekler ve problem senaryoları sunulur. Böylece öğrenciler öğrendiklerini pratikte nasıl kullanacağını görür. 5. Laboratuvar Föyleri ve Quizler: Haftalık laboratuvar föyleri ve sınav öncesi quizler ile öğrencilerin ilerlemesi değerlendirilir, konuların anlaşılıp anlaşılmadığı takip edilir.
Mode of Delivery Face to Face
Prerequisites Dersin herhangi bir ön koşulu bulunmamaktadır. Tüm öğrencilere temel seviyeden başlanarak eğitim verilmektedir.
Coordinator -
Instructor(s) Lect. Gizem ÇELİK
Instructor Assistant(s) -
Course Content
1. Introduction to Internet Security and Basic Concepts
2. Network Security and Network Layers
3. Encryption and Cryptography Fundamentals
4. Authentication and Access Control
5. Malware and Types
6. Social Engineering Attacks
7. Web Security
8. Mobile Security and IoT Security
9. Network Monitoring and Security Testing
10. Security Protocols and Standards
11. Cyber ​​Threats and Emergency Management
12. Current Cyber ​​Security Trends and Future Perspective
Objectives of the Course
The aim of this course is to provide students with comprehensive information about internet security concepts, types of threats, and methods of protection from cyber attacks. Students will learn the basic principles and security protocols required to ensure the security of the internet infrastructure, and will experience network security, authentication, encryption, and data protection techniques in practice.

The course also aims to analyze security vulnerabilities, identify types of malware, and encourage safe internet use. At the end of the course, students will be able to develop defense strategies against security threats and will have a basic knowledge of cyber security.
Contribution of the Course to Field Teaching
Basic Vocational Courses
Specialization / Field Courses X
Support Courses
Transferable Skills Courses X
Humanities, Communication and Management Skills Courses
Relationships between Course Learning Outcomes and Program Outcomes
Relationship Levels
Lowest Low Medium High Highest
1 2 3 4 5
# Program Learning Outcomes Level
P1 He/she has basic, current and applied information about his/her profession. 5
P5 Has the ability to independently evaluate professional problems and issues with an analytical and critical approach and propose solutions. 5
P9 It has social, scientific, cultural and ethical values in the stages of collecting data related to its field, applying it and announcing the results. 5
Course Learning Outcomes
Upon the successful completion of this course, students will be able to:
No Learning Outcomes Outcome Relationship Measurement Method **
O1 Knows how to use the internet and do research. P.1.2 1,6,7
O2 Has knowledge about Computer and Security. P.1.4 1
O3 Knows analytical, effective research and solution techniques to identify problems. P.5.2 3,6
O4 Evaluate computer science topics and algorithms using critical thinking skills P.5.4 1
O5 Makes decisions by taking into consideration social, scientific, cultural and ethical values. P.9.1 7
O6 Follows ethical standards in data collection and analysis P.9.2 1,3,6
** Written Exam: 1, Oral Exam: 2, Homework: 3, Lab./Exam: 4, Seminar/Presentation: 5, Term Paper: 6, Application: 7
Weekly Detailed Course Contents
Week Topics
1 Introduction to Internet Security and Basic Concepts
2 Network Security and Network Layers
3 Encryption and Cryptography Fundamentals
4 Authentication and Access Control
5 Malware and Its Types
6 Social Engineering Attacks
7 Pre-Exam Quiz and General Review
8 Web Security
9 Mobile Security and IoT Security
10 Network Monitoring and Security Testing
11 Security Protocols and Standards
12 Cyber ​​Threats and Emergency Management
13 Current Cyber ​​Security Trends and Future Perspective
14 Pre-Exam Quiz and General Review
Textbook or Material
Resources Matt Bishop, "Computer Security: Art and Science "
Ross J. Anderson, "Security Engineering: A Guide to Building Dependable Distributed Systems" , 3rd Edition
Evaluation Method and Passing Criteria
In-Term Studies Quantity Percentage
Attendance - -
Laboratory - -
Practice - -
Field Study - -
Course Specific Internship (If Any) - -
Homework - -
Presentation - -
Projects 1 20 (%)
Seminar - -
Quiz 2 10 (%)
Listening - -
Midterms 1 30 (%)
Final Exam 1 40 (%)
Total 100 (%)
ECTS / Working Load Table
Quantity Duration Total Work Load
Course Week Number and Time 16 4 64
Out-of-Class Study Time (Pre-study, Library, Reinforcement) 14 2 28
Midterms 1 6 6
Quiz 2 1 2
Homework 0 0 0
Practice 0 0 0
Laboratory 0 0 0
Project 1 30 30
Workshop 0 0 0
Presentation/Seminar Preparation 1 4 4
Fieldwork 0 0 0
Final Exam 1 16 16
Other 0 0 0
Total Work Load: 150
Total Work Load / 30 5
Course ECTS Credits: 5
Course - Learning Outcomes Matrix
Relationship Levels
Lowest Low Medium High Highest
1 2 3 4 5
# Learning Outcomes P1 P5 P9
O1 Knows how to use the internet and do research. 4 - -
O2 Has knowledge about Computer and Security. - - -
O3 Knows analytical, effective research and solution techniques to identify problems. - - -
O4 Evaluate computer science topics and algorithms using critical thinking skills - - -
O5 Makes decisions by taking into consideration social, scientific, cultural and ethical values. - - -
O6 Follows ethical standards in data collection and analysis - - -