Computer Programming
Course Details

KTO KARATAY UNIVERSITY
Trade and Industry Vocational School
Programme of Computer Programming
Course Details
Trade and Industry Vocational School
Programme of Computer Programming
Course Details

| Course Code | Course Name | Year | Period | Semester | T+A+L | Credit | ECTS |
|---|---|---|---|---|---|---|---|
| 03841200 | Internet Safety | 2 | Spring | 4 | 2+1+0 | 5 | 5 |
| Course Type | Elective |
| Course Cycle | Associate (Short Cycle) (TQF-HE: Level 5 / QF-EHEA: Short Cycle / EQF-LLL: Level 5) |
| Course Language | Turkish |
| Methods and Techniques | 1. Teorik Anlatım: Konular ders kapsamında teorik olarak anlatılır. Öğrenciler programlamanın temel kavramlarını ve algoritmaların mantığını kavrayabilmeleri için konu anlatımları dinler. 2. Uygulamalı Çalışmalar: Öğrenciler, teorik olarak anlatılan konuların uygulamasını yapmak için ders eğitmeni mentorlüğünde çeşitli örneklerle çalışmalar gerçekleştirir. Kazanımlar elde edilmeye çalışılır. 3. Adım Adım Çözümleme: Karşılaşılan problemler adım adım çözülerek her adımın nasıl işlediği açıklanır. Bu yöntemle öğrencilerin konulara daha hakim olması sağlanır. 4.Gerçek Hayat Örnekleri: Konuların daha iyi anlaşılması için gerçek hayattan örnekler ve problem senaryoları sunulur. Böylece öğrenciler öğrendiklerini pratikte nasıl kullanacağını görür. 5. Laboratuvar Föyleri ve Quizler: Haftalık laboratuvar föyleri ve sınav öncesi quizler ile öğrencilerin ilerlemesi değerlendirilir, konuların anlaşılıp anlaşılmadığı takip edilir. |
| Mode of Delivery | Face to Face |
| Prerequisites | Dersin herhangi bir ön koşulu bulunmamaktadır. Tüm öğrencilere temel seviyeden başlanarak eğitim verilmektedir. |
| Coordinator | - |
| Instructor(s) | Lect. Gizem ÇELİK |
| Instructor Assistant(s) | - |
Course Content
1. Introduction to Internet Security and Basic Concepts
2. Network Security and Network Layers
3. Encryption and Cryptography Fundamentals
4. Authentication and Access Control
5. Malware and Types
6. Social Engineering Attacks
7. Web Security
8. Mobile Security and IoT Security
9. Network Monitoring and Security Testing
10. Security Protocols and Standards
11. Cyber Threats and Emergency Management
12. Current Cyber Security Trends and Future Perspective
2. Network Security and Network Layers
3. Encryption and Cryptography Fundamentals
4. Authentication and Access Control
5. Malware and Types
6. Social Engineering Attacks
7. Web Security
8. Mobile Security and IoT Security
9. Network Monitoring and Security Testing
10. Security Protocols and Standards
11. Cyber Threats and Emergency Management
12. Current Cyber Security Trends and Future Perspective
Objectives of the Course
The aim of this course is to provide students with comprehensive information about internet security concepts, types of threats, and methods of protection from cyber attacks. Students will learn the basic principles and security protocols required to ensure the security of the internet infrastructure, and will experience network security, authentication, encryption, and data protection techniques in practice.
The course also aims to analyze security vulnerabilities, identify types of malware, and encourage safe internet use. At the end of the course, students will be able to develop defense strategies against security threats and will have a basic knowledge of cyber security.
The course also aims to analyze security vulnerabilities, identify types of malware, and encourage safe internet use. At the end of the course, students will be able to develop defense strategies against security threats and will have a basic knowledge of cyber security.
Contribution of the Course to Field Teaching
| Basic Vocational Courses | |
| Specialization / Field Courses | X |
| Support Courses | |
| Transferable Skills Courses | X |
| Humanities, Communication and Management Skills Courses |
Relationships between Course Learning Outcomes and Program Outcomes
| Relationship Levels | ||||
| Lowest | Low | Medium | High | Highest |
| 1 | 2 | 3 | 4 | 5 |
| # | Program Learning Outcomes | Level |
|---|---|---|
| P1 | He/she has basic, current and applied information about his/her profession. | 5 |
| P5 | Has the ability to independently evaluate professional problems and issues with an analytical and critical approach and propose solutions. | 5 |
| P9 | It has social, scientific, cultural and ethical values in the stages of collecting data related to its field, applying it and announcing the results. | 5 |
Course Learning Outcomes
| Upon the successful completion of this course, students will be able to: | |||
|---|---|---|---|
| No | Learning Outcomes | Outcome Relationship | Measurement Method ** |
| O1 | Knows how to use the internet and do research. | P.1.2 | 1,6,7 |
| O2 | Has knowledge about Computer and Security. | P.1.4 | 1 |
| O3 | Knows analytical, effective research and solution techniques to identify problems. | P.5.2 | 3,6 |
| O4 | Evaluate computer science topics and algorithms using critical thinking skills | P.5.4 | 1 |
| O5 | Makes decisions by taking into consideration social, scientific, cultural and ethical values. | P.9.1 | 7 |
| O6 | Follows ethical standards in data collection and analysis | P.9.2 | 1,3,6 |
| ** Written Exam: 1, Oral Exam: 2, Homework: 3, Lab./Exam: 4, Seminar/Presentation: 5, Term Paper: 6, Application: 7 | |||
Weekly Detailed Course Contents
| Week | Topics |
|---|---|
| 1 | Introduction to Internet Security and Basic Concepts |
| 2 | Network Security and Network Layers |
| 3 | Encryption and Cryptography Fundamentals |
| 4 | Authentication and Access Control |
| 5 | Malware and Its Types |
| 6 | Social Engineering Attacks |
| 7 | Pre-Exam Quiz and General Review |
| 8 | Web Security |
| 9 | Mobile Security and IoT Security |
| 10 | Network Monitoring and Security Testing |
| 11 | Security Protocols and Standards |
| 12 | Cyber Threats and Emergency Management |
| 13 | Current Cyber Security Trends and Future Perspective |
| 14 | Pre-Exam Quiz and General Review |
Textbook or Material
| Resources | Matt Bishop, "Computer Security: Art and Science " |
| Ross J. Anderson, "Security Engineering: A Guide to Building Dependable Distributed Systems" , 3rd Edition |
Evaluation Method and Passing Criteria
| In-Term Studies | Quantity | Percentage |
|---|---|---|
| Attendance | - | - |
| Laboratory | - | - |
| Practice | - | - |
| Field Study | - | - |
| Course Specific Internship (If Any) | - | - |
| Homework | - | - |
| Presentation | - | - |
| Projects | 1 | 20 (%) |
| Seminar | - | - |
| Quiz | 2 | 10 (%) |
| Listening | - | - |
| Midterms | 1 | 30 (%) |
| Final Exam | 1 | 40 (%) |
| Total | 100 (%) | |
ECTS / Working Load Table
| Quantity | Duration | Total Work Load | |
|---|---|---|---|
| Course Week Number and Time | 16 | 4 | 64 |
| Out-of-Class Study Time (Pre-study, Library, Reinforcement) | 14 | 2 | 28 |
| Midterms | 1 | 6 | 6 |
| Quiz | 2 | 1 | 2 |
| Homework | 0 | 0 | 0 |
| Practice | 0 | 0 | 0 |
| Laboratory | 0 | 0 | 0 |
| Project | 1 | 30 | 30 |
| Workshop | 0 | 0 | 0 |
| Presentation/Seminar Preparation | 1 | 4 | 4 |
| Fieldwork | 0 | 0 | 0 |
| Final Exam | 1 | 16 | 16 |
| Other | 0 | 0 | 0 |
| Total Work Load: | 150 | ||
| Total Work Load / 30 | 5 | ||
| Course ECTS Credits: | 5 | ||
Course - Learning Outcomes Matrix
| Relationship Levels | ||||
| Lowest | Low | Medium | High | Highest |
| 1 | 2 | 3 | 4 | 5 |
| # | Learning Outcomes | P1 | P5 | P9 |
|---|---|---|---|---|
| O1 | Knows how to use the internet and do research. | 4 | - | - |
| O2 | Has knowledge about Computer and Security. | - | - | - |
| O3 | Knows analytical, effective research and solution techniques to identify problems. | - | - | - |
| O4 | Evaluate computer science topics and algorithms using critical thinking skills | - | - | - |
| O5 | Makes decisions by taking into consideration social, scientific, cultural and ethical values. | - | - | - |
| O6 | Follows ethical standards in data collection and analysis | - | - | - |
