Information Security Technology
Course Details

KTO KARATAY UNIVERSITY
Trade and Industry Vocational School
Programme of Information Security Technology
Course Details
Trade and Industry Vocational School
Programme of Information Security Technology
Course Details

| Course Code | Course Name | Year | Period | Semester | T+A+L | Credit | ECTS |
|---|---|---|---|---|---|---|---|
| 08110102 | Introduction to Cybersecurity | 1 | Autumn | 1 | 2+2+0 | 6 | 6 |
| Course Type | Compulsory |
| Course Cycle | Associate (Short Cycle) (TQF-HE: Level 5 / QF-EHEA: Short Cycle / EQF-LLL: Level 5) |
| Course Language | Turkish |
| Methods and Techniques | - |
| Mode of Delivery | Face to Face |
| Prerequisites | - |
| Coordinator | - |
| Instructor(s) | Lect. Merve AKIN |
| Instructor Assistant(s) | - |
Course Instructor(s)
| Name and Surname | Room | E-Mail Address | Internal | Meeting Hours |
|---|---|---|---|---|
| Lect. Merve AKIN | C-129 | [email protected] | 7869 | Wednesday 14:00-16:00 |
Course Content
Introduction to Cybersecurity and Fundamental Concepts, Malware, Cyber Attacks and Attack Types, Security Strategies and Protection , Internet and Social Media Security, Network Security, Mobile Device Security, Operating System Security
Objectives of the Course
The primary goal of this course is to provide students with a broad perspective in the field of cybersecurity. The course aims for students to recognize these risks by teaching them what cyber threats, attack types, and malware are. Students will learn essential protection strategies and defense methods against vulnerabilities encountered on different platforms (the internet, social media, mobile devices, operating systems, and networks). Furthermore, the course aims to ensure that students are informed about human-factor attack methods like social engineering and can act consciously against these threats.
Contribution of the Course to Field Teaching
| Basic Vocational Courses | |
| Specialization / Field Courses | X |
| Support Courses | |
| Transferable Skills Courses | X |
| Humanities, Communication and Management Skills Courses |
Relationships between Course Learning Outcomes and Program Outcomes
| Relationship Levels | ||||
| Lowest | Low | Medium | High | Highest |
| 1 | 2 | 3 | 4 | 5 |
| # | Program Learning Outcomes | Level |
|---|---|---|
| P1 | He/she has basic, current and practical knowledge about his/her profession. | 5 |
| P3 | Follows current developments and practices for his/her profession and uses them effectively. | 4 |
| P11 | Explains and applies data security and encryption methods. | 3 |
| P12 | Explains and applies techniques for network and internet security and protection against cyber threats. | 3 |
| P13 | Identifies and fixes security vulnerabilities in computer and software systems. | 3 |
Course Learning Outcomes
| Upon the successful completion of this course, students will be able to: | |||
|---|---|---|---|
| No | Learning Outcomes | Outcome Relationship | Measurement Method ** |
| O1 | P.1.1 | 1,3 | |
| O2 | P.1.2 | 1,3 | |
| O3 | P.11.1 | 1,3 | |
| O4 | P.1.5 | 1,3 | |
| O5 | P.3.4 | 1,3 | |
| O6 | P.12.1 | 1,3 | |
| O7 | P.12.2 | 1,3 | |
| O8 | P.12.5 | 1,3 | |
| O9 | P.13.1 | 1,3 | |
| O10 | P.13.3 | 1,3 | |
| ** Written Exam: 1, Oral Exam: 2, Homework: 3, Lab./Exam: 4, Seminar/Presentation: 5, Term Paper: 6, Application: 7 | |||
Weekly Detailed Course Contents
| Week | Topics |
|---|---|
| 1 | Introduction to Cybersecurity and Fundamental Concepts |
| 2 | Malware |
| 3 | Malware |
| 4 | Cyber Attacks and Attack Types |
| 5 | Security Strategies and Protection |
| 6 | Internet and Social Media Security |
| 7 | Quiz + General Review |
| 8 | Midterm Exam |
| 9 | Internet and Social Media Security |
| 10 | Network Security |
| 11 | Network Security |
| 12 | Mobile Device Security |
| 13 | Operating System Security |
| 14 | Operating System Security |
| 15 | Quiz + General Review |
| 16 | Final Exam |
Textbook or Material
| Resources | Paul C. Van Oorshot, "Siber Güvenliğe Giriş" |
| Dr. Mohammed Ridha FAISAL, "YAPAY ZEKA TABANLI SİBER GÜVENLİĞE GİRİŞ" |
Evaluation Method and Passing Criteria
| In-Term Studies | Quantity | Percentage |
|---|---|---|
| Attendance | - | - |
| Laboratory | - | - |
| Practice | - | - |
| Field Study | - | - |
| Course Specific Internship (If Any) | - | - |
| Homework | 10 | 10 (%) |
| Presentation | - | - |
| Projects | - | - |
| Seminar | - | - |
| Quiz | 2 | 20 (%) |
| Listening | - | - |
| Midterms | 1 | 30 (%) |
| Final Exam | 1 | 40 (%) |
| Total | 100 (%) | |
ECTS / Working Load Table
| Quantity | Duration | Total Work Load | |
|---|---|---|---|
| Course Week Number and Time | 16 | 4 | 64 |
| Out-of-Class Study Time (Pre-study, Library, Reinforcement) | 14 | 4 | 56 |
| Midterms | 1 | 8 | 8 |
| Quiz | 2 | 6 | 12 |
| Homework | 10 | 3 | 30 |
| Practice | 0 | 0 | 0 |
| Laboratory | 0 | 0 | 0 |
| Project | 0 | 0 | 0 |
| Workshop | 0 | 0 | 0 |
| Presentation/Seminar Preparation | 0 | 0 | 0 |
| Fieldwork | 0 | 0 | 0 |
| Final Exam | 1 | 10 | 10 |
| Other | 0 | 0 | 0 |
| Total Work Load: | 180 | ||
| Total Work Load / 30 | 6 | ||
| Course ECTS Credits: | 6 | ||
Course - Learning Outcomes Matrix
| Relationship Levels | ||||
| Lowest | Low | Medium | High | Highest |
| 1 | 2 | 3 | 4 | 5 |
| # | Learning Outcomes | P1 | P3 | P11 | P12 | P13 |
|---|---|---|---|---|---|---|
| O1 | Bilişim güvenliği temel kavramlarını tanımlar. | 5 | 3 | 4 | 4 | 4 |
| O2 | Bilgisayar ve güvenliği hakkında bilgi sahibidir. | 4 | 3 | 3 | 4 | 4 |
| O3 | Güncel güvenlik trendlerini analiz eder. | 4 | 5 | 4 | 4 | 4 |
| O4 | Güncel siber tehditler hakkında bilgi sahibidir. | 4 | 4 | 3 | 5 | 5 |
| O5 | Veri güvenliğinin temel prensiplerini ve amacını tanımlar. | 4 | 3 | 5 | 3 | 3 |
| O6 | Ağ ve internet güvenliğinin temel kavramlarını tanımlar ve işlevlerini açıklar. | 4 | 3 | 3 | 5 | 4 |
| O7 | Güncel ve yaygın siber tehdit türlerini ayırt eder ve bu tehditlerin sistemlere nasıl zarar verdiğini açıklar. | 4 | 4 | 3 | 5 | 5 |
| O8 | Bireysel ve kurumsal düzeyde internet kullanımı ve ağ erişimi için gerekli olan temel korunma tekniklerini uygular. | 4 | 3 | 4 | 5 | 3 |
| O9 | Yazılım ve sistemlerdeki yaygın güvenlik açıklarını ve bu açıkların nedenlerini açıklar. | 4 | 4 | 4 | 4 | 5 |
| O10 | Tespit edilen bir güvenlik açığının olası etkisini ve risk seviyesini değerlendirir. | 4 | 4 | 3 | 4 | 5 |
