Information Security Technology
Course Details

KTO KARATAY UNIVERSITY
Trade and Industry Vocational School
Programme of Information Security Technology
Course Details
Trade and Industry Vocational School
Programme of Information Security Technology
Course Details

| Course Code | Course Name | Year | Period | Semester | T+A+L | Credit | ECTS |
|---|---|---|---|---|---|---|---|
| 08120104 | Network Management and Information Security | 1 | Spring | 2 | 2+1+0 | 5 | 5 |
| Course Type | Compulsory |
| Course Cycle | Associate (Short Cycle) (TQF-HE: Level 5 / QF-EHEA: Short Cycle / EQF-LLL: Level 5) |
| Course Language | Turkish |
| Methods and Techniques | - |
| Mode of Delivery | Face to Face |
| Prerequisites | - |
| Coordinator | - |
| Instructor(s) | Lect. Merve AKIN |
| Instructor Assistant(s) | - |
Course Instructor(s)
| Name and Surname | Room | E-Mail Address | Internal | Meeting Hours |
|---|---|---|---|---|
| Lect. Merve AKIN | C-129 | [email protected] | 7869 | Wednesday 14:00-16:00 |
Course Content
This course aims to empower students by merging two fundamental disciplines: managing modern network infrastructures and protecting these infrastructures against cyber threats. The first half of the course focuses on network management, examining core concepts such as network architectures, the OSI and TCP/IP models, IP addressing (especially subnetting), and network management protocols (SNMP). The second half is entirely devoted to information security, beginning with security principles like the CIA Triad (Confidentiality, Integrity, and Availability). This is followed by an in-depth exploration of cryptography, strong authentication methods, and access control mechanisms. Finally, students learn the installation and management strategies for the most common threats a network administrator will face, including DoS/DDoS attacks, firewalls, and intrusion detection/prevention systems (IDS/IPS).
Objectives of the Course
The main objective of this course is to provide students with the practical and theoretical skills to establish, manage, and ensure the security of an organization's computer networks.
Contribution of the Course to Field Teaching
| Basic Vocational Courses | |
| Specialization / Field Courses | X |
| Support Courses | |
| Transferable Skills Courses | X |
| Humanities, Communication and Management Skills Courses |
Relationships between Course Learning Outcomes and Program Outcomes
| Relationship Levels | ||||
| Lowest | Low | Medium | High | Highest |
| 1 | 2 | 3 | 4 | 5 |
| # | Program Learning Outcomes | Level |
|---|---|---|
| P1 | He/she has basic, current and practical knowledge about his/her profession. | 5 |
| P5 | Has the ability to independently evaluate professional problems and issues with an analytical and critical approach and to propose solutions. | 5 |
| P11 | Explains and applies data security and encryption methods. | 4 |
| P12 | Explains and applies techniques for network and internet security and protection against cyber threats. | 4 |
Course Learning Outcomes
| Upon the successful completion of this course, students will be able to: | |||
|---|---|---|---|
| No | Learning Outcomes | Outcome Relationship | Measurement Method ** |
| O1 | P.1.1 | 1,3 | |
| O2 | P.11.1 | 1,3 | |
| O3 | P.1.5 | 1,3 | |
| O4 | P.1.6 | 1,3 | |
| O5 | P.11.4 | 1,3 | |
| O6 | P.11.6 | 1,3 | |
| O7 | P.12.1 | 1,3 | |
| O8 | P.12.2 | 1,3 | |
| O9 | P.5.1 | 1,3 | |
| O10 | P.5.4 | 1,3 | |
| ** Written Exam: 1, Oral Exam: 2, Homework: 3, Lab./Exam: 4, Seminar/Presentation: 5, Term Paper: 6, Application: 7 | |||
Weekly Detailed Course Contents
| Week | Topics |
|---|---|
| 1 | Introduction to Networking and Fundamental Concepts |
| 2 | Network Architectures and Protocols |
| 3 | IP Addressing and Subnetting |
| 4 | Fundamentals of Network Management |
| 5 | Introduction to Information Security and the CIA Triad |
| 6 | Cryptography Fundamentals |
| 7 | Quiz + General Review |
| 8 | Midterm Exam |
| 9 | Network Attacks I: Reconnaissance and Scanning |
| 10 | Network Attacks II: Denial of Service (DoS/DDoS) |
| 11 | Firewalls and Intrusion Detection/Prevention Systems (IDS/IPS) |
| 12 | Authentication and Access Control |
| 13 | Wireless Network Security |
| 14 | Email, Web, and Application Security |
| 15 | Quiz + General Review |
| 16 | Final Exam |
Textbook or Material
| Resources | Andrew S. Tanenbaum, David J. Wetherall, "Computer Networks" |
Evaluation Method and Passing Criteria
| In-Term Studies | Quantity | Percentage |
|---|---|---|
| Attendance | - | - |
| Laboratory | - | - |
| Practice | - | - |
| Field Study | - | - |
| Course Specific Internship (If Any) | - | - |
| Homework | 10 | 10 (%) |
| Presentation | - | - |
| Projects | - | - |
| Seminar | - | - |
| Quiz | 2 | 20 (%) |
| Listening | - | - |
| Midterms | 1 | 30 (%) |
| Final Exam | 1 | 40 (%) |
| Total | 100 (%) | |
ECTS / Working Load Table
| Quantity | Duration | Total Work Load | |
|---|---|---|---|
| Course Week Number and Time | 16 | 3 | 48 |
| Out-of-Class Study Time (Pre-study, Library, Reinforcement) | 14 | 4 | 56 |
| Midterms | 1 | 10 | 10 |
| Quiz | 2 | 3 | 6 |
| Homework | 10 | 2 | 20 |
| Practice | 0 | 0 | 0 |
| Laboratory | 0 | 0 | 0 |
| Project | 0 | 0 | 0 |
| Workshop | 0 | 0 | 0 |
| Presentation/Seminar Preparation | 0 | 0 | 0 |
| Fieldwork | 0 | 0 | 0 |
| Final Exam | 1 | 10 | 10 |
| Other | 0 | 0 | 0 |
| Total Work Load: | 150 | ||
| Total Work Load / 30 | 5 | ||
| Course ECTS Credits: | 5 | ||
Course - Learning Outcomes Matrix
| Relationship Levels | ||||
| Lowest | Low | Medium | High | Highest |
| 1 | 2 | 3 | 4 | 5 |
| # | Learning Outcomes | P1 | P5 | P11 | P12 |
|---|---|---|---|---|---|
| O1 | Bilişim güvenliği temel kavramlarını tanımlar. | 5 | 3 | 4 | 4 |
| O2 | Güncel güvenlik trendlerini analiz eder. | 4 | 4 | 4 | 4 |
| O3 | Öğrenilen bilgileri uygulamalı örneklerle gösterir. | 5 | 4 | 4 | 4 |
| O4 | Bir problemi analiz eder. | 4 | 5 | 3 | 4 |
| O5 | Alternatif çözüm yollarını değerlendirir ve en uygun olanını seçer. | 4 | 5 | 4 | 4 |
| O6 | Veri güvenliğinin temel prensiplerini ve amacını tanımlar. | 5 | 3 | 5 | 3 |
| O7 | Temel düzeyde şifreleme ve veri çözme işlemlerini gerçekleştirecek araçları veya programlama yapılarını uygular. | 5 | 4 | 5 | 3 |
| O8 | Şifreleme yöntemlerinin veri bütünlüğü ve kimlik doğrulamasını sağlama rollerini açıklar ve bu yöntemleri kullanır. | 4 | 3 | 5 | 4 |
| O9 | Ağ ve internet güvenliğinin temel kavramlarını tanımlar ve işlevlerini açıklar. | 5 | 4 | 3 | 5 |
| O10 | Güncel ve yaygın siber tehdit türlerini ayırt eder ve bu tehditlerin sistemlere nasıl zarar verdiğini açıklar. | 4 | 5 | 3 | 5 |
