Information Security Technology
Course Details

KTO KARATAY UNIVERSITY
Trade and Industry Vocational School
Programme of Information Security Technology
Course Details
Trade and Industry Vocational School
Programme of Information Security Technology
Course Details

| Course Code | Course Name | Year | Period | Semester | T+A+L | Credit | ECTS |
|---|---|---|---|---|---|---|---|
| 08120104 | Network Management and Information Security | 1 | Spring | 2 | 2+1+0 | 5 | 5 |
| Course Type | Compulsory |
| Course Cycle | Associate (Short Cycle) (TQF-HE: Level 5 / QF-EHEA: Short Cycle / EQF-LLL: Level 5) |
| Course Language | Turkish |
| Methods and Techniques | - |
| Mode of Delivery | Face to Face |
| Prerequisites | - |
| Coordinator | - |
| Instructor(s) | Lect. Merve AKIN |
| Instructor Assistant(s) | - |
Course Instructor(s)
| Name and Surname | Room | E-Mail Address | Internal | Meeting Hours |
|---|---|---|---|---|
| Lect. Merve AKIN | C-129 | [email protected] | 7869 | Wednesday 14:00-16:00 |
Course Content
This course covers a comprehensive curriculum ranging from the fundamental principles of computer networks to advanced network management and cybersecurity strategies. In the first half of the semester, the focus is on network infrastructures and the SNMP protocol, emphasizing the monitoring and management of network performance. The security component begins with symmetric encryption and message confidentiality. Following the midterm, the course delves deeper into asymmetric security elements such as public-key encryption, message authentication, and key distribution mechanisms. In the final phase, these theoretical security concepts are applied to practical domains, including Transport Layer Security (TLS), wireless network security, email security, and general system security. Supported by quizzes and review sessions, this content aims to provide students with both theoretical cryptographic knowledge and the practical skills required to protect modern network infrastructures.
Objectives of the Course
The primary objective of the Network Management and Information Security course is to provide the technical and theoretical knowledge necessary for the sustainable operation, monitoring, and defense of modern computer networks against all types of cyber threats. This course offers students the ability to analyze the performance and status of network devices at a professional level using protocols such as SNMP, while teaching cryptographic methods to ensure data confidentiality, integrity, and availability. Throughout the educational process, the course aims to build proficiency across a wide spectrum, ranging from symmetric and asymmetric encryption techniques and digital signatures to defense mechanisms like firewalls and IDS/IPS, as well as user authentication protocols. Ultimately, the course intends to enable an IT professional to manage complex network infrastructures and protect them against current cyber-attacks within the framework of ethical and scientific standards.
Contribution of the Course to Field Teaching
| Basic Vocational Courses | |
| Specialization / Field Courses | X |
| Support Courses | |
| Transferable Skills Courses | X |
| Humanities, Communication and Management Skills Courses |
Relationships between Course Learning Outcomes and Program Outcomes
| Relationship Levels | ||||
| Lowest | Low | Medium | High | Highest |
| 1 | 2 | 3 | 4 | 5 |
| # | Program Learning Outcomes | Level |
|---|---|---|
| P1 | He/she has basic, current and practical knowledge about his/her profession. | 5 |
| P3 | Follows current developments and practices for his/her profession and uses them effectively. | 5 |
| P11 | Explains and applies data security and encryption methods. | 3 |
| P12 | Explains and applies techniques for network and internet security and protection against cyber threats. | 4 |
| P13 | Identifies and fixes security vulnerabilities in computer and software systems. | 3 |
Course Learning Outcomes
| Upon the successful completion of this course, students will be able to: | |||
|---|---|---|---|
| No | Learning Outcomes | Outcome Relationship | Measurement Method ** |
| O1 | P.1.1 | 1 | |
| O2 | P.11.1 | 1 | |
| O3 | P.11.2 | 1 | |
| O4 | P.3.1 | 1 | |
| O5 | P.3.4 | 1 | |
| O6 | P.12.1 | 1 | |
| O7 | P.12.3 | 1 | |
| O8 | P.13.1 | 1 | |
| ** Written Exam: 1, Oral Exam: 2, Homework: 3, Lab./Exam: 4, Seminar/Presentation: 5, Term Paper: 6, Application: 7 | |||
Weekly Detailed Course Contents
| Week | Topics |
|---|---|
| 1 | Overview of Computer Networks |
| 2 | Overview of Computer Networks |
| 3 | Network Management and SNMP |
| 4 | Network Management and SNMP |
| 5 | Symmetric Encryption and Message Confidentiality |
| 6 | Symmetric Encryption and Message Confidentiality |
| 7 | Quiz + General Review |
| 8 | Midterm Exam |
| 9 | Public-Key Encryption and Message Authentication |
| 10 | Public-Key Encryption and Message Authentication |
| 11 | Key Distribution and User Authentication |
| 12 | Transport Layer and Wireless Network Security |
| 13 | Email Security |
| 14 | System Security |
| 15 | Quiz + General Review |
| 16 | Final Exam |
Textbook or Material
| Resources | Andrew S. Tanenbaum, David J. Wetherall, "Computer Networks" |
Evaluation Method and Passing Criteria
| In-Term Studies | Quantity | Percentage |
|---|---|---|
| Attendance | - | - |
| Laboratory | - | - |
| Practice | - | - |
| Field Study | - | - |
| Course Specific Internship (If Any) | - | - |
| Homework | - | - |
| Presentation | - | - |
| Projects | - | - |
| Seminar | - | - |
| Quiz | 2 | 20 (%) |
| Listening | - | - |
| Midterms | 1 | 35 (%) |
| Final Exam | 1 | 45 (%) |
| Total | 100 (%) | |
ECTS / Working Load Table
| Quantity | Duration | Total Work Load | |
|---|---|---|---|
| Course Week Number and Time | 16 | 3 | 48 |
| Out-of-Class Study Time (Pre-study, Library, Reinforcement) | 14 | 4 | 56 |
| Midterms | 1 | 12 | 12 |
| Quiz | 2 | 8 | 16 |
| Homework | 0 | 0 | 0 |
| Practice | 0 | 0 | 0 |
| Laboratory | 0 | 0 | 0 |
| Project | 0 | 0 | 0 |
| Workshop | 0 | 0 | 0 |
| Presentation/Seminar Preparation | 0 | 0 | 0 |
| Fieldwork | 0 | 0 | 0 |
| Final Exam | 1 | 18 | 18 |
| Other | 0 | 0 | 0 |
| Total Work Load: | 150 | ||
| Total Work Load / 30 | 5 | ||
| Course ECTS Credits: | 5 | ||
Course - Learning Outcomes Matrix
| Relationship Levels | ||||
| Lowest | Low | Medium | High | Highest |
| 1 | 2 | 3 | 4 | 5 |
| # | Learning Outcomes | P1 | P3 | P11 | P12 | P13 |
|---|---|---|---|---|---|---|
| O1 | Bilişim güvenliği temel kavramlarını tanımlar. | 5 | 3 | 4 | 4 | 3 |
| O2 | Alanındaki yenilikleri ve gelişmeleri düzenli olarak takip eder ve mesleki gelişimine uygular. | 4 | 5 | 3 | 3 | 3 |
| O3 | Güncel siber tehditler hakkında bilgi sahibidir. | 4 | 4 | 3 | 5 | 4 |
| O4 | Veri güvenliğinin temel prensiplerini ve amacını tanımlar. | 5 | 3 | 5 | 4 | 3 |
| O5 | Şifreleme algoritmalarının çalışma prensiplerini açıklar. | 4 | 3 | 5 | 3 | 3 |
| O6 | Ağ ve internet güvenliğinin temel kavramlarını tanımlar ve işlevlerini açıklar. | 4 | 3 | 3 | 5 | 4 |
| O7 | Temel düzeyde ağ güvenliği araçlarını yapılandırır ve uygular. | 3 | 4 | 4 | 5 | 5 |
| O8 | Yazılım ve sistemlerdeki yaygın güvenlik açıklarını ve bu açıkların nedenlerini açıklar. | 4 | 3 | 3 | 4 | 5 |
