Your transaction is in progress.
Please Wait...
Course Details
KTO KARATAY UNIVERSITY
Trade and Industry Vocational School
Programme of Information Security Technology
Course Details
Course Code Course Name Year Period Semester T+A+L Credit ECTS
08130101 Cyber ​​Attack and Defense Methods 2 Autumn 3 2+2+0 5 5
Course Type Compulsory
Course Cycle Associate (Short Cycle) (TQF-HE: Level 5 / QF-EHEA: Short Cycle / EQF-LLL: Level 5)
Course Language Turkish
Methods and Techniques -
Mode of Delivery Face to Face
Prerequisites -
Coordinator -
Instructor(s) Lect. Merve AKIN
Instructor Assistant(s) -
Course Instructor(s)
Name and Surname Room E-Mail Address Internal Meeting Hours
Lect. Merve AKIN C-129 [email protected] 7869 Wednesday
14.00-16.00
Course Content
The course content begins with the Cyber Attack Lifecycle, detailing the phases of an attack. This is followed by an examination of methods for gathering information and detecting vulnerabilities (Reconnaissance and Vulnerability Scanning), alongside exploitation techniques used against operating systems and network services. The curriculum also covers the analysis of Malware, including viruses, Trojans, and specifically Ransomware. In terms of practical defense, students study network protection tools such as Firewalls and Intrusion Detection/Prevention Systems (IDS/IPS). Finally, the course teaches Incident Response steps, which include actions to take during an attack and fundamentals of digital forensics, along with defense strategies against Social Engineering attacks.
Objectives of the Course
The primary aim of this course is to equip students with practical skills and theoretical knowledge from both the attacker's perspective and the defender's core strategies in the field of cybersecurity. The course intends for students to recognize modern cyber threats, understand the attack mechanisms used against them, and apply the necessary defense tools and techniques to protect organizations.
Contribution of the Course to Field Teaching
Basic Vocational Courses
Specialization / Field Courses X
Support Courses
Transferable Skills Courses X
Humanities, Communication and Management Skills Courses
Relationships between Course Learning Outcomes and Program Outcomes
Relationship Levels
Lowest Low Medium High Highest
1 2 3 4 5
# Program Learning Outcomes Level
P1 He/she has basic, current and practical knowledge about his/her profession. 5
P12 Explains and applies techniques for network and internet security and protection against cyber threats. 4
P13 Identifies and fixes security vulnerabilities in computer and software systems. 3
Course Learning Outcomes
Upon the successful completion of this course, students will be able to:
No Learning Outcomes Outcome Relationship Measurement Method **
O1 P.1.1 1,3
O2 P.1.2 1,3
O3 P.1.5 1,3
O4 P.12.1 1,3
O5 P.12.2 1,3
O6 P.13.1 1,3
O7 P.13.3 1,3
** Written Exam: 1, Oral Exam: 2, Homework: 3, Lab./Exam: 4, Seminar/Presentation: 5, Term Paper: 6, Application: 7
Weekly Detailed Course Contents
Week Topics
1 Introduction to Cybersecurity and Fundamental Concepts
2 Cyber Attack Lifecycle (Cyber Kill Chain)
3 Reconnaissance and Information Gathering
4 Vulnerability Scanning and Analysis
5 Malware and Analysis
6 Social Engineering and Phishing
7 Quiz + General Review
8 Midterm Exam
9 Network Defense I: Firewalls
10 Network Defense II: IDS and IPS Systems
11 Basic System Exploitation Techniques and Countermeasures
12 Cloud and Mobile Security
13 Incident Response (IR)
14 Incident Response (IR)
15 Quiz + General Review
16 Final Exam
Textbook or Material
Resources Erdal Özkaya, Raif Sarıca ve Şükrü Durmaz, "Siber Güvenlik: Saldırı ve Savunma Stratejileri"
Cemal Taner, "Uygulamalarla Siber Güvenliğe Giriş"
M. Alparslan Akyıldız, "Siber Güvenlikte Temel Kavramlar"
Evaluation Method and Passing Criteria
In-Term Studies Quantity Percentage
Attendance - -
Laboratory - -
Practice - -
Field Study - -
Course Specific Internship (If Any) - -
Homework 10 10 (%)
Presentation - -
Projects - -
Seminar - -
Quiz 2 20 (%)
Listening - -
Midterms 1 30 (%)
Final Exam 1 40 (%)
Total 100 (%)
ECTS / Working Load Table
Quantity Duration Total Work Load
Course Week Number and Time 16 4 64
Out-of-Class Study Time (Pre-study, Library, Reinforcement) 14 3 42
Midterms 1 8 8
Quiz 2 3 6
Homework 10 2 20
Practice 0 0 0
Laboratory 0 0 0
Project 0 0 0
Workshop 0 0 0
Presentation/Seminar Preparation 0 0 0
Fieldwork 0 0 0
Final Exam 1 10 10
Other 0 0 0
Total Work Load: 150
Total Work Load / 30 5
Course ECTS Credits: 5
Course - Learning Outcomes Matrix
Relationship Levels
Lowest Low Medium High Highest
1 2 3 4 5
# Learning Outcomes P1 P12 P13
O1 Bilişim güvenliği temel kavramlarını tanımlar. 5 5 5
O2 Bilgisayar ve güvenliği hakkında bilgi sahibidir. 5 5 5
O3 Güncel güvenlik trendlerini analiz eder. 5 3 3
O4 Ağ ve internet güvenliğinin temel kavramlarını tanımlar ve işlevlerini açıklar. 5 5 4
O5 Güncel ve yaygın siber tehdit türlerini ayırt eder ve bu tehditlerin sistemlere nasıl zarar verdiğini açıklar. 5 5 5
O6 Yazılım ve sistemlerdeki yaygın güvenlik açıklarını ve bu açıkların nedenlerini açıklar. 5 4 5
O7 Tespit edilen bir güvenlik açığının olası etkisini ve risk seviyesini değerlendirir. 4 3 5