Information Security Technology
Course Details

KTO KARATAY UNIVERSITY
Trade and Industry Vocational School
Programme of Information Security Technology
Course Details
Trade and Industry Vocational School
Programme of Information Security Technology
Course Details

| Course Code | Course Name | Year | Period | Semester | T+A+L | Credit | ECTS |
|---|---|---|---|---|---|---|---|
| 08131116 | Cryptology | 2 | Autumn | 3 | 2+2+0 | 5 | 5 |
| Course Type | Elective |
| Course Cycle | Associate (Short Cycle) (TQF-HE: Level 5 / QF-EHEA: Short Cycle / EQF-LLL: Level 5) |
| Course Language | Turkish |
| Methods and Techniques | - |
| Mode of Delivery | Face to Face |
| Prerequisites | - |
| Coordinator | - |
| Instructor(s) | Lect. Ayşe Merve BÜYÜKBAŞ |
| Instructor Assistant(s) | - |
Course Instructor(s)
| Name and Surname | Room | E-Mail Address | Internal | Meeting Hours |
|---|---|---|---|---|
| Lect. Ayşe Merve BÜYÜKBAŞ | C-127 | [email protected] | 7436 | Wednesday 10:00-12:00 |
Course Content
This course includes Introduction to Cryptology, Basic Concepts and Security Principles, Introduction to Classical Encryption Methods, Classical Encryption Applications, Fundamentals of Modern Cryptology, Symmetric Key Encryption Algorithms, Asymmetric Key Encryption Algorithms, Digital Signatures and Authentication, Applications of Hash Functions, Certificate and Key Management Systems, Cryptoanalysis (Decryption Methods), Current Cryptography Applications and General Evaluation.
Objectives of the Course
The objective of this course is to provide students with an understanding of the fundamental concepts of information security and to learn the fundamental cryptographic methods used to protect the confidentiality, integrity, and authenticity of data. Students will understand the logic behind encryption and decryption techniques, apply simple algorithms, and learn concepts such as key management, digital signatures, and authentication.
Contribution of the Course to Field Teaching
| Basic Vocational Courses | X |
| Specialization / Field Courses | |
| Support Courses | |
| Transferable Skills Courses | |
| Humanities, Communication and Management Skills Courses |
Relationships between Course Learning Outcomes and Program Outcomes
| Relationship Levels | ||||
| Lowest | Low | Medium | High | Highest |
| 1 | 2 | 3 | 4 | 5 |
| # | Program Learning Outcomes | Level |
|---|---|---|
| P1 | He/she has basic, current and practical knowledge about his/her profession. | 3 |
| P3 | Follows current developments and practices for his/her profession and uses them effectively. | 3 |
| P4 | Uses professionally relevant information technologies (software, programs, animations, etc.) effectively. | 3 |
| P5 | Has the ability to independently evaluate professional problems and issues with an analytical and critical approach and to propose solutions. | 5 |
| P6 | Can effectively present thoughts through written and verbal communication at the level of knowledge and skills and express them in an understandable manner. | 4 |
| P7 | Takes responsibility as a team member to solve unforeseen and complex problems encountered in applications related to his/her field. | 2 |
| P14 | Performs mathematical calculations. | 5 |
Course Learning Outcomes
| Upon the successful completion of this course, students will be able to: | |||
|---|---|---|---|
| No | Learning Outcomes | Outcome Relationship | Measurement Method ** |
| O1 | P.1.2 | 1 | |
| O2 | P.1.5 | 1,2 | |
| O3 | P.3.3 | 1,4,7 | |
| O4 | P.4.3 | 1,4,7 | |
| O5 | P.14.1 | 1,4,7 | |
| O6 | P.5.3 | 1,5 | |
| O7 | P.5.4 | 1,5 | |
| O8 | P.6.4 | 1,2 | |
| O9 | P.7.4 | 1,2,5 | |
| ** Written Exam: 1, Oral Exam: 2, Homework: 3, Lab./Exam: 4, Seminar/Presentation: 5, Term Paper: 6, Application: 7 | |||
Weekly Detailed Course Contents
| Week | Topics |
|---|---|
| 1 | Definition and history of cryptography, basic concepts (encryption, decryption, key, confidentiality, integrity). Areas where encryption is used in daily life. |
| 2 | The concept of information security, the CIA triad (Confidentiality, Integrity, Availability), authentication, authorization, digital trail. |
| 3 | Simple substitution and transposition methods, Caesar cipher, Atbash, ROT13 examples. |
| 4 | Vigenère cipher, Playfair cipher, Hill cipher. Encoding and decoding examples |
| 5 | Differences between symmetric and asymmetric encryption, concept of key management, security requirements. |
| 6 | General operating logic of DES, Triple DES and AES algorithms, concept of block encryption. |
| 7 | Working logic of RSA, Diffie-Hellman and ElGamal systems, general formulas and sample applications. |
| 8 | Midterm Exam |
| 9 | Digital signature logic, hash functions (MD5, SHA) and verification processes |
| 10 | Message summarization, password storage, and data integrity checking |
| 11 | Digital certificates, public key infrastructure (PKI), certificate authorities and their uses |
| 12 | Types of password cracking (brute force, frequency analysis), weak algorithms and secure encryption |
| 13 | SSL/TLS, e-Government, e-signature, mobile security and data hiding (steganography) examples |
| 14 | General Evaluation and Review |
| 15 | Final Exam |
Textbook or Material
| Resources | Notes shared by the course instructor |
Evaluation Method and Passing Criteria
| In-Term Studies | Quantity | Percentage |
|---|---|---|
| Attendance | - | - |
| Laboratory | - | - |
| Practice | - | - |
| Field Study | - | - |
| Course Specific Internship (If Any) | - | - |
| Homework | - | - |
| Presentation | - | - |
| Projects | - | - |
| Seminar | - | - |
| Quiz | - | - |
| Listening | - | - |
| Midterms | 1 | 40 (%) |
| Final Exam | 1 | 60 (%) |
| Total | 100 (%) | |
ECTS / Working Load Table
| Quantity | Duration | Total Work Load | |
|---|---|---|---|
| Course Week Number and Time | 14 | 8 | 112 |
| Out-of-Class Study Time (Pre-study, Library, Reinforcement) | 1 | 14 | 14 |
| Midterms | 1 | 10 | 10 |
| Quiz | 0 | 0 | 0 |
| Homework | 0 | 0 | 0 |
| Practice | 1 | 4 | 4 |
| Laboratory | 0 | 0 | 0 |
| Project | 0 | 0 | 0 |
| Workshop | 0 | 0 | 0 |
| Presentation/Seminar Preparation | 0 | 0 | 0 |
| Fieldwork | 0 | 0 | 0 |
| Final Exam | 1 | 10 | 10 |
| Other | 0 | 0 | 0 |
| Total Work Load: | 150 | ||
| Total Work Load / 30 | 5 | ||
| Course ECTS Credits: | 5 | ||
Course - Learning Outcomes Matrix
| Relationship Levels | ||||
| Lowest | Low | Medium | High | Highest |
| 1 | 2 | 3 | 4 | 5 |
| # | Learning Outcomes | P1 | P3 | P4 | P5 | P6 | P7 | P14 |
|---|---|---|---|---|---|---|---|---|
| O1 | Bilgisayar ve güvenliği hakkında bilgi sahibidir. | - | - | - | - | - | - | - |
| O2 | Güncel güvenlik trendlerini analiz eder. | - | - | - | - | - | - | - |
| O3 | Karmaşık problemleri ele alır ve yaratıcı çözümler üretir. | - | - | - | - | - | - | - |
| O4 | Algoritma geliştirmeyi bilir ve algoritmaya uygun veri yapısı oluşturur. | - | - | - | - | - | - | - |
| O5 | Uygun çözüm alternatiflerini üretir. | - | - | - | - | - | - | - |
| O6 | Alternatif çözüm yollarını değerlendirir ve en uygun olanını seçer. | - | - | - | - | - | - | - |
| O7 | Mesleki terminolojiyi doğru kullanır. | - | - | - | - | - | - | - |
| O8 | Proje veya görev kapsamında verilen sorumlulukları zamanında ve beklenen kalitede yerine getirir. | - | - | - | - | - | - | - |
| O9 | Mesleki problemleri çözmek için gerekli olan temel matematiksel işlemleri doğru bir şekilde gerçekleştirir. | - | - | - | - | - | - | - |
