Information Security Technology
Course Details

KTO KARATAY UNIVERSITY
Trade and Industry Vocational School
Programme of Information Security Technology
Course Details
Trade and Industry Vocational School
Programme of Information Security Technology
Course Details

| Course Code | Course Name | Year | Period | Semester | T+A+L | Credit | ECTS |
|---|---|---|---|---|---|---|---|
| 08140103 | Internet Security | 2 | Spring | 4 | 2+2+0 | 6 | 6 |
| Course Type | Elective |
| Course Cycle | Associate (Short Cycle) (TQF-HE: Level 5 / QF-EHEA: Short Cycle / EQF-LLL: Level 5) |
| Course Language | Turkish |
| Methods and Techniques | - |
| Mode of Delivery | Face to Face |
| Prerequisites | - |
| Coordinator | - |
| Instructor(s) | Lect. Ayşe Merve BÜYÜKBAŞ |
| Instructor Assistant(s) | - |
Course Instructor(s)
| Name and Surname | Room | E-Mail Address | Internal | Meeting Hours |
|---|---|---|---|---|
| Lect. Ayşe Merve BÜYÜKBAŞ | C-127 | [email protected] | 7436 | Wednesday 10:00-12:00 |
Course Content
This course covers security principles, CIA triad, threat/risk, internet protocols, user and identity security, malware, network security fundamentals, wireless network security, web application security, cloud computing security, mobile security, IoT security, data privacy and KVKK, event management and log analysis, security policies and management, current threats and assessment.
Objectives of the Course
The objective of this course is to teach students the fundamental concepts, technologies, and protection methods necessary to ensure information security in internet-based systems. Students will be able to analyze threats, attacks, and vulnerabilities that may be encountered in network and web environments, in line with the principles of the CIA triad (Confidentiality, Integrity, Availability), and will gain the knowledge and skills to develop defense mechanisms in areas such as user authentication, network security, malware, cloud, and IoT security.
Contribution of the Course to Field Teaching
| Basic Vocational Courses | |
| Specialization / Field Courses | X |
| Support Courses | |
| Transferable Skills Courses | |
| Humanities, Communication and Management Skills Courses |
Relationships between Course Learning Outcomes and Program Outcomes
| Relationship Levels | ||||
| Lowest | Low | Medium | High | Highest |
| 1 | 2 | 3 | 4 | 5 |
| # | Program Learning Outcomes | Level |
|---|---|---|
| P1 | He/she has basic, current and practical knowledge about his/her profession. | 5 |
| P3 | Follows current developments and practices for his/her profession and uses them effectively. | 4 |
| P5 | Has the ability to independently evaluate professional problems and issues with an analytical and critical approach and to propose solutions. | 3 |
| P9 | It has social, scientific, cultural and ethical values in the stages of collecting data related to its field, its application and the announcement of its results. | 4 |
| P11 | Explains and applies data security and encryption methods. | 4 |
| P12 | Explains and applies techniques for network and internet security and protection against cyber threats. | 5 |
Course Learning Outcomes
| Upon the successful completion of this course, students will be able to: | |||
|---|---|---|---|
| No | Learning Outcomes | Outcome Relationship | Measurement Method ** |
| O1 | P.1.2 | 1,2,7 | |
| O2 | P.1.6 | 2,7 | |
| O3 | P.11.4 | 1,7 | |
| O4 | P.12.1 | 1,2 | |
| O5 | P.9.6 | 1,2,7 | |
| O6 | P.20.3 | 7 | |
| ** Written Exam: 1, Oral Exam: 2, Homework: 3, Lab./Exam: 4, Seminar/Presentation: 5, Term Paper: 6, Application: 7 | |||
Weekly Detailed Course Contents
| Week | Topics |
|---|---|
| 1 | Security principles, CIA triad, threat/risk |
| 2 | Internet protocols |
| 3 | User and identity security |
| 4 | Malware |
| 5 | Network security fundamentals |
| 6 | Wireless network security |
| 7 | Web application security |
| 8 | Midterm Exam |
| 9 | Cloud computing security |
| 10 | Mobile security and IoT security |
| 11 | Data privacy and KVKK |
| 12 | Event management and log analysis |
| 13 | Security policies and management |
| 14 | Current threats and assessment |
| 15 | Final Exam |
Textbook or Material
| Resources | Notes shared by the course instructor |
| J. Glenn Brookshear, Computer Science: An Overview, 11th Edition, Pearson Education, 2012. | |
| Matt Bishop, Computer Security: Art and Science, Addison-Wesley Professional, 2003. |
Evaluation Method and Passing Criteria
| In-Term Studies | Quantity | Percentage |
|---|---|---|
| Attendance | - | - |
| Laboratory | - | - |
| Practice | - | - |
| Field Study | - | - |
| Course Specific Internship (If Any) | - | - |
| Homework | - | - |
| Presentation | - | - |
| Projects | - | - |
| Seminar | - | - |
| Quiz | - | - |
| Listening | - | - |
| Midterms | 1 | 40 (%) |
| Final Exam | 1 | 60 (%) |
| Total | 100 (%) | |
ECTS / Working Load Table
| Quantity | Duration | Total Work Load | |
|---|---|---|---|
| Course Week Number and Time | 14 | 8 | 112 |
| Out-of-Class Study Time (Pre-study, Library, Reinforcement) | 1 | 14 | 14 |
| Midterms | 1 | 10 | 10 |
| Quiz | 0 | 0 | 0 |
| Homework | 0 | 0 | 0 |
| Practice | 1 | 16 | 16 |
| Laboratory | 0 | 0 | 0 |
| Project | 1 | 18 | 18 |
| Workshop | 0 | 0 | 0 |
| Presentation/Seminar Preparation | 0 | 0 | 0 |
| Fieldwork | 0 | 0 | 0 |
| Final Exam | 1 | 10 | 10 |
| Other | 0 | 0 | 0 |
| Total Work Load: | 180 | ||
| Total Work Load / 30 | 6 | ||
| Course ECTS Credits: | 6 | ||
Course - Learning Outcomes Matrix
| Relationship Levels | ||||
| Lowest | Low | Medium | High | Highest |
| 1 | 2 | 3 | 4 | 5 |
| # | Learning Outcomes | P1 | P9 | P11 | P12 | P20 |
|---|---|---|---|---|---|---|
| O1 | Bilgisayar ve güvenliği hakkında bilgi sahibidir. | - | - | - | - | - |
| O2 | Öğrenilen bilgileri uygulamalı örneklerle gösterir. | - | - | - | - | - |
| O3 | Mesleki faaliyetleri sırasında veri gizliliği, veri güvenliği ve fikri mülkiyet hakları konularındaki yasal ve etik sorumluluklara uyar. | - | - | - | - | - |
| O4 | Temel düzeyde şifreleme ve veri çözme işlemlerini gerçekleştirecek araçları veya programlama yapılarını uygular. | - | - | - | - | - |
| O5 | Ağ ve internet güvenliğinin temel kavramlarını tanımlar ve işlevlerini açıklar. | - | - | - | - | - |
| O6 | İnternet ve web teknolojilerini kullanarak bilgi arama, bilgiye erişme ve bilgiyi güvenli bir şekilde paylaşma becerisi geliştirebilme. | - | - | - | - | - |
