Mobile Technologies
Associate TR-NQF-HE: Level 5 QF-EHEA: Short Cycle EQF-LLL: Level 5

General course introduction information

Course Code: MBLP236
Course Name: Siber Güvenliğe Giriş
Course Semester: Spring
Course Credits:
Theoretical Practical Credit ECTS
3 0 3 6
Language of instruction: TR
Course Requisites:
Does the Course Require Work Experience?: No
Type of course: Department/Faculty Elective
Course Level:
Associate TR-NQF-HE:5. Master`s Degree QF-EHEA:Short Cycle EQF-LLL:5. Master`s Degree
Mode of Delivery: Face to face
Course Coordinator : Öğr.Gör. ALPER ÇELTİKÇİ
Course Lecturer(s):
Course Assistants:

Course Objective and Content

Course Objectives: To know the basics of Cyber Security.
Learning the concept of personal and corporate data.
To Learn Hacker Types and Threats, the Attacks.
To learn Network Security, Web Application Security and System Security.
To learn ISO 27001 Information Security Management System.
Course Content: Cyber Security Fundamentals. Personal and Corporate Data Concept. Hacker Types and Threats. Attackers, Concepts and Techniques. Network Security. Web Application Security. System Security. ISO 27001 Information Security Management System. The Future of Ciber Security.

Learning Outcomes

The students who have succeeded in this course;
Learning Outcomes
1 - Knowledge
Theoretical - Conceptual
2 - Skills
Cognitive - Practical
1) To know the basics of Cyber Security.
2) Learning the concept of personal and corporate data.
3) To Learn Hacker Types and Threats, the Attacks.
4) To learn Network Security, Web Application Security and System Security.
5) To learn ISO 27001 Information Security Management System.
3 - Competences
Communication and Social Competence
Learning Competence
Field Specific Competence
Competence to Work Independently and Take Responsibility

Lesson Plan

Week Subject Related Preparation
1) Fundamentals of Cyber Security. Lecture Notes
2) Fundamentals of Cyber Security. Lecture Notes
3) Personal and Corporate Data Concept. Lecture Notes
4) Hacker Types and Threats. Lecture Notes
5) Attacks, Concepts and Techniques. Lecture Notes
6) Attacks, Concepts and Techniques. Lecture Notes
7) Network Security. Lecture Notes
8) Web Application Security. Lecture Notes
9) Lecture Notes
10) Lecture Notes
11) Lecture Notes
12) Lecture Notes
13) Lecture Notes
14) Lecture Notes
15)
16)

Sources

Course Notes / Textbooks: Ders notları
References: Lecture notes

Course-Program Learning Outcome Relationship

Learning Outcomes

1

2

3

4

5

Program Outcomes
1) Has basic theoretical and practical knowledge in mathematics, computation and computer science.
2) It implements the defined problems and models of computer science and / or computer science and implements basic solution proposals.
3) Uses algorithmic thinking and planning approach in their applications.
4) Develops software components whose specifications are defined.
5) Communicates spoken and written; at least one foreign language at least on the European Language Portfolio A2 General Level, monitors information in the field of computer science and computer science and communicates with colleagues.
6) The necessity of lifelong learning follows consciousness and current developments in information and communication technologies.
7) Vocational and ethical responsibility is conscious and has an awareness of professional ethics in information applications.
8) It works effectively either individually or on teams.

Course - Learning Outcome Relationship

No Effect 1 Lowest 2 Low 3 Average 4 High 5 Highest
           
Program Outcomes Level of Contribution
1) Has basic theoretical and practical knowledge in mathematics, computation and computer science.
2) It implements the defined problems and models of computer science and / or computer science and implements basic solution proposals.
3) Uses algorithmic thinking and planning approach in their applications.
4) Develops software components whose specifications are defined.
5) Communicates spoken and written; at least one foreign language at least on the European Language Portfolio A2 General Level, monitors information in the field of computer science and computer science and communicates with colleagues.
6) The necessity of lifelong learning follows consciousness and current developments in information and communication technologies.
7) Vocational and ethical responsibility is conscious and has an awareness of professional ethics in information applications.
8) It works effectively either individually or on teams.

Learning Activity and Teaching Methods

Expression
Brainstorming/ Six tihnking hats
Lesson
Homework
Q&A / Discussion

Assessment & Grading Methods and Criteria

Written Exam (Open-ended questions, multiple choice, true-false, matching, fill in the blanks, sequencing)
Homework
Individual Project

Assessment & Grading

Semester Requirements Number of Activities Level of Contribution
Homework Assignments 1 % 30
Midterms 1 % 30
Final 1 % 40
total % 100
PERCENTAGE OF SEMESTER WORK % 60
PERCENTAGE OF FINAL WORK % 40
total % 100

Workload and ECTS Credit Grading

Activities Number of Activities Duration (Hours) Workload
Course Hours 15 3 45
Homework Assignments 1 40 40
Midterms 1 40 40
Final 1 50 50
Total Workload 175