Course Name | Code | Semester | T+U Hours | Credit | ECTS |
---|---|---|---|---|---|
Informatics Security and Ethics | SAU 209 | 0 | 1 + 0 | 2 | 2 |
Precondition Courses | |
Recommended Optional Courses | |
Course Language | Turkish |
Course Level | Bachelor's Degree |
Course Type | OPTIONAL |
Course Coordinator | Prof.Dr. MEHMET BARIŞ HORZUM |
Course Lecturers | |
Course Assistants | Öğr. Gör. Aydın KİPER |
Course Category | Other |
Course Objective | Information security and ethics to gain the necessary knowledge and skills. |
Course Content | In the contents of this lecture; common concepts such as Network, Ethernet, protocols, IP address and methods of coding will be discussed. In addition, subjects such as cyber-attacks and methods of cyber- attacks, virtual securıty, risk management and network securıty will be discussed . |
# | Course Learning Outcomes | Teaching Methods | Assessment Methods |
---|---|---|---|
1 | 1) Describing LAN and Ethernet | Lecture, Question-Answer, Brain Storming, | |
2 | 2) Describing Protocol and Port Concepts | Lecture, Question-Answer, Brain Storming, | |
3 | 3) Creating Methods of attack and abuse | Lecture, Question-Answer, | |
4 | 4) Describing Internet Protocol (IP) | Lecture, Question-Answer, Discussion, | True False Tests, Gap Fill Tests, Short Answer Tests, |
5 | 5) Evaluating Corporate Network Security | Lecture, Question-Answer, Observation, | True False Tests, Gap Fill Tests, Short Answer Tests, |
6 | 6) Evaluating Cyber Security and Risk Management | Lecture, Question-Answer, Discussion, | True False Tests, Gap Fill Tests, Short Answer Tests, |
Week | Course Topics | Preliminary Preparation |
---|---|---|
1 | Data Communications | scan from different sources |
2 | LAN and Ethernet | scan from different sources |
3 | OSI Reference Model | scan from different sources |
4 | Protocol and Port Concepts | scan from different sources |
5 | TCP Structure | scan from different sources |
6 | Internet Protocol (IP) | scan from different sources |
7 | ARP watch | scan from different sources |
8 | Coding Techniques | scan from different sources |
9 | Key-Based Encryption | scan from different sources |
10 | Summary Functions | scan from different sources |
11 | Methods of attack and abuse | scan from different sources |
12 | Code Virgin Attacks | scan from different sources |
13 | Corporate Network Security | scan from different sources |
14 | Cyber Security and Risk Management | scan from different sources |
Resources | |
---|---|
Course Notes | Lecturer notes |
Course Resources | 1)Bilişim Toplumu ve Etik sorunlar. Gözde Dedeoğlu Aktuel Yayınları 2007. 2)Network:Bilgisayar Ağlarının Temelleri (Networking by Example) Barry Press, Marcia Press, Arşiv / Sistem Yayıncılık (2002). |
Order | Program Outcomes | Level of Contribution | |||||
---|---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 |
# | Contribution of Course Learning Outcomes to Program Outcomes |
---|---|
1 | 1) Describing LAN and Ethernet |
2 | 2) Describing Protocol and Port Concepts |
3 | 3) Creating Methods of attack and abuse |
4 | 4) Describing Internet Protocol (IP) |
5 | 5) Evaluating Corporate Network Security |
6 | 6) Evaluating Cyber Security and Risk Management |
Evaluation System | |
---|---|
Semester Studies | Contribution Rate |
1. Ara Sınav | 40 |
1. Kısa Sınav | 10 |
1. Ödev | 40 |
2. Kısa Sınav | 10 |
Total | 100 |
1. Yıl İçinin Başarıya | 50 |
1. Final | 50 |
Total | 100 |
ECTS - Workload Activity | Quantity | Time (Hours) | Total Workload (Hours) |
---|---|---|---|
Course Duration (Including the exam week: 16x Total course hours) | 16 | 3 | 48 |
Hours for off-the-classroom study (Pre-study, practice) | 16 | 3 | 48 |
Mid-terms | 1 | 4 | 4 |
Quiz | 2 | 2 | 4 |
Assignment | 1 | 4 | 4 |
Final examination | 1 | 8 | 8 |
Total Workload | 116 | ||
Total Workload / 25 (Hours) | 4.64 | ||
dersAKTSKredisi | 2 |