| Course Name | Code | Semester | T+U Hours | Credit | ECTS |
|---|---|---|---|---|---|
| Informatics Security and Ethics | SAU 209 | 0 | 1 + 0 | 2 | 2 |
| Precondition Courses | |
| Recommended Optional Courses | |
| Course Language | Turkish |
| Course Level | Bachelor's Degree |
| Course Type | OPTIONAL |
| Course Coordinator | Prof.Dr. MEHMET BARIŞ HORZUM |
| Course Lecturers | |
| Course Assistants | Öğr. Gör. Aydın KİPER |
| Course Category | Teaching Suitable For Field |
| Course Objective | Information security and ethics to gain the necessary knowledge and skills. |
| Course Content | In the contents of this lecture; common concepts such as Network, Ethernet, protocols, IP address and methods of coding will be discussed. In addition, subjects such as cyber-attacks and methods of cyber- attacks, virtual securıty, risk management and network securıty will be discussed . |
| Development Goals |
|---|
|
| # | Course Learning Outcomes | Teaching Methods | Assessment Methods |
|---|---|---|---|
| 1 | 1) Describing LAN and Ethernet | Lecture, Question-Answer, Brain Storming, | |
| 2 | 2) Describing Protocol and Port Concepts | Lecture, Question-Answer, Brain Storming, | |
| 3 | 3) Creating Methods of attack and abuse | Lecture, Question-Answer, | |
| 4 | 4) Describing Internet Protocol (IP) | Lecture, Question-Answer, Discussion, | True False Tests, Gap Fill Tests, Short Answer Tests, |
| 5 | 5) Evaluating Corporate Network Security | Lecture, Question-Answer, Observation, | True False Tests, Gap Fill Tests, Short Answer Tests, |
| 6 | 6) Evaluating Cyber Security and Risk Management | Lecture, Question-Answer, Discussion, | True False Tests, Gap Fill Tests, Short Answer Tests, |
| Week | Course Topics | Preliminary Preparation |
|---|---|---|
| 1 | Data Communications | scan from different sources |
| 2 | LAN and Ethernet | scan from different sources |
| 3 | OSI Reference Model | scan from different sources |
| 4 | Protocol and Port Concepts | scan from different sources |
| 5 | TCP Structure | scan from different sources |
| 6 | Internet Protocol (IP) | scan from different sources |
| 7 | ARP watch | scan from different sources |
| 8 | Coding Techniques | scan from different sources |
| 9 | Key-Based Encryption | scan from different sources |
| 10 | Summary Functions | scan from different sources |
| 11 | Methods of attack and abuse | scan from different sources |
| 12 | Code Virgin Attacks | scan from different sources |
| 13 | Corporate Network Security | scan from different sources |
| 14 | Cyber Security and Risk Management | scan from different sources |
| Resources | |
|---|---|
| Course Notes | Lecturer notes |
| Course Resources | 1)Bilişim Toplumu ve Etik sorunlar. Gözde Dedeoğlu Aktuel Yayınları 2007. 2)Network:Bilgisayar Ağlarının Temelleri (Networking by Example) Barry Press, Marcia Press, Arşiv / Sistem Yayıncılık (2002). |
| Order | Program Outcomes | Level of Contribution | |||||
|---|---|---|---|---|---|---|---|
| 1 | 2 | 3 | 4 | 5 | |||
| # | Contribution of Course Learning Outcomes to Program Outcomes |
|---|---|
| 1 | 1) Describing LAN and Ethernet |
| 2 | 2) Describing Protocol and Port Concepts |
| 3 | 3) Creating Methods of attack and abuse |
| 4 | 4) Describing Internet Protocol (IP) |
| 5 | 5) Evaluating Corporate Network Security |
| 6 | 6) Evaluating Cyber Security and Risk Management |
| Evaluation System | |
|---|---|
| Semester Studies | Contribution Rate |
| 1. Ara Sınav | 40 |
| 1. Kısa Sınav | 10 |
| 1. Ödev | 40 |
| 2. Kısa Sınav | 10 |
| Total | 100 |
| 1. Yıl İçinin Başarıya | 50 |
| 1. Final | 50 |
| Total | 100 |
| ECTS - Workload Activity | Quantity | Time (Hours) | Total Workload (Hours) |
|---|---|---|---|
| Course Duration (Including the exam week: 16x Total course hours) | 16 | 2 | 32 |
| Hours for off-the-classroom study (Pre-study, practice) | 16 | 1 | 16 |
| Mid-terms | 1 | 4 | 4 |
| Final examination | 1 | 4 | 4 |
| Total Workload | 56 | ||
| Total Workload / 25 (Hours) | 2.24 | ||
| dersAKTSKredisi | 2 | ||