School/Faculty/Institute | Faculty of Engineering | ||||
Course Code | COMP 461 | ||||
Course Title in English | Introduction to Cyber Security | ||||
Course Title in Turkish | Siber Güvenliğe Giriş | ||||
Language of Instruction | EN | ||||
Type of Course | Flipped Classroom | ||||
Level of Course | Introductory | ||||
Semester | Spring,Fall | ||||
Contact Hours per Week |
|
||||
Estimated Student Workload | 156 hours per semester | ||||
Number of Credits | 6 ECTS | ||||
Grading Mode | Standard Letter Grade | ||||
Pre-requisites | None | ||||
Co-requisites | None | ||||
Expected Prior Knowledge | None | ||||
Registration Restrictions | Undergraduate students only | ||||
Overall Educational Objective | To develop the technical skills necessary for Cyber Security and gaining practical expertise and learning attack detection systems, techniques and software that solve cyber security problems, smart systems. | ||||
Course Description | Internet and Web security. Security standards. Intruders and viruses. E-mail security. Firewalls.Varieties of attacks to information systems. Counter measures and techniques. Counter measures against a specific type of attack. Heuristic methods. Monitoring methods. Determining malicious logic. Analysis of security flaws. Enhancing protective methods. |
Course Learning Outcomes and CompetencesUpon successful completion of the course, the learner is expected to be able to:1) Identify basic features of Cyber Security; 2) Comprehend intrusion detection mechanisms; 3) Determine counter measures against common types of attacks; 4) Apply cyber security mechanisms; 5) Acquire and apply new knowledge as needed. |
Program Learning Outcomes/Course Learning Outcomes | 1 | 2 | 3 | 4 | 5 |
---|---|---|---|---|---|
1) Has a broad foundation and intellectual awareness with exposure to mathematics, history, economics, and social sciences | |||||
2) Demonstrates knowledge and skills in different functional areas of business (accounting, finance, operations, marketing, strategy, and organization) and an understanding of their interactions within various industry sectors | |||||
3) Applies theoretical knowledge as well as creative, analytical, and critical thinking to manage complex technical or professional activities or projects | |||||
4) Exhibits an understanding of global, environmental, economic, legal, and regulatory contexts for business sustainability | |||||
5) Demonstrates individual and professional ethical behavior and social responsibility | |||||
6) Demonstrates responsiveness to ethnic, cultural, and gender diversity values and issues | |||||
7) Uses written and spoken English effectively (at least CEFR B2 level) to communicate information, ideas, problems, and solutions | |||||
8) Demonstrates skills in data and information acquisition, analysis, interpretation, and reporting | |||||
9) Displays computer proficiency to support problem solving and decision-making | |||||
10) Demonstrates teamwork, leadership, and entrepreneurial skills | |||||
11) Displays learning skills necessary for further study with a high degree of autonomy |
N None | S Supportive | H Highly Related |
Program Outcomes and Competences | Level | Assessed by | |
1) | Has a broad foundation and intellectual awareness with exposure to mathematics, history, economics, and social sciences | N | |
2) | Demonstrates knowledge and skills in different functional areas of business (accounting, finance, operations, marketing, strategy, and organization) and an understanding of their interactions within various industry sectors | N | |
3) | Applies theoretical knowledge as well as creative, analytical, and critical thinking to manage complex technical or professional activities or projects | N | |
4) | Exhibits an understanding of global, environmental, economic, legal, and regulatory contexts for business sustainability | N | |
5) | Demonstrates individual and professional ethical behavior and social responsibility | N | |
6) | Demonstrates responsiveness to ethnic, cultural, and gender diversity values and issues | N | |
7) | Uses written and spoken English effectively (at least CEFR B2 level) to communicate information, ideas, problems, and solutions | S | Presentation |
8) | Demonstrates skills in data and information acquisition, analysis, interpretation, and reporting | S | Participation |
9) | Displays computer proficiency to support problem solving and decision-making | N | |
10) | Demonstrates teamwork, leadership, and entrepreneurial skills | S | Participation |
11) | Displays learning skills necessary for further study with a high degree of autonomy | S | Participation |
Prepared by and Date | FUNDA ÖZDEMİR , February 2025 |
Course Coordinator | FUNDA ÖZDEMİR |
Semester | Spring,Fall |
Name of Instructor |
Week | Subject |
1) | Vulnerability, threat and attack |
2) | Attack types and their classification |
3) | Common defense methods against common attacks |
4) | Defense methods based on classified data |
5) | Defense methods based on heuristics |
6) | Monitoring information systems |
7) | Detecting malicious behavior |
8) | Defense methods against insider attacks |
9) | Up-to-date threats |
10) | Design a defense approach based on a selected threat (Discussion and induction) |
11) | Up-to-date threats |
12) | Design a defense approach based on a selected threat (Discussion and induction) |
13) | Paper discussion |
14) | Paper discussion |
15) | Final Exam/Project/Presentation Period |
16) | Final Exam/Project/Presentation Period |
Required/Recommended Readings | 1. The State of the Art in Intrusion Prevention and Detection, Al-Sakib Khan Pathan, 2014, Auerbach Publications. 2. Network Security Assessment: Know Your Network, 2nd Ed., Chris McNab, 2007, O'Reilly Media. 3. Security Strategies In Web Applications And Social Networking, Mike Harwood, Marcus Goncalves, Matthew Pemble, 2010, Jones & Bartlett Learning. 4. IT Audit, Control, and Security, 2nd Ed., Robert R. Moeller, 2010, Wiley. 5. Information Assurance Architecture, Keith D. Willett, 2008, Auerbach | ||||||||||||
Teaching Methods | Flipped Classroom | ||||||||||||
Homework and Projects | Assignments, Term Project | ||||||||||||
Laboratory Work | None | ||||||||||||
Computer Use | Required | ||||||||||||
Other Activities | None | ||||||||||||
Assessment Methods |
|
||||||||||||
Course Administration |
ozdemirf@mef.edu.tr Dr. Funda Özdemir Instructor’s office: 5th floor, no: 548 Phone number: Office hours: After the lecture via appointments E-mail address: ozdemirf@mef.edu.tr Rules for attendance: Statement on plagiarism: YÖK Disciplinary Regulation |
Activity | No/Weeks | Hours | Calculation | ||||
No/Weeks per Semester | Preparing for the Activity | Spent in the Activity Itself | Completing the Activity Requirements | ||||
Course Hours | 14 | 1 | 3 | 2 | 84 | ||
Project | 6 | 8 | 1 | 54 | |||
Final Examination | 1 | 15 | 2 | 1 | 18 | ||
Total Workload | 156 | ||||||
Total Workload/25 | 6.2 | ||||||
ECTS | 6 |