Computer Engineering | |||||
Bachelor | Length of the Programme: 4 | Number of Credits: 240 | TR-NQF-HE: Level 6 | QF-EHEA: First Cycle | EQF: Level 6 |
School/Faculty/Institute | Faculty of Engineering | ||||
Course Code | COMP 461 | ||||
Course Title in English | Introduction to Cyber Security | ||||
Course Title in Turkish | Siber Güvenliğe Giriş | ||||
Language of Instruction | EN | ||||
Type of Course | Flipped Classroom | ||||
Level of Course | Introductory | ||||
Semester | Spring,Fall | ||||
Contact Hours per Week |
|
||||
Estimated Student Workload | 156 hours per semester | ||||
Number of Credits | 6 ECTS | ||||
Grading Mode | Standard Letter Grade | ||||
Pre-requisites | None | ||||
Expected Prior Knowledge | None | ||||
Co-requisites | None | ||||
Registration Restrictions | Undergraduate students only | ||||
Overall Educational Objective | To develop the technical skills necessary for Cyber Security and gaining practical expertise and learning attack detection systems, techniques and software that solve cyber security problems, smart systems. | ||||
Course Description | Internet and Web security. Security standards. Intruders and viruses. E-mail security. Firewalls.Varieties of attacks to information systems. Counter measures and techniques. Counter measures against a specific type of attack. Heuristic methods. Monitoring methods. Determining malicious logic. Analysis of security flaws. Enhancing protective methods. | ||||
Course Description in Turkish | İnternet güvenliği. Güvenlik standartları. Yabancılar ve virüsler. E-posta güvenliği, Firewall lar.Bilgi sistemlerine yönelik saldırı türleri, Saldırılara karşı geliştirilen yöntemler ve teknikler: Saldırı türüne özel karşı önlemler, Sezgisel önlemler, Bilgi sistemini izleme yöntemleri, Kötü niyetli davranışların saptanması, Güvenlik açıklarının incelenmesi, Önleme yöntemlerinin geliştirilmesi |
Course Learning Outcomes and CompetencesUpon successful completion of the course, the learner is expected to be able to:1) identify basic features of Cyber Security; 2) comprehend intrusion detection mechanisms; 3) determine counter measures against common types of attacks 4) apply cyber security mechanisms 5) acquire and apply new knowledge as needed |
Program Learning Outcomes/Course Learning Outcomes | 1 | 2 | 3 | 4 | 5 |
---|---|---|---|---|---|
1) An ability to identify, formulate, and solve complex engineering problems by applying principles of engineering, science, and mathematics | |||||
2) An ability to apply engineering design to produce solutions that meet specified needs with consideration of public health, safety, and welfare, as well as global, cultural, social, environmental, and economic factors | |||||
3) An ability to communicate effectively with a range of audiences | |||||
4) An ability to recognize ethical and professional responsibilities in engineering situations and make informed judgments, which must consider the impact of engineering solutions in global, economic, environmental, and societal contexts | |||||
5) An ability to function effectively on a team whose members together provide leadership, create a collaborative and inclusive environment, establish goals, plan tasks, and meet objectives | |||||
6) An ability to develop and conduct appropriate experimentation, analyze and interpret data, and use engineering judgment to draw conclusions | |||||
7) An ability to acquire and apply new knowledge as needed, using appropriate learning strategies. |
N None | S Supportive | H Highly Related |
Program Outcomes and Competences | Level | Assessed by | |
1) | An ability to identify, formulate, and solve complex engineering problems by applying principles of engineering, science, and mathematics | N | |
2) | An ability to apply engineering design to produce solutions that meet specified needs with consideration of public health, safety, and welfare, as well as global, cultural, social, environmental, and economic factors | H | Exam,HW |
3) | An ability to communicate effectively with a range of audiences | N | |
4) | An ability to recognize ethical and professional responsibilities in engineering situations and make informed judgments, which must consider the impact of engineering solutions in global, economic, environmental, and societal contexts | N | |
5) | An ability to function effectively on a team whose members together provide leadership, create a collaborative and inclusive environment, establish goals, plan tasks, and meet objectives | N | |
6) | An ability to develop and conduct appropriate experimentation, analyze and interpret data, and use engineering judgment to draw conclusions | N | |
7) | An ability to acquire and apply new knowledge as needed, using appropriate learning strategies. | S | Exam,HW |
Prepared by and Date | NAFİZ ÜNLÜ , November 2023 |
Course Coordinator | ŞENİZ DEMİR |
Semester | Spring,Fall |
Name of Instructor | Öğr. Gör. NAFİZ ÜNLÜ |
Week | Subject |
1) | Vulnerability, threat and attack |
2) | Attack types and their classification |
3) | Common defense methods against common attacks |
4) | Defense methods based on classified data |
5) | Defense methods based on heuristics |
6) | Monitoring information systems |
7) | Detecting malicious behavior |
8) | Defense methods against insider attacks |
9) | Up-to-date threats |
10) | Design a defense approach based on a selected threat (Discussion and induction) |
11) | Up-to-date threats |
12) | Design a defense approach based on a selected threat (Discussion and induction) |
13) | Paper discussion |
14) | Paper discussion |
15) | Final Exam/Project/Presentation Period |
16) | Final Exam/Project/Presentation Period |
Required/Recommended Readings | 1. The State of the Art in Intrusion Prevention and Detection, Al-Sakib Khan Pathan, 2014, Auerbach Publications. 2. Network Security Assessment: Know Your Network, 2nd Ed., Chris McNab, 2007, O'Reilly Media. 3. Security Strategies In Web Applications And Social Networking, Mike Harwood, Marcus Goncalves, Matthew Pemble, 2010, Jones & Bartlett Learning. 4. IT Audit, Control, and Security, 2nd Ed., Robert R. Moeller, 2010, Wiley. 5. Information Assurance Architecture, Keith D. Willett, 2008, Auerbach | ||||||||||||
Teaching Methods | Flipped Classroom | ||||||||||||
Homework and Projects | Assignments, Term Project | ||||||||||||
Laboratory Work | None | ||||||||||||
Computer Use | Required | ||||||||||||
Other Activities | None | ||||||||||||
Assessment Methods |
|
||||||||||||
Course Administration |
nafiz.unlu@gmail.com Dr. Nafiz Ünlü Instructor’s office: Phone number: 0090-542-2169366 Office hours: After the lecture via appointments E-mail address: nafiz.unlu@gmail.com Rules for attendance: No attendance required Statement on plagiarism: YÖK Disciplinary Regulation |
Activity | No/Weeks | Hours | Calculation | ||||
No/Weeks per Semester | Preparing for the Activity | Spent in the Activity Itself | Completing the Activity Requirements | ||||
Course Hours | 14 | 1 | 3 | 2 | 84 | ||
Project | 6 | 8 | 1 | 54 | |||
Final Examination | 1 | 15 | 2 | 1 | 18 | ||
Total Workload | 156 | ||||||
Total Workload/25 | 6.2 | ||||||
ECTS | 6 |