COURSE UNIT TITLE

: CYBER SECURITY FUNDAMENTALS

Description of Individual Course Units

Course Unit Code Course Unit Title Type Of Course D U L ECTS
SSD 2022 CYBER SECURITY FUNDAMENTALS ELECTIVE 1 1 0 2

Offered By

Natural Building Stones Technology

Level of Course Unit

Short Cycle Programmes (Associate's Degree)

Course Coordinator

RECEP KIRIŞ

Offered to

Welding Technology
Natural Building Stones Technology
Civil Defense And Firefighting Programme
Mining Technology
GEOTECHNICS
Industrial Glass and Ceramics
Drilling Technology

Course Objective

The aim of this course is to introduce the field of cybersecurity and to understand basic cybersecurity concepts and methods of defense and attack. Students will gain knowledge about these threats in order to understand the motivations and goals of cyber attackers. The course also teaches the basic principles of protecting computer systems and networks. They will learn about defense methods such as secure password use, software updates, firewalls and antivirus programs. The course encourages students to comply with laws and regulations and act within ethical boundaries. It contributes to raising awareness about the security of internet use and digital interactions and to the spread of cybersecurity culture.

Learning Outcomes of the Course Unit

1   Acts in accordance with ethical principles and respects the law in the digital environment.
2   Explains basic cybersecurity concepts.
3   Recognizes and analyzes different types of cyber threats.
4   Develop basic defense strategies.
5   Navigates safely in the digital environment and creates strong passwords

Mode of Delivery

Face -to- Face

Prerequisites and Co-requisites

None

Recomended Optional Programme Components

None

Course Contents

Week Subject Description
1 Cyber Security Basic Concepts
2 Basic Principles, Cyber Ethics Concept
3 Cryptographic Building Blocks
4 User Authentication
5 Passwords, Biometrics and Alternatives
6 Authentication Protocols and Key Setup
7 Operating System Security and Access Control
8 Midterm Exam
9 Software Security
10 Exploits and Privilege Escalation
11 Malware
12 Public Key Certificate Management and Use Cases
13 Web and Browser Security, Personal Data Rights, GDPR/KVKK Regulations
14 Firewalls and Tunnels
15 Intrusion Detection and Network-Based Attacks

Recomended or Required Reading

Paul C. van Oorschot, Siber Güvenliğe Giriş, çeviri: Prof. Dr. Kemal Bıçakcı (2021), Palme Yayınevi.
Paul C. van Oorschot. Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin (2021), Springer.

Planned Learning Activities and Teaching Methods

Narration; Question Answer, Problem Solving, Program Applications, Tactical Applications

Assessment Methods

SORTING NUMBER SHORT CODE LONG CODE FORMULA
1 MTE MIDTERM EXAM
2 PRC PRACTICE
3 FIN FINAL EXAM
4 FCG FINAL COURSE GRADE MTE * 0.50 + FIN * 0.50
5 RST RESIT
6 FCG FINAL COURSE GRADE MTE * 0.50 + RST * 0.50


Further Notes About Assessment Methods

None

Assessment Criteria

Meaningful learning of the basic concepts given in presentations, association of concepts with each other, establishing the cause-result relationships and making comments by using the information available for problems and evaluating idea generation are carried out with mid-term and final exams, active participation to the lecture, homework.

I. Midterm 50%: Checking theoretical knowledge
II. Application 30% Checking application method
III. Final Exam 50%: Checking all learning outcomes
IV. Supplementary exam: Checking all learning outcomes

Language of Instruction

Turkish

Course Policies and Rules

will be announced

Contact Details for the Lecturer(s)

Dokuz Eylül University, Torbalı Vocational School
Lect. Recep KIRIŞ
recep.kiris@deu.edu.tr

Office Hours

will be announced

Work Placement(s)

None

Workload Calculation

Activities Number Time (hours) Total Work Load (hours)
Lectures 14 2 28
Preparations before/after weekly lectures 13 1 13
Preparation for midterm exam 1 3 3
Preparation for final exam 1 4 4
Midterm 1 1 1
Final 1 1 1
TOTAL WORKLOAD (hours) 50

Contribution of Learning Outcomes to Programme Outcomes

PO/LOPO.1PO.2PO.3PO.4PO.5PO.6PO.7PO.8PO.9PO.10
LO.11
LO.21
LO.31
LO.41
LO.51