Vocatıonal School
Informatıon Securıty Technology
Course Information
COMPUTER NETWORKS I |
Code |
Semester |
Theoretical |
Practice |
National Credit |
ECTS Credit |
Hour / Week |
BGT106 |
Spring |
2 |
1 |
3 |
|
Prerequisites and co-requisites |
|
Language of instruction |
Turkish |
Type |
Required |
Level of Course |
Associate |
Lecturer |
|
Mode of Delivery |
Face to Face |
Suggested Subject |
|
Professional practise ( internship ) |
None |
Objectives of the Course |
The aim of this course is to explain the security risks that the end user will face and to teach the necessary solution methods. |
Contents of the Course |
Virus and antivirus types, Operating system security, Cyber crimes, Encryption methods, Network security. |
Learning Outcomes of Course
# |
Learning Outcomes |
1 |
Learn virus and antivirus types; |
2 |
Ensure operating system security; |
3 |
Learns cyber crimes; |
4 |
Learns encryption methods; |
5 |
Ensures network security |
Course Syllabus
# |
Subjects |
Teaching Methods and Technics |
1 |
Course Description; |
|
2 |
What is Security |
|
3 |
Virus - Antivirus and Derivatives; |
|
4 |
Cyber Wars; |
|
5 |
Security in Operating Systems; |
|
6 |
Security in Operating Systems; |
|
7 |
Security in Operating Systems; |
|
8 |
Midterm |
|
9 |
User Agreements |
|
10 |
Cyber Crimes; |
|
11 |
Encryption; |
|
12 |
Wireless Networks; |
|
13 |
Network Security; |
|
14 |
Certificates; |
|
15 |
Virtual Private Network (VPN); |
|
16 |
Final Exam |
|
Course Syllabus
# |
Material / Resources |
Information About Resources |
Reference / Recommended Resources |
Method of Assessment
# |
Weight |
Work Type |
Work Title |
1 |
40% |
Mid-Term Exam |
Mid-Term Exam |
2 |
60% |
Final Exam |
Final Exam |
Relationship between Learning Outcomes of Course and Program Outcomes
# |
Learning Outcomes |
Program Outcomes |
Method of Assessment |
1 |
Learn virus and antivirus types; |
2 |
1 |
2 |
Ensure operating system security; |
4 |
1 |
3 |
Learns cyber crimes; |
5 |
1 |
4 |
Learns encryption methods; |
7 |
2 |
5 |
Ensures network security |
1 |
2 |
PS. The numbers, which are shown in the column Method of Assessment, presents the methods shown in the previous table, titled as Method of Assessment.
Work Load Details
# |
Type of Work |
Quantity |
Time (Hour) |
Work Load |
1 |
Course Duration |
14 |
2 |
28 |
2 |
Course Duration Except Class (Preliminary Study, Enhancement) |
14 |
2 |
28 |
3 |
Presentation and Seminar Preparation |
1 |
2 |
2 |
4 |
Web Research, Library and Archival Work |
0 |
0 |
0 |
5 |
Document/Information Listing |
0 |
0 |
0 |
6 |
Workshop |
0 |
0 |
0 |
7 |
Preparation for Midterm Exam |
1 |
1 |
1 |
8 |
Midterm Exam |
1 |
1 |
1 |
9 |
Quiz |
0 |
0 |
0 |
10 |
Homework |
0 |
0 |
0 |
11 |
Midterm Project |
0 |
0 |
0 |
12 |
Midterm Exercise |
0 |
0 |
0 |
13 |
Final Project |
0 |
0 |
0 |
14 |
Final Exercise |
0 |
0 |
0 |
15 |
Preparation for Final Exam |
0 |
0 |
0 |
16 |
Final Exam |
0 |
0 |
0 |
|
60 |