Vocatıonal School
Informatıon Securıty Technology

Course Information

CYBER SECURITY II
Code Semester Theoretical Practice National Credit ECTS Credit
Hour / Week
BGT102 Spring 3 0 3

Prerequisites and co-requisites
Language of instruction Turkish
Type Required
Level of Course Associate
Lecturer
Mode of Delivery Face to Face
Suggested Subject
Professional practise ( internship ) None
Objectives of the Course The aim of this course is to teach basic information about computer and network security.
Contents of the Course Cyber ​​security applications, Computer security, Network security, Basic cryptographic structures, Cyber ​​security problems in the IT world.

Learning Outcomes of Course

# Learning Outcomes
1 Learns cyber security applications
2 Ensures computer security
3 Ensures network security
4 Learn the basic encryption structures
5 Recognize the cyber security problems in the informatics world

Course Syllabus

# Subjects Teaching Methods and Technics
1 Login Expression
2 Introduction to Cyber ​​World and Security Expression
3 Cyber ​​Security Concepts Expression
4 Cyber ​​Security Applications Expression
5 Computer Security Expression
6 Computer Security Expression
7 Computer Security Expression
8 Midterm Written
9 Network Security Expression
10 Network Security Expression
11 Basic Encryption Structures Expression
12 Basic Encryption Structures Expression
13 Seminar and Application Courses Expression
14 Seminar and Application Courses Expression
15 Seminar and Application Courses Expression
16 Final Exam Written

Course Syllabus

# Material / Resources Information About Resources Reference / Recommended Resources

Method of Assessment

# Weight Work Type Work Title
1 30% Mid-Term Exam Mid-Term Exam
2 50% Final Exam Final Exam
3 20% Mid-Term Project Mid-Term Project

Relationship between Learning Outcomes of Course and Program Outcomes

# Learning Outcomes Program Outcomes Method of Assessment
1 Learns cyber security applications 1 1
2 Ensures computer security 2͵4͵5 1
3 Ensures network security 3͵5͵6 1
4 Learn the basic encryption structures 2 2
5 Recognize the cyber security problems in the informatics world 4 2
PS. The numbers, which are shown in the column Method of Assessment, presents the methods shown in the previous table, titled as Method of Assessment.

Work Load Details

# Type of Work Quantity Time (Hour) Work Load
1 Course Duration 14 3 42
2 Course Duration Except Class (Preliminary Study, Enhancement) 14 2 28
3 Presentation and Seminar Preparation 0 0 0
4 Web Research, Library and Archival Work 0 0 0
5 Document/Information Listing 0 0 0
6 Workshop 0 0 0
7 Preparation for Midterm Exam 1 5 5
8 Midterm Exam 1 5 5
9 Quiz 0 0 0
10 Homework 0 0 0
11 Midterm Project 0 0 0
12 Midterm Exercise 0 0 0
13 Final Project 0 0 0
14 Final Exercise 0 0 0
15 Preparation for Final Exam 1 5 5
16 Final Exam 1 5 5
  90