Information
Code | SD0141 |
Name | Cyber Security and Ethical Hacking |
Term | 2023-2024 Academic Year |
Term | Fall and Spring |
Duration (T+A) | 2-0 (T-A) (17 Week) |
ECTS | 3 ECTS |
National Credit | 2 National Credit |
Teaching Language | Türkçe |
Level | Lisans Dersi |
Label | NFE Non-Field Elective Courses (University) UCC University Common Course |
Mode of study | Yüz Yüze Öğretim |
Catalog Information Coordinator | Öğr. Gör. MURAT KARA |
Course Instructor |
Öğr. Gör. MURAT KARA
(A Group)
(Ins. in Charge)
Öğr. Gör. MURAT KARA (A Group) (Ins. in Charge) |
Course Goal / Objective
Information security, awareness in cyber security issues. To provide information about the cyber attack-defense methods. To inform about ethical hacking.
Course Content
Information Security, Cyber Security, Ethical Hacking, Attack-Defense and Penetration Tests.
Course Precondition
To have basic computer knowledge.
Resources
It can be accessed online from the course website.
Notes
It is given in class.
Course Learning Outcomes
Order | Course Learning Outcomes |
---|---|
LO01 | Explains Information Security and awareness. |
LO02 | Explains Cyber Security and internet communication. |
LO03 | Explains the correct information about Hacker and Hacking. |
LO04 | Describes information about operating systems and server architectures. |
LO05 | Explains computer networks and their working mechanisms. |
LO06 | Explains forensic informatics and cryptology at introductory level. |
LO07 | Recognize and use virtual cyber laboratory environments. |
LO08 | Recognize and use cyber attack tools. |
LO09 | Recognize and use cyber defense tools. |
LO10 | Describes web security methods and writes clean code. |
LO11 | Explains wireless network security methods at entry level. |
LO12 | Describes cyber security standards. |
LO13 | Explain ethical hacking and its benefits. |
Week Plan
Week | Topic | Preparation | Methods |
---|---|---|---|
1 | Knowledge of security and awareness formation | Literature review | |
2 | Knowledge of cyber security and internet communication | Reading material | |
3 | To provide accurate information about Hacker and Hacking | Reading material | |
4 | Helping to have knowledge about operating systems and server architectures | Reading material | |
5 | Knowledge of computer networks | Reading material | |
6 | Knowledge of forensic knowledge and cryptology | Reading material | |
7 | Recognition and use of virtual cyber laboratory environments | Reading material | |
8 | Mid-Term Exam | Exam | |
9 | Recognition of pyrotechnic attack vehicles | Reading material | |
10 | Recognition of Cyber defense vehicles | Reading material | |
11 | Learning Web security methods and writing clean code | Reading material | |
12 | Knowing wireless network security methods | Reading material | |
13 | Knowledge of cyber safety standards | Reading material | |
14 | Learning ethical hacking and benefits | Reading material | |
15 | CTF competition | CTF Application | |
16 | Term Exams | Final | |
17 | Term Exams | Final |
Student Workload - ECTS
Works | Number | Time (Hour) | Workload (Hour) |
---|---|---|---|
Course Related Works | |||
Class Time (Exam weeks are excluded) | 14 | 2 | 28 |
Out of Class Study (Preliminary Work, Practice) | 14 | 2 | 28 |
Assesment Related Works | |||
Homeworks, Projects, Others | 0 | 0 | 0 |
Mid-term Exams (Written, Oral, etc.) | 1 | 8 | 8 |
Final Exam | 1 | 16 | 16 |
Total Workload (Hour) | 80 | ||
Total Workload / 25 (h) | 3,20 | ||
ECTS | 3 ECTS |