| BİLİŞİM GÜVENLİĞİ TEKNOLOJİSİ | |||||
|---|---|---|---|---|---|
| Qualification Awarded | Program Süresi | Toplam Kredi (AKTS) | Öğretim Şekli | Yeterliliğin Düzeyi ve Öğrenme Alanı | |
| 2 | 120 | FULL TIME |
TYÇ, TR-NQF-HE, EQF-LLL, ISCED (2011):Level 5 QF-EHEA:Short Cycle TR-NQF-HE, ISCED (1997-2013): 48,52 |
||
| Course Code: | 2022221008 | ||||||||||
| Ders İsmi: | Computer Networks and Security | ||||||||||
| Ders Yarıyılı: | Spring | ||||||||||
| Ders Kredileri: |
|
||||||||||
| Language of instruction: | TR | ||||||||||
| Ders Koşulu: | |||||||||||
| Ders İş Deneyimini Gerektiriyor mu?: | No | ||||||||||
| Other Recommended Topics for the Course: | |||||||||||
| Type of course: | Necessary | ||||||||||
| Course Level: |
|
||||||||||
| Mode of Delivery: | Face to face | ||||||||||
| Course Coordinator : | Öğr.Gör. Yasemin GÜNTER | ||||||||||
| Course Lecturer(s): | |||||||||||
| Course Assistants: |
| Course Objectives: | Providing students with communication networks and security concepts to design and build reliable and efficient communication networks that are resistant to external attacks |
| Course Content: | Introduction to cable types and connectors used in computer networks, introduction to computer networks, 7-layer network architecture and components, repeaters, hubs and switches, bridges and routers. Local Area Fundamentals: IP addressing and IP classes, TCP/IP concept and configuration, basic troubleshooting techniques. Advanced levels on the Internet: Datagram Protocol and Transfer Protocol. TCP/IP services: Mail, Telnet, FTP, DNS. Computer and information security concepts and models, cryptographic techniques and algorithms, public cryptography, authentication, electronic signature, database security, secure payment systems. |
The students who have succeeded in this course;
|
||||||||||||||||||||||||||||||||||||
| Week | Subject | Related Preparation |
| 1) | Fundamentals of Networks, Architecture and Basic Concepts. Network Types | Lecture notes |
| 2) | Network Topologies and Network Standards | Lecture Notes |
| 3) | OSI Model | Lecture Notes |
| 4) | Network Protocols | Lecture Notes |
| 5) | Computer Network Passive Components | Lecture Notes |
| 6) | UTP Cable Making | Lecture Notes |
| 7) | Computer Network Active Components | Lecture Notes |
| 8) | Midterm Exam-1 | |
| 9) | LAN Communication Technologies | Lecture Notes |
| 10) | Wireless Communication Technologies | Lecture Notes |
| 11) | Ensuring Communication on the Network, Subnets and 5-4-3 Rule, TCP IP Model, IP Protocol | Lecture Notes |
| 12) | Midterm Exam-2 | |
| 13) | Network Operating Systems | Lecture Notes |
| 14) | Network Setup and Management | Lecture Notes |
| 15) | Services and Services Provided on the Network | Lecture Notes |
| 16) | Fınal Exam |
| Course Notes / Textbooks: | Kampus ağına konacak ders notları ve Internet üzerinde üretici firmalar tarafından sağlanan herkese açık eğitim materyali |
| References: | 1.Data Communications & Computer Networks C,M, White Thomson 2.Bilgisayar Ağları Ders Notları, https://www.muratkara.com/network/Network_DersNotu.pdf 3. Veri ve Ağ Güvenliği Ders Notları, https://avys.omu.edu.tr › sogukpinar-agguvenligi |
| Ders Öğrenme Kazanımları | 1 |
2 |
3 |
4 |
5 |
||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Program Outcomes | |||||||||||||
| 1) Possesses fundamental, up-to-date, and practical knowledge related to their profession. | |||||||||||||
| 2) They are knowledgeable about occupational health and safety, environmental awareness, and quality processes. | |||||||||||||
| 3) Keeps up with current developments and applications in their profession and uses them effectively. | |||||||||||||
| 4) Effectively uses information technologies (software, programs, animation, etc.) related to their profession. | |||||||||||||
| 5) Possesses the ability to independently evaluate professional problems and issues using an analytical and critical approach and to propose solutions. | |||||||||||||
| 6) Can effectively present their thoughts in writing and verbally at the level of knowledge and skills, and express them clearly. | |||||||||||||
| 7) Takes responsibility as a team member to resolve complex and unforeseen issues encountered in applications related to the field. | |||||||||||||
| 8) Has awareness of career management and lifelong learning. | |||||||||||||
| 9) The collection, application, and dissemination of data related to the field are guided by social, scientific, cultural, and ethical values. | |||||||||||||
| 10) Uses a foreign language to keep up with developments in their field and communicate with colleagues. | |||||||||||||
| 11) Explains and implements data security and encryption methods. | |||||||||||||
| 12) The network explains and implements Internet security and protection techniques against cyber threats. | |||||||||||||
| 13) Identifies security vulnerabilities in computer and software systems and addresses them. | |||||||||||||
| 14) It performs mathematical calculations. | |||||||||||||
| No Effect | 1 Lowest | 2 Low | 3 Average | 4 High | 5 Highest |
| Program Outcomes | Level of Contribution | |
| 1) | Possesses fundamental, up-to-date, and practical knowledge related to their profession. | |
| 2) | They are knowledgeable about occupational health and safety, environmental awareness, and quality processes. | |
| 3) | Keeps up with current developments and applications in their profession and uses them effectively. | |
| 4) | Effectively uses information technologies (software, programs, animation, etc.) related to their profession. | |
| 5) | Possesses the ability to independently evaluate professional problems and issues using an analytical and critical approach and to propose solutions. | |
| 6) | Can effectively present their thoughts in writing and verbally at the level of knowledge and skills, and express them clearly. | |
| 7) | Takes responsibility as a team member to resolve complex and unforeseen issues encountered in applications related to the field. | |
| 8) | Has awareness of career management and lifelong learning. | |
| 9) | The collection, application, and dissemination of data related to the field are guided by social, scientific, cultural, and ethical values. | |
| 10) | Uses a foreign language to keep up with developments in their field and communicate with colleagues. | |
| 11) | Explains and implements data security and encryption methods. | |
| 12) | The network explains and implements Internet security and protection techniques against cyber threats. | |
| 13) | Identifies security vulnerabilities in computer and software systems and addresses them. | |
| 14) | It performs mathematical calculations. |
| Bireysel çalışma ve ödevi | |
| Course |
| Yazılı Sınav (Açık uçlu sorular, çoktan seçmeli, doğru yanlış, eşleştirme, boşluk doldurma, sıralama) | |
| Uygulama |
| Semester Requirements | Number of Activities | Level of Contribution |
| Midterms | 1 | % 40 |
| Semester Final Exam | 1 | % 60 |
| total | % 100 | |
| PERCENTAGE OF SEMESTER WORK | % 40 | |
| PERCENTAGE OF FINAL WORK | % 60 | |
| total | % 100 | |
| Activities | Number of Activities | Duration (Hours) | Workload |
| Course Hours | 14 | 2 | 28 |
| Study Hours Out of Class | 14 | 4 | 56 |
| Midterms | 1 | 20 | 20 |
| Final | 1 | 20 | 20 |
| Total Workload | 124 | ||