BİLİŞİM GÜVENLİĞİ TEKNOLOJİSİ
Associate TR-NQF-HE: Level 5 QF-EHEA: Short Cycle EQF-LLL: Level 5

Ders Genel Tanıtım Bilgileri

Course Code: 2022221012
Ders İsmi: Secure Web Application Development
Ders Yarıyılı: Spring
Ders Kredileri:
Theoretical Practical Credit ECTS
3 0 3 4
Language of instruction: TR
Ders Koşulu:
Ders İş Deneyimini Gerektiriyor mu?: No
Type of course: Necessary
Course Level:
Associate TR-NQF-HE:5. Master`s Degree QF-EHEA:Short Cycle EQF-LLL:5. Master`s Degree
Mode of Delivery: Face to face
Course Coordinator : Öğr.Gör. Yunus KURAL
Course Lecturer(s): Öğr.Gör. Yunus KURAL
Course Assistants:

Dersin Amaç ve İçeriği

Course Objectives: This course provides a basic understanding of full spectrum cyber operations, the complexities of the cyberspace environment, as well as the planning, organization and integration of cyberspace operations. The course will consist of presentations and exercises that teach students how to develop and manage a cyber operations design. At the end of the course, students will have a basic understanding of how to analyze, plan and implement cyber operations.
Course Content: This course will provide a basic introduction to all aspects of cybersecurity, including business, policies and procedures, communications security, network security, security management, legal issues, political issues, and technical issues. This means having the cybersecurity foundation in the Cyber Security section.

Learning Outcomes

The students who have succeeded in this course;
Learning Outcomes
1 - Knowledge
Theoretical - Conceptual
1) Understand the broad technical, social and political aspects of Cyber Security.
2 - Skills
Cognitive - Practical
1) Reporting vulnerabilities and threats posed by criminals, terrorists and nation states to the national infrastructure.
3 - Competences
Communication and Social Competence
Learning Competence
Field Specific Competence
1) Understand the nature of secure software development, operating systems, and database design
2) To ensure that the role of security management in cyber security defense is known.
3) Understanding security management methods to maintain security protection.
Competence to Work Independently and Take Responsibility

Ders Akış Planı

Week Subject Related Preparation
1) Cyber Security Overview A Graduate Course in Applied Cryptography (V 0.4) by D. Boneh and V. Shoup.
2) Access control A Graduate Course in Applied Cryptography (V 0.4) by D. Boneh and V. Shoup.
3) Telecommunications and Network Security A Graduate Course in Applied Cryptography (V 0.4) by D. Boneh and V. Shoup.
4) Telecommunications and Network Security A Graduate Course in Applied Cryptography (V 0.4) by D. Boneh and V. Shoup.
5) Software Development Security A Graduate Course in Applied Cryptography (V 0.4) by D. Boneh and V. Shoup.
6) Cryptography A Graduate Course in Applied Cryptography (V 0.4) by D. Boneh and V. Shoup.
7) Operational Security A Graduate Course in Applied Cryptography (V 0.4) by D. Boneh and V. Shoup.
8) Midterm A Graduate Course in Applied Cryptography (V 0.4) by D. Boneh and V. Shoup.
9) Security Architecture and Design A Graduate Course in Applied Cryptography (V 0.4) by D. Boneh and V. Shoup.
10) Business Continuity and Disaster Recovery Planning A Graduate Course in Applied Cryptography (V 0.4) by D. Boneh and V. Shoup.
11) Legal, Regulations, Investigations and Forensics A Graduate Course in Applied Cryptography (V 0.4) by D. Boneh and V. Shoup.
12) Physical (Environmental) Security A Graduate Course in Applied Cryptography (V 0.4) by D. Boneh and V. Shoup.
13) Emerging Technologies A Graduate Course in Applied Cryptography (V 0.4) by D. Boneh and V. Shoup.
14) Compromise of Security Programs A Graduate Course in Applied Cryptography (V 0.4) by D. Boneh and V. Shoup.

Sources

Course Notes / Textbooks: Introduction to Modern Cryptography (2nd edition) by J. Katz and Y. Lindell.
References: A Graduate Course in Applied Cryptography (V 0.4) by D. Boneh and V. Shoup.

Ders - Program Öğrenme Kazanım İlişkisi

Ders Öğrenme Kazanımları

1

2

3

4

5

Program Outcomes
1) Having knowledge and skills in security algorithms for programming
2) Ability to install and manage software required for end user security
3) Having the ability to install and manage computer networks and use the network operating system
4) Have basic database and web programming skills

Ders - Öğrenme Kazanımı İlişkisi

No Effect 1 Lowest 2 Low 3 Average 4 High 5 Highest
           
Program Outcomes Level of Contribution
1) Having knowledge and skills in security algorithms for programming 3
2) Ability to install and manage software required for end user security 4
3) Having the ability to install and manage computer networks and use the network operating system 5
4) Have basic database and web programming skills 3

Öğrenme Etkinliği ve Öğretme Yöntemleri

Bireysel çalışma ve ödevi
Course

Ölçme ve Değerlendirme Yöntemleri ve Kriterleri

Yazılı Sınav (Açık uçlu sorular, çoktan seçmeli, doğru yanlış, eşleştirme, boşluk doldurma, sıralama)
Uygulama

Assessment & Grading

Semester Requirements Number of Activities Level of Contribution
Midterms 1 % 40
Semester Final Exam 1 % 60
total % 100
PERCENTAGE OF SEMESTER WORK % 40
PERCENTAGE OF FINAL WORK % 60
total % 100

İş Yükü ve AKTS Kredisi Hesaplaması

Activities Number of Activities Duration (Hours) Workload
Course Hours 14 2 28
Study Hours Out of Class 14 4 56
Midterms 1 20 20
Final 1 20 20
Total Workload 124