BİLİŞİM GÜVENLİĞİ TEKNOLOJİSİ | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | 2022002001 | ||||||||
Ders İsmi: | End User Security | ||||||||
Ders Yarıyılı: |
Spring Fall |
||||||||
Ders Kredileri: |
|
||||||||
Language of instruction: | TR | ||||||||
Ders Koşulu: | |||||||||
Ders İş Deneyimini Gerektiriyor mu?: | No | ||||||||
Type of course: | Bölüm Seçmeli | ||||||||
Course Level: |
|
||||||||
Mode of Delivery: | Face to face | ||||||||
Course Coordinator : | Öğr.Gör. Esma TAYRAN | ||||||||
Course Lecturer(s): | |||||||||
Course Assistants: |
Course Objectives: | While interacting with technological tools, to prevent victimization by evaluating a possible security vulnerability due to viruses and similar harmful applications. |
Course Content: | Interacting tools, interacting environments, data communication paths, malicious software and its derivatives, anti-virus programs, ways of protection from malicious software constitute the basic content of the course. |
The students who have succeeded in this course;
|
Week | Subject | Related Preparation |
1) | Learns about cyber security and information security. | Threat Modeling: Designing for Security /Adam Shostack |
2) | Learns about personal security. | Threat Modeling: Designing for Security /Adam Shostack |
3) | Knows malicious software that can be compromised in terms of personal security. | Threat Modeling: Designing for Security /Adam Shostack |
4) | Learns about viruses, trojans, keyloggers, worms. | Threat Modeling: Designing for Security /Adam Shostack |
5) | Learns about Social Engineering. | Threat Modeling: Designing for Security /Adam Shostack |
6) | Gains information about information collection tools. | Threat Modeling: Designing for Security /Adam Shostack |
7) | Learns about backdoors. | Threat Modeling: Designing for Security /Adam Shostack |
8) | Midterm | Threat Modeling: Designing for Security /Adam Shostack |
9) | Obtains information on monitoring malicious software. | Threat Modeling: Designing for Security /Adam Shostack |
10) | Learns about electronic signature. | Threat Modeling: Designing for Security /Adam Shostack |
11) | Learn about the Personal Data Protection Law | Threat Modeling: Designing for Security /Adam Shostack |
12) | Learn about social network security | Threat Modeling: Designing for Security /Adam Shostack |
13) | Learns about security on mobile devices. | Threat Modeling: Designing for Security /Adam Shostack |
Course Notes / Textbooks: | Derste not tutulacaktır. |
References: | IBM Knowledge Center 2017, The Science of Human Hacking / Christopher Hadnagy, Threat Modeling: Designing for Security /Adam Shostack Hacking Interface, Hamza Elbahadır, Kodlab yayınları https://batman.edu.tr/images/files/%C4%B0dari%20Birimler/Bilgi_%C4%B0slem_DB/Son_Kullanici_Siber_Guvenlik_Rehberi.pdf |
Ders Öğrenme Kazanımları | 1 |
2 |
3 |
4 |
5 |
---|---|---|---|---|---|
Program Outcomes | |||||
1) Having knowledge and skills in security algorithms for programming | |||||
2) Ability to install and manage software required for end user security | |||||
3) Having the ability to install and manage computer networks and use the network operating system | |||||
4) Have basic database and web programming skills |
No Effect | 1 Lowest | 2 Low | 3 Average | 4 High | 5 Highest |
Program Outcomes | Level of Contribution | |
1) | Having knowledge and skills in security algorithms for programming | 3 |
2) | Ability to install and manage software required for end user security | 3 |
3) | Having the ability to install and manage computer networks and use the network operating system | 2 |
4) | Have basic database and web programming skills | 2 |
Anlatım | |
Bireysel çalışma ve ödevi | |
Course |
Yazılı Sınav (Açık uçlu sorular, çoktan seçmeli, doğru yanlış, eşleştirme, boşluk doldurma, sıralama) | |
Homework |
Semester Requirements | Number of Activities | Level of Contribution |
Midterms | 1 | % 40 |
Semester Final Exam | 1 | % 60 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 40 | |
PERCENTAGE OF FINAL WORK | % 60 | |
total | % 100 |
Activities | Number of Activities | Duration (Hours) | Workload |
Course Hours | 14 | 2 | 28 |
Study Hours Out of Class | 14 | 2 | 28 |
Midterms | 1 | 20 | 20 |
Final | 1 | 20 | 20 |
Total Workload | 96 |