Week |
Subject |
Related Preparation |
1) |
Introduction to Server Operating Systems |
UNIX and Linux System Administration Handbook, Trent R. Hein, Evi Nemeth, Garth Snyder, Ben Whaley, Dan Mackin, Addison-Wesley, 2018. Windows Server Sistem Yönetimi, Mesut Aladağ, Ankara: Kodlab Yayınları. |
2) |
Types of Servers and Server Operating Systems |
UNIX and Linux System Administration Handbook, Trent R. Hein, Evi Nemeth, Garth Snyder, Ben Whaley, Dan Mackin, Addison-Wesley, 2018. Windows Server Sistem Yönetimi, Mesut Aladağ, Ankara: Kodlab Yayınları. |
3) |
Virtualization and Server Operating System Installation |
UNIX and Linux System Administration Handbook, Trent R. Hein, Evi Nemeth, Garth Snyder, Ben Whaley, Dan Mackin, Addison-Wesley, 2018. Windows Server Sistem Yönetimi, Mesut Aladağ, Ankara: Kodlab Yayınları. |
4) |
File System, Disk Clustering Systems |
UNIX and Linux System Administration Handbook, Trent R. Hein, Evi Nemeth, Garth Snyder, Ben Whaley, Dan Mackin, Addison-Wesley, 2018. Windows Server Sistem Yönetimi, Mesut Aladağ, Ankara: Kodlab Yayınları. |
5) |
Command Line and Basic Commands |
UNIX and Linux System Administration Handbook, Trent R. Hein, Evi Nemeth, Garth Snyder, Ben Whaley, Dan Mackin, Addison-Wesley, 2018. Windows Server Sistem Yönetimi, Mesut Aladağ, Ankara: Kodlab Yayınları. |
6) |
Managing User Accounts and Groups |
UNIX and Linux System Administration Handbook, Trent R. Hein, Evi Nemeth, Garth Snyder, Ben Whaley, Dan Mackin, Addison-Wesley, 2018. Windows Server Sistem Yönetimi, Mesut Aladağ, Ankara: Kodlab Yayınları. |
7) |
TCP/IP Networks |
UNIX and Linux System Administration Handbook, Trent R. Hein, Evi Nemeth, Garth Snyder, Ben Whaley, Dan Mackin, Addison-Wesley, 2018. Windows Server Sistem Yönetimi, Mesut Aladağ, Ankara: Kodlab Yayınları. |
8) |
Midterm Exam |
UNIX and Linux System Administration Handbook, Trent R. Hein, Evi Nemeth, Garth Snyder, Ben Whaley, Dan Mackin, Addison-Wesley, 2018. Windows Server Sistem Yönetimi, Mesut Aladağ, Ankara: Kodlab Yayınları. |
9) |
DHCP Server |
UNIX and Linux System Administration Handbook, Trent R. Hein, Evi Nemeth, Garth Snyder, Ben Whaley, Dan Mackin, Addison-Wesley, 2018. Windows Server Sistem Yönetimi, Mesut Aladağ, Ankara: Kodlab Yayınları.
|
10) |
DNS Server |
UNIX and Linux System Administration Handbook, Trent R. Hein, Evi Nemeth, Garth Snyder, Ben Whaley, Dan Mackin, Addison-Wesley, 2018. Windows Server Sistem Yönetimi, Mesut Aladağ, Ankara: Kodlab Yayınları.
|
11) |
Web Server |
UNIX and Linux System Administration Handbook, Trent R. Hein, Evi Nemeth, Garth Snyder, Ben Whaley, Dan Mackin, Addison-Wesley, 2018. Windows Server Sistem Yönetimi, Mesut Aladağ, Ankara: Kodlab Yayınları.
|
12) |
Database Server |
UNIX and Linux System Administration Handbook, Trent R. Hein, Evi Nemeth, Garth Snyder, Ben Whaley, Dan Mackin, Addison-Wesley, 2018. Windows Server Sistem Yönetimi, Mesut Aladağ, Ankara: Kodlab Yayınları.
|
13) |
Server Security and Logs |
UNIX and Linux System Administration Handbook, Trent R. Hein, Evi Nemeth, Garth Snyder, Ben Whaley, Dan Mackin, Addison-Wesley, 2018. Windows Server Sistem Yönetimi, Mesut Aladağ, Ankara: Kodlab Yayınları.
|
14) |
Systemd
|
UNIX and Linux System Administration Handbook, Trent R. Hein, Evi Nemeth, Garth Snyder, Ben Whaley, Dan Mackin, Addison-Wesley, 2018. Windows Server Sistem Yönetimi, Mesut Aladağ, Ankara: Kodlab Yayınları.
|
15) |
Final Exam |
UNIX and Linux System Administration Handbook, Trent R. Hein, Evi Nemeth, Garth Snyder, Ben Whaley, Dan Mackin, Addison-Wesley, 2018. Windows Server Sistem Yönetimi, Mesut Aladağ, Ankara: Kodlab Yayınları.
|
|
Program Outcomes |
Level of Contribution |
1) |
Having knowledge and skills in security algorithms for programming |
3 |
1) |
Possesses in-depth theoretical knowledge in information security, cybersecurity, network security, and data protection. |
4 |
2) |
Understands information security management systems, national and international security standards, ethical considerations, and legal regulations. |
|
2) |
Ability to install and manage software required for end user security |
3 |
3) |
Has analytical thinking skills in classifying cyber threats, attack vectors, and defense mechanisms. |
|
3) |
Having the ability to install and manage computer networks and use the network operating system |
4 |
4) |
Theoretically comprehends security technologies such as cryptography, digital signatures, authentication, and access control mechanisms. |
|
5) |
Can establish network security policies and effectively manage security tools such as firewalls and intrusion detection/prevention systems. |
|
6) |
Has expertise in applying cryptographic algorithms, using data encryption techniques, and analyzing cybersecurity intelligence. |
|
7) |
Can conduct penetration tests and security assessments to identify system vulnerabilities and develop preventive measures. |
|