>
Course Unit Title | Course Unit Code | Type of Course Unit | Level of Course Unit | Year of Study | Semester | ECTS Credits |
---|---|---|---|---|---|---|
Information Security | YZM306 | Compulsory | Bachelor's degree | 3 | Spring | 3 |
Associate Prof. Dr. Mehmet Zeki KONYAR
Assistant Prof. Dr. Kaplan KAPLAN
1) Knows and applies the concepts of cryptography.
2) Knows and applies digital signing techniques.
3) Analyzes data security needs and provides solutions.
4) Knows cryptoanalysis techniques and can take necessary precautions against cryptoanalysis techniques.
5) Knows how to provide convenient security
Program Competencies | |||||||||||||
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | ||
Learning Outcomes | |||||||||||||
1 | Middle | No relation | Low | No relation | No relation | No relation | High | Low | Low | No relation | No relation | No relation | |
2 | Middle | No relation | No relation | Middle | No relation | Low | High | Low | Low | No relation | No relation | No relation | |
3 | No relation | No relation | Low | Low | No relation | No relation | High | Low | Low | No relation | No relation | No relation | |
4 | Middle | No relation | Low | No relation | No relation | No relation | High | Low | Low | No relation | No relation | No relation | |
5 | Middle | No relation | No relation | No relation | No relation | Low | High | No relation | Low | No relation | No relation | No relation |
Face to Face
None
Not Required
Information security, Cryptography protocols, digital signatures, identification protocols, authentication, authorization, useful security, attack methods
Contribution of Midterm Examination to Course Grade |
40% |
---|---|
Contribution of Final Examination to Course Grade |
60% |
Total |
100% |
Turkish
Not Required