>
Course Unit Title Course Unit Code Type of Course Unit Level of Course Unit Year of Study Semester ECTS Credits
Data Hiding YZM434 Elective Bachelor's degree 4 Spring 5

Name of Lecturer(s)

Associate Prof. Dr. Mehmet Zeki KONYAR

Learning Outcomes of the Course Unit

1) Learns the goals, principles and main criteria of information security.
2) Learn and apply the basic concepts of cryptography and encryption systems.
3) Knows the types of cryptanalysis.
4) Knows symmetric, asymmetric encryption systems, hash algorithms.
5) Gains knowledge of public key infrastructure, discrete logarithms, digital signatures.
6) Gains knowledge of access control systems, communication, network and internet security.
7) Learns security management, application development security and business continuity planning.

Program Competencies-Learning Outcomes Relation

  Program Competencies
1 2 3 4 5 6 7 8 9 10 11 12
Learning Outcomes
1 High No relation Low Low No relation No relation High Middle No relation No relation Middle No relation
2 High No relation Low Low No relation No relation High Low No relation No relation Low No relation
3 High No relation Low Low No relation No relation High Low No relation No relation Low No relation
4 Middle No relation Low Low No relation No relation High Low No relation No relation Low No relation
5 Middle No relation Low Low No relation No relation High Low No relation No relation Low No relation
6 Middle No relation Low Low No relation No relation High Low No relation No relation Low No relation
7 Middle Middle Middle Middle No relation No relation High Low Low No relation Middle No relation

Mode of Delivery

Face to Face

Prerequisites and Co-Requisites

None

Recommended Optional Programme Components

Not Required

Course Contents

Introduction of information, security and computer security issues, Information Security, Information security problems, Security methods, Data hiding methods: Encryption methods, Fundamentals and types of encryption methods, Symmetric and asymmetric encryption methods, Linearity, Identity hooking, e-signature, Public keying infrastructure, Attack methods and countermeasures, Security classifications and standards.

Recommended or Required Reading

Planned Learning Activities and Teaching Methods



Assessment Methods and Criteria

Language of Instruction

Turkish

Work Placement(s)

Not Required