>
Course Unit Title | Course Unit Code | Type of Course Unit | Level of Course Unit | Year of Study | Semester | ECTS Credits |
---|---|---|---|---|---|---|
Cyber Security Threats and Countermeasures | YZM515 | Elective | Master's degree | 1 | Spring | 8 |
Associate Prof. Dr. Mehmet Zeki KONYAR
1) Express the concepts in the field of cyber security.
2) Discusses security technologies used in cyberspace.
3) Explains the relation of IT law, international standards and countermeasures with cyber security.
4) Recalls basic information about computer crime and network security.
5) Knows the precautions to be taken against cyber attacks.
Program Competencies | ||||||||||||||||||
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | ||
Learning Outcomes | ||||||||||||||||||
1 | No relation | High | High | High | High | High | High | High | High | High | High | High | High | High | High | High | High | |
2 | High | High | High | High | High | High | High | High | High | High | High | High | High | High | High | High | High | |
3 | High | High | High | High | High | High | High | High | High | High | High | High | High | High | High | High | High | |
4 | High | High | High | High | High | High | High | High | High | High | High | High | High | High | High | High | High | |
5 | High | High | High | High | High | High | High | High | High | High | High | High | High | High | High | High | High |
Face to Face
None
Not Required
Cyber security evolution process, Security engineering, Security techniques, Intrusion detection systems, Cyber warfare operational requirements, Cyber warfare examples, Cyber warfare examples, Firewalls, Integration of cyber warfare assets, Spyware, Anti-spyware methods
1) Lecture
2) Question-Answer
3) Project Based Learning
Contribution of Midterm Examination to Course Grade |
40% |
---|---|
Contribution of Final Examination to Course Grade |
60% |
Total |
100% |
Turkish
Not Required