INFORMATION SECURITY TECHNOLOGY
Associate TR-NQF-HE: Level 5 QF-EHEA: Short Cycle EQF-LLL: Level 5

General Information about the Course

Course Code: BGT205
Course Title: Cyber ​​Attack and Defense Methods I
Course Semester: 3. Semester / Fall
Course Credits:
Theoretical Practical Credit ECTS
2 2 3 5
Language of instruction: TR
Prerequisite of the course: No
Type of course: Necessary
Level of course:
Associate TR-NQF-HE:5. Master`s Degree QF-EHEA:Short Cycle EQF-LLL:5. Master`s Degree
Course Lecturer(s):

Purpose and content of the course

Course Objectives: The aim of the Cyber ​​Attack and Defense Methods I course is to train individuals who can create a secure IT infrastructure by learning cyber attack techniques and defense methods against these attacks.
Course Objective: The goal of the Cyber ​​Attack and Defense Methods I course is to enable students to recognize the types of cyber attacks and to gain the ability to develop effective defense strategies and solutions against these attacks.
Mode of Delivery: Face to face

Learning Outcomes

Knowledge (Described as Theoritical and/or Factual Knowledge.)
  1) Students learn about types of cyber attacks, attack vectors, and the nature of cyber threats.
Skills (Describe as Cognitive and/or Practical Skills.)
  1) Students gain the ability to use techniques to detect and prevent cyber attacks on network and system security.
Competences (Described as "Ability of the learner to apply knowledge and skills autonomously with responsibility", "Learning to learn"," Communication and social" and "Field specific" competences.)
  1) Students develop the ability to develop and implement effective defense strategies against cyber attacks and to address security vulnerabilities.

Course Topics

Week Subject
Related Preparation Pekiştirme
1) Introduction to Cybersecurity and Basic Concepts
2) Types of Cyber ​​Attacks and Attack Vectors
3) Malware: Viruses, Trojans, and Ransomware
4) Phishing and Social Engineering Attacks
5) Distributed Denial of Service (DDoS) Attacks and Defense Methods
6) Network-Based Attacks: Sniffing, Spoofing, and MITM Attacks
7) Firewalls and Network Access Control
8) Exploit Attacks and Vulnerability Analysis
9) Web Application Attacks: XSS, SQL Injection, and Others
10) Intrusion Detection and Prevention Systems (IDS/IPS)
11) Security Information and Event Management (SIEM) Systems
12) Network Security and Segmentation Strategies
13) Cyber ​​Defense: Basic Principles and Strategies
14) Current Developments in Cyber ​​Attacks and Defense
References: Çakır, H. (2019). Siber güvenlik ve savunma stratejileri. Seçkin Yayıncılık.
Ertaş, B. (2020). Siber saldırı ve savunma yöntemleri: Teori ve uygulamalar. Kodlab Yayıncılık.
Doğan, M. (2018). Siber güvenlik ve ağ savunması: Tehditler, saldırılar ve çözümler. Pusula Yayıncılık.
Şahin, İ. (2021). Siber güvenlik: Ağ güvenliği ve savunma yöntemleri. Nobel Yayınları.
Northcutt, S. (2006). The art of intrusion detection and prevention. Sams Publishing.

Ders - Program Öğrenme Kazanım İlişkisi

No Effect 1 Lowest 2 Average 3 Highest
       
Ders Öğrenme Kazanımları

1

2

3

Program Outcomes
1) To have in-depth knowledge of information security principles and methods.
2) To have a comprehensive knowledge of cyber security threats and attack types. 3 3 3
3) To have knowledge about cryptography techniques and applications.
4) To have knowledge about information security management systems and standards.
5) To have knowledge about secure software development processes and methods.
6) Ability to analyze and evaluate information security risks.
7) To have practical knowledge on computer networks and communication protocols.
8) Ability to identify and close security vulnerabilities. 3 3 3
9) Ability to work independently and take responsibility in information security projects.
10) Ability to demonstrate teamwork and leadership skills.
11) Ability to adapt to new technologies and security trends. 1 1 1
12) To be able to follow scientific and technological developments in the field. 2 2 2
13) Ability to express and present technical information in an understandable way.
14) Written and verbal communication skills.
15) Collaboration and teamwork skills.
16) To be aware of legal and ethical responsibilities related to information security. 2 2 2
17) Ability to respond to information security incidents and crisis management skills. 3 3 3

Course Teaching, Learning Methods

Q & A
Case Problem Solving/ Drama- Role/ Case Management
Laboratory
Quantitative Problem Solving
Fieldwork
Group Study / Assignment
Individual Assignment
WEB-based Learning
Internship
Practice in Field
Project Preparation
Report Writing
Seminar
Supervision
Social Activity
Occupational Activity
Occupational Trip
Application (Modelling, Design, Model, Simulation, Experiment et.)
Reading
Thesis Preparation
Field Study
Student Club and Council Activities
Other
Logbook
Interview and Oral Conversation
Research
Watching a movie
Bibliography preparation
Oral, inscribed and visual knowledge production
Taking photographs
Sketching
Mapping and marking
Reading maps
Copying textures
Creating a library of materials
Presentation

Evaluation System

Semester Requirements Number of Activities Level of Contribution
Attendance % 0
Laboratory % 0
Application % 0
Practice Exam % 0
Quizzes % 0
Homework Assignments % 0
Presentation % 0
Project % 0
Special Course Internship (Work Placement) % 0
Field Study % 0
Article Critical % 0
Article Writing % 0
Module Group Study % 0
Brainstorming % 0
Role Playing + Dramatizing % 0
Out of Class Study % 0
Preliminary Work, Reinforcement % 0
Application Repetition etc. % 0
Homework (reading, writing, watching movies, etc.) % 0
Project Preparation + Presentation % 0
Report Preparation + Presentation % 0
Presentation / Seminar Preparation + Presenting % 0
Oral examination % 0
Midterms 1 % 40
Final 1 % 60
Practical Final % 0
Report Submission % 0
Bütünleme % 0
Bütünleme Pratik % 0
Kanaat Notu % 0
Committee % 0
Yazma Ödev Dosyası % 0
Portfolio % 0
Take-Home Exam % 0
Logbook % 0
Participation % 0
Discussion % 0
total % 100
PERCENTAGE OF SEMESTER WORK % 40
PERCENTAGE OF FINAL WORK % 60
total % 100

Calculation of Workload and ECTS Credits

Activities Number of Activities Workload
Course Hours 14 56
Laboratory
Application
Practice Exam
Special Course Internship (Work Placement)
Field Work
Study Hours Out of Class
Article Critical
Article Writing
Module Group Study
Brainstorming
Role Playing + Dramatizing
Out-of-Class Study (Pre-study, Reinforcement, Practice Review, etc.) 14 42
Homework (reading, writing, watching movies, etc.)
Project Preparation + Presentation
Report Preparation + Presentation
Presentation / Seminar Preparation + Presenting
Oral examination
Preparing for Midterm Exams 7 21
MIDTERM EXAM (Visa) 1 1
Preparing for the General Exam 14 35
GENERAL EXAM (Final) 1 1
Participation
Discussion
Portfolio
Take-Home Exam
Logbook
Total Workload 156
ECTS (30 saat = 1 AKTS ) 5