Course Information

Course Information
Course Title Code Semester L+U Hour Credits ECTS
Artificial Intelligence in Cyber Security SG525 3 + 0 3.0 8.0
Prerequisites None
Language of Instruction Turkish
Course Level Graduate
Course Type
Mode of delivery The course is given over the weekly presentation files. In addition, it is carried out in the form of presentations by students on certain topics. After the theory is given with the presentation, applications are also made after the midterm exam.
Course Coordinator
Instructors
Assistants
Goals Students are given competencies within the scope of cyber security, which is expected to have at the international level today. In addition, it is to prepare students for topics such as cyber security standards and compliance, network security, security of mobile devices, and cyber security risk management.
Course Content Cyber Security Standards and Compliance, Applied Network Security, Application Security Principles / Practices, Cyber Operational Planning, Software Security, Cyber Security Risk Management and Compliance, Mobile Device Management, Secure Unix Management, End User Device Security and IoT, Security of Machine Learning Models, Artificial Intelligence Applications in Cyber Security.
Learning Outcomes - Learns the use of artificial intelligence in cyber security.
- Can apply artificial intelligence in the field of cybersecurity.
Weekly Topics (Content)
Week Topics Learning Methods
1. Week Cyber Security Standards and Compliance
2. Week Applied Network Security
3. Week Applied Network Security
4. Week Application Security Policies / Practices
5. Week Application Security Policies / Practices
6. Week Cyber Operational Planning
7. Week Software Security
8. Week Cyber Security Risk Management and Compliance
9. Week Mobile Device Management
10. Week Secure Unix Management
11. Week Secure Unix Management
12. Week End User Device Security
13. Week Security of IoT, Machine Learning Models
14. Week Implementing Artificial Intelligence in the Field of Cyber Security
Recommended Sources
Internet of Things and Cyber Physical Systems_ Security and Forensics
Cyber Deception_ Techniques, Strategies, and Human Aspects
Cyber Security Applications for Industry 4.0
Relations with Education Attainment Program Course Competencies
Program Requirements Contribution Level DK1 DK2 Measurement Method
*DK = Course's Contrubution.
0 1 2 3 4 5
Course's Level of contribution None Very Low Low Fair High Very High
Method of assessment/evaluation Written exam Oral Exams Assignment/Project Laboratory work Presentation/Seminar
ECTS credits and course workload
Event Quantity Duration (Hour) Total Workload (Hour)
Midterm 1 1 10 10
Homework 1 2 20 40
Final 1 20 20
Practice 1 10 10
Classroom Activities 10 2 20
Total Workload 100
ECTS Credit of the Course 8.0