Rapor Tarihi: 13.04.2026 02:38
| Course Title | Code | Language | Type | Semester | L+U Hour | Credits | ECTS |
|---|---|---|---|---|---|---|---|
| System Security | YBS312 | Turkish | Compulsory | 6. Semester | 3 + 3 | 0.0 | 6.0 |
| Prerequisite Courses | |
| Course Level | Undergraduate |
| Mode of delivery | The course is conducted through theoretical instruction and in-class practical activities. |
| Course Coordinator | Dr. Öğr. Üyesi Günay TEMÜR |
| Instructor(s) | Dr. Öğr. Üyesi Günay TEMÜR (Bahar) |
| Goals | The aim of this course is to teach methods for protecting computer systems against threats and to develop the ability to analyze security vulnerabilities. |
| Course Content | The course covers system security concepts, types of cyber attacks, malware, network security, authentication methods, and security measures. |
| # | Öğrenme Kazanımı |
| 0 | Evaluates cyber incidents through log analysis and incident response processes and develops mitigation strategies. |
| 1 | Explains and interprets the fundamental concepts of information security (confidentiality, integrity, availability) as well as threat and risk types. |
| 2 | Analyzes cryptographic methods, authentication, and access control mechanisms and compares appropriate security solutions. |
| 3 | Identifies security vulnerabilities in network, system, and web applications and applies fundamental defense techniques. |
| 4 | Explains penetration testing and security auditing approaches and plans the reporting process. |
| 5 | Evaluates emerging security approaches (Zero Trust, AI-driven security, data protection regulations) and designs an institutional security strategy. |
| Week | Topics/Applications | Method |
|---|---|---|
| 1. Week | Fundamentals of Information Security & CIA Model | Presentation (Preparation), Lecture, Question and Answer, Discussion |
| 2. Week | Threats, Risk Analysis & Security Policies | Presentation (Preparation), Lecture, Question and Answer, Discussion, Case Study |
| 3. Week | Fundamentals of Cryptography | Presentation (Preparation), Lecture, Question and Answer, Discussion, Problem Solving, Demonstration |
| 4. Week | Authentication & Access Control Models | Presentation (Preparation), Lecture, Question and Answer, Discussion |
| 5. Week | Network Security I – Firewall, VPN & Network Segmentation | Presentation (Preparation), Lecture, Question and Answer, Discussion |
| 6. Week | Network Security II – IDS/IPS & Traffic Analysis | Lecture, Question and Answer, Discussion |
| 7. Week | Web & Software Security (OWASP, SQLi, XSS, CSRF) | Presentation (Preparation), Lecture, Question and Answer, Discussion |
| 8. Week | Web & Software Security (XSS, CSRF) | Practice |
| 9. Week | System Security (Linux Permissions, Logging, Patching) | Presentation (Preparation), Lecture, Question and Answer, Discussion |
| 10. Week | Cyber Attacks & Malware | Presentation (Preparation), Lecture, Question and Answer, Discussion |
| 11. Week | Log Analysis & Incident Response | Presentation (Preparation), Lecture, Question and Answer, Discussion |
| 12. Week | Penetration Testing & Security Auditing | Presentation (Preparation), Lecture, Question and Answer, Discussion |
| 13. Week | Legal Aspects & Data Protection (KVKK, GDPR) | Presentation (Preparation), Lecture, Question and Answer, Discussion |
| 14. Week | Emerging Trends (Zero Trust, AI Security, Quantum Security) | Presentation (Preparation), Lecture, Question and Answer, Discussion |
| No | Program Requirements | Level of Contribution | |||||
|---|---|---|---|---|---|---|---|
| 1 | 2 | 3 | 4 | 5 | |||
| 1 | Graduates will have a holistic perspective on business functions | ✔ | |||||
| 2 | Graduates will have conceptual knowledge in the field of informatics in the sector average. | ✔ | |||||
| 3 | Graduates may integrate the business functions and IT infrastructure | ✔ | |||||
| 4 | Graduates will have awareness and knowledge about the processes of analyzing, designing, developing, and using information systems. | ✔ | |||||
| 5 | Students will have the ability to define the problem, collect data, analyze, interpret, evaluate, and develop a solution proposal for the solution of problems encountered in business. | ✔ | |||||
| 6 | Graduates may develop new strategic approaches for the efficiency of applications used in businesses. | ✔ | |||||
| 7 | Graduates may understand the logic of the algorithm and convert the designed algorithm into an up-to-date programming language. | ✔ | |||||
| 8 | Gradutes may have basic knowledge and understanding in the field of data science. | ✔ | |||||
| 9 | Graduates may have basic knowledge and understanding in the field of data science. | ✔ | |||||
| 10 | Graduates may base their vision on continuous learning and renewal. | ✔ | |||||
| 11 | Graduates may have an awareness of ethical and professional responsibility in business life. | ✔ | |||||
| 12 | Graduates may have an awareness of the individual and social effects of informatics applications and their legal consequences. gets the awareness of social responsibility. | ✔ | |||||
| 13 | Graduates may be able to use at least one foreign language in written and oral communication in the fields of information systems and business administration. | ✔ | |||||
| 14 | Graduates may take responsibility as an individual or team member in solving problems encountered in business life. | ✔ | |||||
| Program Requirements | DK1 | DK2 | DK3 | DK4 | DK5 | DK6 |
|---|---|---|---|---|---|---|
| PY1 | 2 | 2 | 2 | 3 | 3 | 4 |
| PY2 | 5 | 5 | 4 | 4 | 4 | 4 |
| PY3 | 3 | 3 | 3 | 3 | 3 | 4 |
| PY4 | 4 | 4 | 5 | 4 | 4 | 4 |
| PY5 | 3 | 4 | 4 | 5 | 4 | 4 |
| PY6 | 2 | 3 | 3 | 4 | 4 | 5 |
| PY7 | 2 | 3 | 3 | 3 | 3 | 2 |
| PY8 | 2 | 2 | 3 | 4 | 3 | 3 |
| PY9 | 2 | 3 | 3 | 4 | 4 | 4 |
| PY10 | 3 | 3 | 3 | 3 | 3 | 5 |
| PY11 | 3 | 3 | 3 | 4 | 4 | 5 |
| PY12 | 2 | 2 | 2 | 3 | 3 | 5 |
| PY13 | 2 | 2 | 2 | 3 | 4 | 3 |
| PY14 | 2 | 2 | 3 | 4 | 4 | 3 |
| Ders Kitabı veya Notu | Ders Kitabı veya Ders Notu bulunmamaktadır. |
|---|---|
| Diğer Kaynaklar |
|
| Bahar Dönemi | |||
| Responsible Personnel | Grup | Evaluation Method | Percentage |
|---|---|---|---|
| Dr. Öğr. Üyesi Günay TEMÜR | N.Ö | Vize | 35.00 |
| Dr. Öğr. Üyesi Günay TEMÜR | N.Ö | Proje | 15.00 |
| Dr. Öğr. Üyesi Günay TEMÜR | N.Ö | Final | 50.00 |
| Toplam | 100.00 | ||
| ECTS credits and course workload | Quantity | Duration (Hour) | Total Workload (Hour) | |
|---|---|---|---|---|
|
Ders İçi |
Class Hours | 14 | 3 | 42 |
|
Ders Dışı |
Preparation, After Class Study | 14 | 2 | 28 |
| Research | 14 | 2 | 28 | |
| Presentation (Preparation) | 14 | 3 | 42 | |
| Practice | 2 | 1 | 2 | |
|
Sınavlar |
Midterm | 1 | 3 | 3 |
| Homework | 1 | 3 | 3 | |
| Final | 1 | 3 | 3 | |
| Classroom Activities | 2 | 1 | 2 | |
| Total Workload | 153 | |||
| *AKTS = (Total Workload) / 25,5 | ECTS Credit of the Course | 6.0 | ||