Course Information

Course Information
Course Title Code Language Type Semester L+U Hour Credits ECTS
Artificial Intelligence in Cyber Security SG525 Turkish Compulsory 3 + 0 3.0 8.0
Prerequisite Courses
Course Level Graduate
Mode of delivery The course is given over the weekly presentation files. In addition, it is carried out in the form of presentations by students on certain topics. After the theory is given with the presentation, applications are also made after the midterm exam.
Course Coordinator Dr. Öğr. Üyesi Ahmet ALBAYRAK
Instructor(s) Dr. Öğr. Üyesi Ahmet ALBAYRAK (Güz)
Goals Students are given competencies within the scope of cyber security, which is expected to have at the international level today. In addition, it is to prepare students for topics such as cyber security standards and compliance, network security, security of mobile devices, and cyber security risk management.
Course Content Cyber Security Standards and Compliance, Applied Network Security, Application Security Principles / Practices, Cyber Operational Planning, Software Security, Cyber Security Risk Management and Compliance, Mobile Device Management, Secure Unix Management, End User Device Security and IoT, Security of Machine Learning Models, Artificial Intelligence Applications in Cyber Security.
Learning Outcomes
# Öğrenme Kazanımı
1 Learns the use of artificial intelligence in cyber security.
1 Learns the use of artificial intelligence in cyber security.
2 Can apply artificial intelligence in the field of cybersecurity.
2 Can apply artificial intelligence in the field of cybersecurity.
Lesson Plan (Weekly Topics)
Week Topics/Applications Method
1. Week Cyber Security Standards and Compliance Research, Interview, Presentation (Preparation)
1. Week Cyber Security Standards and Compliance Research, Interview, Presentation (Preparation)
2. Week Applied Network Security Research, Interview, Presentation (Preparation)
2. Week Applied Network Security Research, Interview, Presentation (Preparation)
3. Week Applied Network Security Research, Interview, Presentation (Preparation)
3. Week Applied Network Security Research, Interview, Presentation (Preparation)
4. Week Application Security Policies / Practices Research, Interview, Presentation (Preparation)
4. Week Application Security Policies / Practices Research, Interview, Presentation (Preparation)
5. Week Application Security Policies / Practices Research, Interview, Presentation (Preparation)
5. Week Application Security Policies / Practices Research, Interview, Presentation (Preparation)
6. Week Cyber Operational Planning Research, Interview, Presentation (Preparation)
6. Week Cyber Operational Planning Research, Interview, Presentation (Preparation)
7. Week Software Security Research, Interview, Presentation (Preparation)
7. Week Software Security Research, Interview, Presentation (Preparation)
8. Week Cyber Security Risk Management and Compliance Research, Interview, Presentation (Preparation)
8. Week Cyber Security Risk Management and Compliance Research, Interview, Presentation (Preparation)
9. Week Mobile Device Management Research, Interview, Presentation (Preparation)
9. Week Mobile Device Management Research, Interview, Presentation (Preparation)
10. Week Secure Unix Management Research, Interview, Presentation (Preparation)
10. Week Secure Unix Management Research, Interview, Presentation (Preparation)
11. Week Secure Unix Management Research, Interview, Presentation (Preparation)
11. Week Secure Unix Management Research, Interview, Presentation (Preparation)
12. Week End User Device Security Research, Interview, Presentation (Preparation)
12. Week End User Device Security Research, Interview, Presentation (Preparation)
13. Week Security of IoT, Machine Learning Models Research, Interview, Presentation (Preparation)
13. Week Security of IoT, Machine Learning Models Research, Interview, Presentation (Preparation)
14. Week Implementing Artificial Intelligence in the Field of Cyber Security Research, Interview, Presentation (Preparation), Practice
14. Week Implementing Artificial Intelligence in the Field of Cyber Security Research, Interview, Presentation (Preparation), Practice
*Midterm and final exam dates are not specified in the 14-week course operation plan. Midterm and final exam dates are held on the dates specified in the academic calendar with the decision of the University Senate.
The Matrix for Course & Program Learning Outcomes
No Program Requirements Level of Contribution
1 2 3 4 5
1 About the main areas of Information and Cyber Security . has detailed information.
7 It is aware of the social, legal, ethical and cultural aspects of information security practices and conducts all professional activities ethically and responsibly.
Relations with Education Attainment Program Course Competencies
Program Requirements DK1 DK2
PY1 1 1
PY7 2 2
Recommended Sources
Ders Kitabı veya Notu Ders Kitabı veya Ders Notu bulunmamaktadır.
Diğer Kaynaklar
  • Internet of Things and Cyber Physical Systems_ Security and Forensics
  • Cyber Deception_ Techniques, Strategies, and Human Aspects
  • Cyber Security Applications for Industry 4.0
  • Internet of Things and Cyber Physical Systems_ Security and Forensics
  • Cyber Deception_ Techniques, Strategies, and Human Aspects
  • Cyber Security Applications for Industry 4.0
ECTS credits and course workload
ECTS credits and course workload Quantity Duration (Hour) Total Workload (Hour)
Sınavlar
Midterm 1 10 10
Homework 2 20 40
Final 1 20 20
Practice 1 10 10
Classroom Activities 10 2 20
Total Workload 100
*AKTS = (Total Workload) / 25,5 ECTS Credit of the Course 8.0