Eskisehir Technical University Info Package Eskisehir Technical University Info Package
  • Info on the Institution
  • Info on Degree Programmes
  • Info for Students
  • Türkçe
About the Program Educational Objectives Key Learning Outcomes Course Structure Diagram with Credits Field Qualifications Matrix of Course& Program Qualifications Matrix of Program Outcomes&Field Qualifications
  • Faculty Of Computer And Information Technologies
  • Information Security Technology (English)
  • Course Structure Diagram with Credits
  • Data Security
  • Description
  • Description
  • Learning Outcomes
  • Course's Contribution to Prog.
  • Learning Outcomes & Program Qualifications

Course Introduction Information

Code - Course Title BGT2502 - Data Security
Course Type Area Elective Courses
Language of Instruction İngilizce
Laboratory + Practice 3+0
ECTS 4.0
Course Instructor(s) DOKTOR ÖĞRETİM ÜYESİ BAHADIR CİNOĞLU
Mode of Delivery In-Person
Prerequisites There are no prerequisites and co-requisites for this course
Courses Recomended
Required or Recommended Resources Stamp, M. (2011). Information security: principles and practice. John Wiley & Sons.,Anderson, R. (2010). Security engineering: a guide to building dependable distributed systems. John Wiley & Sons.,
Recommended Reading List Dafydd, S., & Marcus, P. (2011). The web application hacker’s handbook: Finding and exploiting security flaws.Stallings, W. (2023). Cryptography and Network Security: Principles and Practice 8th Edition. Pearson
Assessment methods and criteria 2 midterm exam and 1 final exam
Work Placement There is no work placement needed for this course
Sustainability Development Goals

Content

Weeks Topics
Week - 1 Introduction to Data Security
Week - 2 Access Control Models
Week - 3 Firewalls, Intrusion Detection and Prevention Systems
Week - 4 Physical and Operational Security
Week - 5 EN: Data Leakage and Data Breach
Week - 6 Secure Coding Principles
Week - 7 Fundamentals of Cryptography
Week - 8 Cryptographic Protocols
Week - 9 Introduction to Linux
Week - 10 Security Vulnerabilities and Attack Vectors
Week - 11 Vulnerability Scanning Tools
Week - 12 Vulnerability Scanning Tools
Week - 13 Defensive Security Concept
Week - 14 Privacy and Regulatory Requirements

Learning Activities and Teaching Methods

  • Teaching Methods
  • Lecture
  • Discussion
  • Question & Answer
  • Demonstration
  • Drill - Practise
  • Case Study
  • Problem Solving
  • Brain Storming
  • Competences
  • Rational
  • Creative
  • Follow ethical and moral rules
  • Problem solving
  • Organization and planning
  • Decision making

Assessment Methods

Assessment Method and Passing Requirements
Quamtity Percentage (%)
Toplam (%) 0
  • Info on the Institution
  • Name and Adress
  • Academic Calendar
  • Academic Authorities
  • General Description
  • List of Programmes Offered
  • General Admission Requirements
  • Recognition of Prior Learning
  • Registration Procedures
  • ECTS Credit Allocation
  • Academic Guidance
  • Info on Degree Programmes
  • Doctorate Degree / Proficieny in Arts
  • Master's Degree
  • Bachelor's Degree
  • Associate Degree
  • Open&Distance Education
  • Info for Students
  • Cost of living
  • Accommodation
  • Meals
  • Medical Facilities
  • Facilities for Special Needs Students ı
  • Insurance
  • Financial Support for Students
  • Student Affairs Office
  • Info for Students
  • Learning Facilities
  • International Programmes r
  • Practical Information for Mobile Students
  • Language courses
  • Internships
  • Sports and Leisure Facilities
  • Student Associations