| Language of Instruction |
Türkçe |
| Course Type |
Required Courses |
| Course Instructor(s) |
ÖĞR. GÖR. ÇİĞDEM ÖZBEK |
| Mode of Delivery |
Face to face |
| Prerequisites |
There are no prerequisites or co-requisites for this course. |
| Courses Recomended |
None |
| Recommended Reading List |
Turkish Sources* KVKK Mevzuatı ve Uyum RehberleriWeb Sitesi / Website: www.kvkk.gov.tr* BTK Akademi – Siber Güvenlik EğitimleriWeb Sitesi / Website: www.btkakademi.gov.tr* Bilgi Güvenliği Derneği YayınlarıWeb Sitesi / Website: www.bilgiguvenligi.org.tr* TÜBİTAK BİLGEM – Siber Güvenlik RaporlarıWeb Sitesi / Website: www.bilgem.tubitak.gov.trInternational Sources*ENISA Reports (European Union Agency for Cybersecurity)Web Sitesi / Website: www.enisa.europa.eu* Harvard Kennedy School – Cybersecurity Reading ListWeb Sitesi / Website: cyber.harvard.edu* CS50’s Computer Science and Cybersecurity Lecture Series – Harvard UniversityWeb Sitesi / Website: cs50.harvard.edu* NIST Cybersecurity Framework (National Institute of Standards and Technology)Web Sitesi / Website: www.nist.gov/cyberframework* SANS Institute Reading RoomWeb Sitesi / Website: www.sans.org/reading-room* OWASP Top Ten Project (Open Web Application Security Project)Web Sitesi / Website: www.owasp.org* Kaspersky – Cybersecurity ReportsWeb Sitesi / Website: www.kaspersky.com* Verizon – Data Breach Investigations Report (DBIR)Web Sitesi / Website: enterprise.verizon.com/resources/reports/dbir* Gartner – Research on Cybersecurity TrendsWeb Sitesi / Website: www.gartner.com/en/information-technology* McAfee – Cybersecurity Reports and Threat IntelligenceWeb Sitesi / Website: www.mcafee.com/enterprise/en-us/security-awareness/cybersecurity-reports.html. |
| Assessment methods and criteria |
1 Midterm Exam, 1 Final Exam, 1 Project and Presentation |
| Work Placement |
Although the course does not require a formal internship, practical understanding of digital security will be enhanced through interactive activities such as group work, real-life case analyses, and project-based presentations conducted in the classroom. |
| Catalog Content |
This course covers fundamental concepts of digital security, types of cyber threats, personal data protection regulations ( Law on the Protection of Personal Data, General Data Protection Regulation), network security, social engineering, cloud security, disaster recovery, and business continuity. It aims to equip students with knowledge and skills to recognize, assess, and prevent threats encountered in digital environments. |