Level and Duration of the Program: Undergraduate, 8 Semesters.
Cyber Security Engineering Department Mission
The Department of Cyber Security Engineering seeks to cultivate future leaders who are adept at safeguarding modern technology and information systems. Towards this end, the department imparts to its students a comprehensive education in the field of cyber security, with a focus on equipping them with the necessary knowledge and skills to effectively address security threats, assess risks, devise effective solutions, and protect information systems.
Cyber Security Engineering Department Vision
The Department of Cyber Security seeks to establish itself as a distinguished and pioneering training facility in the realm of cyber security. Its guiding vision is to set global benchmarks for cyber security by nurturing individuals capable of effectively responding to the dynamic threat landscape, upholding ethical principles, and prioritizing security in the realm of information technology.
Program Purpose: The Cyber Security Engineering Program seeks to impart a comprehensive education in the domain of cyber security to its students. The program aims to equip students with the requisite knowledge, skills, and ethical acumen to emerge as competent cyber security professionals. By fostering a deep understanding of cyber threats, vulnerabilities, and efficacious countermeasures, the program prepares its graduates to make meaningful contributions to the preservation of digital assets across a variety of professional contexts.
1. Basic Knowledge: To teach students the basic concepts of cybersecurity and improve their ability to understand security threats.
2. Innovation: To encourage students to create innovative solutions in the field of cybersecurity and to address existing security weaknesses.
3. Threat Awareness: To teach the concepts of secure network management and to explain the measures for network security.
4. Risk Management: Identify cyber security weaknesses and develop the skills to take effective measures against these weaknesses.
5. Secure Network Management: Emphasizing the design and implementation of secure and resilient network infrastructures by teaching secure network management principles.
6. Security Tools and Technologies: To teach how to use cyber security tools and to provide up-to-date information about these tools.
7. Security Policies and Compliance: Ensure compliance with industry standards and regulations by training students in the development and implementation of security policies.
8. Legal and Ethical Thinking: Provide information on local and international cybersecurity laws and regulations.
9. Ethical Hacking: To familiarize students with the principles and practices of ethical hacking, and to equip them with the knowledge and skills necessary to assess and improve the security of systems and networks in a lawful and ethical manner.
10. Institution and Organization Security: To teach security requirements in data centers, cloud systems, health information systems, and Industry 4.0.
11. Community Awareness: To highlight the security responsibilities of end users and the precautions they should take.
Program Outcomes: The graduates of our Cyber Security Engineering program are anticipated to gain extensive knowledge, abilities, and proficiencies. The following are the primary accomplishments:
1. Explain the basic, theoretical and practical knowledge in the field of information security technology and software.
2. Know cyber assets and can analyze them in terms of information security.
3. Experiences the cyber security risk management system.
4. Comprehendlocal and international laws on cyber security.
5. Gains the competence to analyze and solve problems.
6. Demonstrates awareness of ethical and social responsibility. Comprehends ethical hacking methodologies and acquires the ability to identify and rectify security vulnerabilities.
7. Gain an understanding of the principles and practices of cryptography.
8. Acquires the capacity to recognize and address the security requirements of organizations by proposing effective solutions.
9. Obtain the capacity to appreciate the significance of end users in safeguarding cyber security, and articulate the ideas that end users ought to consider.
Program Employment Areas: Graduates of the Department of Cyber Security Engineering have the opportunity to occupy significant roles in the business world with their expertise in information technologies and cyber security. As a result, they have a broad range of employment prospects that align with the current demands of the industry. The following are some of the employment sectors available to graduates of the department:
1. Security Analysts: Cybersecurity analysts are responsible for the surveillance, analysis, and response to security incidents. Their area of expertise lies in tracking threats and vulnerabilities.
2. Network Security Specialist: They hold the responsibility for identification of security weaknesses in networks, formulation and execution of network security protocols.
3. System Security Engineer: They specialize in the design, implementation, and management of security measures within operating systems and system software.
4. Ethical Hackers: The role of ethical hackers, also known as cybersecurity pentesters, is to undertake penetration testing in order to uncover and rectify any vulnerabilities within an organization's cybersecurity system. By identifying weaknesses and offering recommendations for improvement, these professionals play a crucial part in ensuring the security and integrity of the organization's digital assets.
5. Cyber Security Consultants: Consultants aid organizations in devising cybersecurity strategies, formulating security policies, and mitigating vulnerabilities.
6. Information Security Manager: They acquire proficiencies in deciphering the organization's information security strategy, directing the security team, and enforcing security policies. Their actions are aligned with these competencies.
7. Private Security Companies: Cybersecurity services are offered by private firms to clients, and graduates can take on the responsibility of providing cybersecurity solutions within these organizations.
8. Industrial Control Systems Security Specialist: They possess the expertise to guarantee the security of industrial control systems.
9. Cyber Security Trainers: Program graduates may have the opportunity to impart training on matters pertaining to cybersecurity. This is crucial in fostering greater awareness of cybersecurity and in cultivating a more knowledgeable workforce in this domain.
10. Security Architecture Specialist: They are responsible for the planning and operation of extensive security systems.
11. Cyber Security Experts: These professionals can serve as cybersecurity specialists for private firms, government agencies, and non-governmental organizations. Their primary responsibilities involve safeguarding their clients' information systems, identifying weaknesses, and devising strategies to counteract cyber threats.
12. Researchers and Developers: Graduates are well-suited for research and development positions where they can work on creating innovative security solutions and technologies.
13. Government and Defense: Cybersecurity professionals are in high demand by both government agencies and the defense industry, as they play a critical role in safeguarding the nation's cybersecurity interests.
Courses Process: The Cyber Security Engineering program in distance learning offers a comprehensive curriculum designed to provide students with a solid foundation in mathematics and the basic sciences. This is achieved through the inclusion of courses such as mathematics, linear algebra, and physics, which develop problem-solving abilities, analytical thinking skills, and a deeper understanding of computer science-related topics. The main curriculum of the department covers a broad range of subjects related to basic information technologies and cyber security, and is delivered through both traditional university settings and online platforms and digital tools.
Students have access to a range of online resources, including digital and traditional textbooks, videos, and interactive simulations. Lecturers utilize live video conferences and recorded lecture videos to deliver course content, and automated testing systems and online assignment platforms are used to monitor student performance. Collaboration and problem-solving skills are developed through individual and group projects, which are discussed and developed using online meeting tools.
Students have access to a range of online resources, including digital and traditional textbooks, videos, and interactive simulations. Lecturers utilize live video conferences and recorded lecture videos to deliver course content, and automated testing systems and online assignment platforms are used to monitor student performance. Collaboration and problem-solving skills are developed through individual and group projects, which are discussed and developed using online meeting tools.
1. Mathematics: Basic Mathematics, Differential and Integral Calculus, Probability and Statistics,
2. Linear Algebra: Linear Algebra and Applications,
3. Physics: General Physics, Electricity and Magnetism,
4. Basic Information Technology Courses: Basic Computer Science, Basic Programming (Python, Java, C++), Computer Networks and Protocols, Database Administration, Operating Systems,
5. Cyber Security Fundamentals: Cyber Security Principles, Fundamentals of Cryptography, Security Policies and Management, Ethical Hacking and Penetration Testing, Social Engineering and Security Awareness,
6. Network Security Courses: Network Security and Protocols, Secure Network Design, Network Security Devices and Technologies, Wireless Network Security,
7. System Security: System Security and Defense, Secure Operating Systems, System Vulnerability Analysis and Protection,
8. Application Security: Web Application Security, Application Security Tests, Mobile Application Security,
9. Security Review and Response: Cyber Incident Investigation, Insider Response and Response Planning, Digital Evidence Review,
10. Cloud Security: Cloud Security Fundamentals, Cloud Security Mechanisms, Cloud Security Policies,
11. Industrial Control Systems Security: SCADA and ICS Security, Industrial Security Standards,
12. Advanced Security Considerations: Security Architecture and Design, Advanced Threat Analysis, Big Data Security,
13. Business and Legal Relations: Cyber Security and Law, Business Continuity and Disaster Recovery, Law and Ethics Relations.
Bölüm Müfredati / Department Curriculum