CEIT215 INFORMATION SECURITY AND CYBER ETHICS IN EDUCATION

Course Code:4300215
METU Credit (Theoretical-Laboratory hours/week):2 (2.00 - 0.00)
ECTS Credit:3.0
Department:Computer Education and Instructional Technology
Language of Instruction:English
Level of Study:Undergraduate
Course Coordinator:Lecturer DİDEM TUFAN
Offered Semester:Fall and Spring Semesters.

Course Objectives

This course aims to provide a general introduction to fundamental concepts in cybersecurity. Anyone with a good general knowledge of information and communication technology can take this course. It explains the nature, scope, and importance of cybersecurity and justifies and explores basic concepts. This course covers the types of threats and attacks that cybersecurity needs to address, as well as the technologies and processes that can be deployed.


Course Content

The goal of the course is to raise the information security awareness and cyber ethics
sensitivity of pre-service teachers. This course addresses several of the major security,
ethical and policy issues that are changing the way educators think about new information
and communication technologies in a classroom setting. While covering information
security and cyber ethics concepts, the course also demonstrate several real life cases.
The course will cover but not limited to topics such as safety in social media, netiquette,
acceptable use of computing resources, electronic cheating, high-tech hate speech,
intellectual property, digital divide, social equity, copyright, and current governmental
regulations. During the course from time to time, students will have a chance to hear from
a number of information technology experts on above course topics.


Course Learning Outcomes

The student who successfully completes this course will:

  • Describe the characteristics of criminals and experts in the world of cybersecurity.
  • Explain how the principles of privacy, integrity, and availability are related to data states and cybersecurity measures.
  • Describe the tactics, techniques, and procedures used by cybercriminals.
  • Explain how technologies, products, and procedures are used to protect privacy.
  • Explain how technologies, products, and procedures are used to ensure integrity.
  • Describe how technologies, products, and procedures provide high availability.
  • Explain how cybersecurity experts use technologies, processes, and procedures to defend all components of a network.
  • Explain the purpose of laws related to cybersecurity.

Program Outcomes Matrix

Level of Contribution
#Program Outcomes0123
1They have the skill and knowledge to use information technologies.
2They use information technology to access information, and they analyze, synthesize, and evaluate knowledge by adapting to new situations.
3They use strategies and techniques based on learning theories and apply them to solve instructional problems in a systemic and systematic way
4They have skill and knowledge in analysis, design, development, implementation and evaluation in instructional design process.
5They implement learning-teaching methods and techniques in computer education.
6They have knowledge, skill and competency about computer hardware, operating systems, computer networks and programming languages.
7They determine measurement and evaluation methods and techniques used in computer education.
8They have the ability to conduct and present results of intra-disciplinary and inter-disciplinary researches in the field of instructional technology.
9They comprehend project management processes and implement and present projects electronically.
10They have critical thinking and problem solving skills.
11They have social communication and cultural exchange skills.
12They have legal knowledge, skills and attitudes required for teaching profession and apply them in the learning environment.

0: No Contribution 1: Little Contribution 2: Partial Contribution 3: Full Contribution