CEIT215 INFORMATION SECURITY AND CYBER ETHICS IN EDUCATION
Course Code: | 4300215 |
METU Credit (Theoretical-Laboratory hours/week): | 2 (2.00 - 0.00) |
ECTS Credit: | 3.0 |
Department: | Computer Education and Instructional Technology |
Language of Instruction: | English |
Level of Study: | Undergraduate |
Course Coordinator: | Lecturer DİDEM TUFAN |
Offered Semester: | Fall and Spring Semesters. |
Course Objectives
This course aims to provide a general introduction to fundamental concepts in cybersecurity. Anyone with a good general knowledge of information and communication technology can take this course. It explains the nature, scope, and importance of cybersecurity and justifies and explores basic concepts. This course covers the types of threats and attacks that cybersecurity needs to address, as well as the technologies and processes that can be deployed.
Course Content
The goal of the course is to raise the information security awareness and cyber ethics
sensitivity of pre-service teachers. This course addresses several of the major security,
ethical and policy issues that are changing the way educators think about new information
and communication technologies in a classroom setting. While covering information
security and cyber ethics concepts, the course also demonstrate several real life cases.
The course will cover but not limited to topics such as safety in social media, netiquette,
acceptable use of computing resources, electronic cheating, high-tech hate speech,
intellectual property, digital divide, social equity, copyright, and current governmental
regulations. During the course from time to time, students will have a chance to hear from
a number of information technology experts on above course topics.
Course Learning Outcomes
The student who successfully completes this course will:
- Describe the characteristics of criminals and experts in the world of cybersecurity.
- Explain how the principles of privacy, integrity, and availability are related to data states and cybersecurity measures.
- Describe the tactics, techniques, and procedures used by cybercriminals.
- Explain how technologies, products, and procedures are used to protect privacy.
- Explain how technologies, products, and procedures are used to ensure integrity.
- Describe how technologies, products, and procedures provide high availability.
- Explain how cybersecurity experts use technologies, processes, and procedures to defend all components of a network.
- Explain the purpose of laws related to cybersecurity.
Program Outcomes Matrix
Level of Contribution | |||||
# | Program Outcomes | 0 | 1 | 2 | 3 |
1 | They have the skill and knowledge to use information technologies. | ✔ | |||
2 | They use information technology to access information, and they analyze, synthesize, and evaluate knowledge by adapting to new situations. | ✔ | |||
3 | They use strategies and techniques based on learning theories and apply them to solve instructional problems in a systemic and systematic way | ✔ | |||
4 | They have skill and knowledge in analysis, design, development, implementation and evaluation in instructional design process. | ✔ | |||
5 | They implement learning-teaching methods and techniques in computer education. | ✔ | |||
6 | They have knowledge, skill and competency about computer hardware, operating systems, computer networks and programming languages. | ✔ | |||
7 | They determine measurement and evaluation methods and techniques used in computer education. | ✔ | |||
8 | They have the ability to conduct and present results of intra-disciplinary and inter-disciplinary researches in the field of instructional technology. | ✔ | |||
9 | They comprehend project management processes and implement and present projects electronically. | ✔ | |||
10 | They have critical thinking and problem solving skills. | ✔ | |||
11 | They have social communication and cultural exchange skills. | ✔ | |||
12 | They have legal knowledge, skills and attitudes required for teaching profession and apply them in the learning environment. | ✔ |
0: No Contribution 1: Little Contribution 2: Partial Contribution 3: Full Contribution