SECTION I: GENERAL INFORMATION ABOUT THE COURSE

Course Code Course Name Year Semester Theoretical Practical Credit ECTS
BVA5108 AI-Powered Cybersecurity 1 Spring 3 0 3 6
Course Type : Elective Course I
Cycle: Associate      TQF-HE:5. Master`s Degree      QF-EHEA:Short Cycle      EQF-LLL:5. Master`s Degree
Language of Instruction: Turkish
Prerequisities and Co-requisities: N/A
Mode of Delivery: Face to face
Name of Coordinator: Instructor ABDULLAH ALAGÖZ
Dersin Öğretim Eleman(lar)ı: Instructor ABDULLAH ALAGÖZ
Dersin Kategorisi: Programme Specific

SECTION II: INTRODUCTION TO THE COURSE

Course Objectives & Content

Course Objectives: The aim of this course is to provide students with theoretical knowledge in artificial intelligence and cybersecurity, while also equipping them with the competence to develop practical solutions for real-world problems. Students will learn to use cybersecurity tools and simultaneously develop security bots, web applications, and analysis tools using Python programming, thereby acquiring technical skills highly sought after in the industry. By the end of the course, students will have the capacity to work independently, identify security vulnerabilities, and produce automated security solutions.
Course Content: This course begins with fundamental concepts of artificial intelligence and cybersecurity, followed by instruction in the Kali Linux operating system and basic terminal commands. Google Dorking techniques for passive information gathering, active information gathering and network scanning methods using Nmap are covered. Phishing attacks and social engineering techniques using GoPhish, followed by SQL injection vulnerabilities and web application security testing with Burp Suite are examined. After the midterm exam, students complete five different projects using Python programming: Telegram security bot (regex-based controls), Discord log analysis bot, Flask-based URL security checker web application, terminal-based CLI security scanning tool, and email phishing analysis system. All projects are completed in each student's independent working environment using completely free tools and libraries.

Course Specific Rules

1) Regular attendance is expected.

2) Assignments, projects, and applications must be submitted on the specified dates.

3 )Participation in quizzes and exams is mandatory.

4) Adherence to academic integrity rules is essential.

Course Learning Outcomes (CLOs)

Course Learning Outcomes (CLOs) are those describing the knowledge, skills and competencies that students are expected to achieve upon successful completion of the course. In this context, Course Learning Outcomes defined for this course unit are as follows:
Knowledge (Described as Theoritical and/or Factual Knowledge.)
  1) Define and explain fundamental concepts, attack types, and security vulnerabilities in artificial intelligence and cybersecurity.
Skills (Describe as Cognitive and/or Practical Skills.)
  1) Perform security tests using cybersecurity tools such as Kali Linux, Nmap, and Burp Suite, and apply passive/active information gathering techniques.
  2) Develop security bots, web applications, and automated analysis tools using Python programming language.
Competences (Described as "Ability of the learner to apply knowledge and skills autonomously with responsibility", "Learning to learn"," Communication and social" and "Field specific" competences.)
  1) Plan, develop, and complete cybersecurity projects independently; take responsibility in identifying security vulnerabilities.
  2) Continuously develop oneself by following new technologies and current threats in cybersecurity, and learn solutions to encountered problems.
  3) Test phishing, SQL injection, and other attack techniques in compliance with ethical guidelines, and produce automated security solutions.
  4) Report security analyses and findings in an understandable manner for different audiences, and communicate effectively in team work.

Weekly Course Schedule

Week Subject
Materials Sharing *
Related Preparation Further Study
1) Introduction to AI and Cybersecurity: CIA Triad, Threat Modeling, and AI Applications Online Beykoz
2) Kali Linux and Basic Terminal Commands: File Management and Package Installation Online Beykoz
3) Google Dorking and Passive Reconnaissance: OSINT Tools and Social Media Intelligence Online Beykoz
4) Active Reconnaissance and Network Scanning with Nmap: Port Scanning, Service Detection, and NSE Usage Online Beykoz
5) Phishing and Social Engineering: Designing and Analyzing Campaigns with GoPhish Online Beykoz
6) SQL Injection and Burp Suite Basics: Web Security and Proxy Configuration Online Beykoz
7) Advanced Burp Suite Usage: Security Testing with Repeater, Intruder, and Scanner Online Beykoz
8) Midterm Exam
9) Telegram Bot with Python: AI-Based Security Awareness and Attack Scenario Chatbot (Rule-Based) Online Beykoz
10) Student Industry Meeting - Log Analysis with Python: Parsing, Feature Extraction, and AI-Assisted Suspicious Behavior Classification (Basic Model) Online Beykoz
11) Flask Web Application: URL Phishing Detection and AI-Assisted Risk Scoring System Online Beykoz
12) CLI Security Tool Development: Kaggle Email Dataset Calculation, File Scanning, and Simple Risk Scoring Online Beykoz
13) Email Forensics and Incident Reporting with AI Agent (Flowise + Ollama) Online Beykoz
14) General Review, Final Project Presentations, and Cybersecurity Career Paths Online Beykoz
*These fields provides students with course materials for their pre- and further study before and after the course delivered.

Recommended or Required Reading & Other Learning Resources/Tools

Course Notes / Textbooks: The Web Application Hacker's Handbook Materyal
References: Online Beykoz

DERS ÖĞRENME ÇIKTILARI - PROGRAM ÖĞRENME ÇIKTILARI İLİŞKİSİ

Contribution of The Course Unit To The Programme Learning Outcomes

Ders Öğrenme Çıktıları (DÖÇ)

1

2

3

4

5

6

7

Program Öğrenme Çıktıları (PÖÇ)
1) It explains fundamental concepts in mathematics, statistics, and probability; and applies this knowledge to data analysis, modeling, and interpretation of results.
2) It explains the principles of algorithm design and develops software for solving problems using at least one programming language.
3) It compares machine learning and data mining algorithms, selects the appropriate method, and applies it to real data.
4) Big data platforms utilize distributed systems and cloud computing architectures to perform data processing operations.
5) They apply natural language processing techniques to text data and develop basic NLP-based applications.
6) It analyzes different data sources, transforms them into meaningful outputs, and presents them using appropriate visualization tools.
7) It creates data-driven decision models using decision support systems.
8) It develops optimization models and produces solutions for industrial and sectoral problems.
9) In professional practice, we operate within the framework of ethical principles, data security, and social responsibility.
10) They keep up with current technological developments in their field, actively participate in teamwork, and develop a lifelong learning awareness.

SECTION III: RELATIONSHIP BETWEEN COURSE UNIT AND COURSE LEARNING OUTCOMES (CLOs)

Level of Contribution of the Course to PLOs

No Effect 1 Lowest 2 Low 3 Average 4 High 5 Highest
           
Programme Learning Outcomes Contribution Level (from 1 to 5)
1) It explains fundamental concepts in mathematics, statistics, and probability; and applies this knowledge to data analysis, modeling, and interpretation of results.
2) It explains the principles of algorithm design and develops software for solving problems using at least one programming language. 5
3) It compares machine learning and data mining algorithms, selects the appropriate method, and applies it to real data. 3
4) Big data platforms utilize distributed systems and cloud computing architectures to perform data processing operations.
5) They apply natural language processing techniques to text data and develop basic NLP-based applications.
6) It analyzes different data sources, transforms them into meaningful outputs, and presents them using appropriate visualization tools. 3
7) It creates data-driven decision models using decision support systems.
8) It develops optimization models and produces solutions for industrial and sectoral problems.
9) In professional practice, we operate within the framework of ethical principles, data security, and social responsibility. 4
10) They keep up with current technological developments in their field, actively participate in teamwork, and develop a lifelong learning awareness.

SECTION IV: TEACHING-LEARNING & ASSESMENT-EVALUATION METHODS OF THE COURSE

Teaching & Learning Methods of the Course

(All teaching and learning methods used at the university are managed systematically. Upon proposals of the programme units, they are assessed by the relevant academic boards and, if found appropriate, they are included among the university list. Programmes, then, choose the appropriate methods in line with their programme design from this list. Likewise, appropriate methods to be used for the course units can be chosen among those defined for the programme.)
Teaching and Learning Methods defined at the Programme Level
Teaching and Learning Methods Defined for the Course
Lectures
Discussion
Problem Solving
Demonstration
Laboratory
Seminar
Questions Answers
Active Participation in Class

Assessment & Evaluation Methods of the Course

(All assessment and evaluation methods used at the university are managed systematically. Upon proposals of the programme units, they are assessed by the relevant academic boards and, if found appropriate, they are included among the university list. Programmes, then, choose the appropriate methods in line with their programme design from this list. Likewise, appropriate methods to be used for the course units can be chosen among those defined for the programme.)
Aassessment and evaluation Methods defined at the Programme Level
Assessment and Evaluation Methods defined for the Course
Midterm
Final Exam
Quiz
Active Participation in Class

Contribution of Assesment & Evalution Activities to Final Grade of the Course

Measurement and Evaluation Methods # of practice per semester Level of Contribution
Quizzes 1 % 15.00
Midterms 1 % 35.00
Semester Final Exam 1 % 50.00
Total % 100
PERCENTAGE OF SEMESTER WORK % 50
PERCENTAGE OF FINAL WORK % 50
Total % 100

SECTION V: WORKLOAD & ECTS CREDITS ALLOCATED FOR THE COURSE

WORKLOAD OF TEACHING & LEARNING ACTIVITIES
Teaching & Learning Activities # of Activities per semester Duration (hour) Total Workload
Course 14 1 14
Laboratory 14 2 28
Application 0 0 0
Special Course Internship (Work Placement) 0 0 0
Field Work 0 0 0
Study Hours Out of Class 0 0 0
Presentations / Seminar 0 0 0
Project 0 0 0
Homework Assignments 0 0 0
Total Workload of Teaching & Learning Activities - - 42
WORKLOAD OF ASSESMENT & EVALUATION ACTIVITIES
Assesment & Evaluation Activities # of Activities per semester Duration (hour) Total Workload
Quizzes 1 25 25
Midterms 1 35 35
Semester Final Exam 1 45 45
Total Workload of Assesment & Evaluation Activities - - 105
TOTAL WORKLOAD (Teaching & Learning + Assesment & Evaluation Activities) 147
ECTS CREDITS OF THE COURSE (Total Workload/25.5 h) 6