BİLİŞİM GÜVENLİĞİ TEKNOLOJİSİ | |||||
---|---|---|---|---|---|
Qualification Awarded | Program Süresi | Toplam Kredi (AKTS) | Öğretim Şekli | Yeterliliğin Düzeyi ve Öğrenme Alanı | |
2 | 120 | FULL TIME |
TYÇ, TR-NQF-HE, EQF-LLL, ISCED (2011):Level 5 QF-EHEA:Short Cycle TR-NQF-HE, ISCED (1997-2013): 48,52 |
Course Code: | 2000121002 | ||||||||||
Ders İsmi: | Programming II | ||||||||||
Ders Yarıyılı: | Spring | ||||||||||
Ders Kredileri: |
|
||||||||||
Language of instruction: | TR | ||||||||||
Ders Koşulu: | |||||||||||
Ders İş Deneyimini Gerektiriyor mu?: | No | ||||||||||
Other Recommended Topics for the Course: | |||||||||||
Type of course: | Necessary | ||||||||||
Course Level: |
|
||||||||||
Mode of Delivery: | Face to face | ||||||||||
Course Coordinator : | Öğr.Gör. Ayşenur ÖZTÜRK | ||||||||||
Course Lecturer(s): |
|
||||||||||
Course Assistants: |
Course Objectives: | Teaching the Phyton programming language, Solving mathematical problems with the help of programming, Operations with matrices |
Course Content: | Introduction to the Phyton programming language Input-Print-Cls commands Decision Command structures; If Then, If Then Else,.. Loops; Goto, For-Next, Do-Loop, While-Wend, Series Ready Functions Functions and Subroutines Operations with characters and numbers |
The students who have succeeded in this course;
|
Week | Subject | Related Preparation |
1) | Object Oriented Programming | Phyton ile veri bilimi, Dr. İlker Arslan The phytoon workbook Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt |
2) | Java Classes/Objects, Java Constructor | Phyton ile veri bilimi, Dr. İlker Arslan The phytoon workbook Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt |
3) | Java Access Modifiers, Encapsulation | Phyton ile veri bilimi, Dr. İlker Arslan The phytoon workbook Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt |
4) | Java Inheritance, Polimorphism, Inner Classes | Phyton ile veri bilimi, Dr. İlker Arslan The phytoon workbook Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt |
5) | Abstraction | Phyton ile veri bilimi, Dr. İlker Arslan The phytoon workbook Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt |
6) | Java Interface, Java Enum | Phyton ile veri bilimi, Dr. İlker Arslan The phytoon workbook Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt |
7) | Java Lambda | Phyton ile veri bilimi, Dr. İlker Arslan The phytoon workbook Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt |
8) | Midterm | Phyton ile veri bilimi, Dr. İlker Arslan The phytoon workbook Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt |
9) | List, Arraylist, Linkedlist | Phyton ile veri bilimi, Dr. İlker Arslan The phytoon workbook Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt |
10) | Map, HashMap, Set, HashSet | Phyton ile veri bilimi, Dr. İlker Arslan The phytoon workbook Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt |
11) | Java Iterator, Java Wrapper Classes | Phyton ile veri bilimi, Dr. İlker Arslan The phytoon workbook Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt |
12) | Midterm-2 | Phyton ile veri bilimi, Dr. İlker Arslan The phytoon workbook Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt |
13) | Java Exceptions, Java Threads | Phyton ile veri bilimi, Dr. İlker Arslan The phytoon workbook Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt |
14) | Web application development with Spring, Spring boot | Phyton ile veri bilimi, Dr. İlker Arslan The phytoon workbook Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt |
15) | Web application development with Spring, Spring boot | Phyton ile veri bilimi, Dr. İlker Arslan The phytoon workbook Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt |
16) | Final Exam | Phyton ile veri bilimi, Dr. İlker Arslan The phytoon workbook Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt |
Course Notes / Textbooks: | Ders Notları |
References: | Phyton ile veri bilimi, Dr. İlker Arslan The phytoon workbook Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt |
Ders Öğrenme Kazanımları | 1 |
2 |
3 |
4 |
5 |
||||
---|---|---|---|---|---|---|---|---|---|
Program Outcomes | |||||||||
1) Having knowledge and skills in security algorithms for programming | |||||||||
1) Possesses in-depth theoretical knowledge in information security, cybersecurity, network security, and data protection. | |||||||||
2) Understands information security management systems, national and international security standards, ethical considerations, and legal regulations. | |||||||||
2) Ability to install and manage software required for end user security | |||||||||
3) Has analytical thinking skills in classifying cyber threats, attack vectors, and defense mechanisms. | |||||||||
3) Having the ability to install and manage computer networks and use the network operating system | |||||||||
4) Theoretically comprehends security technologies such as cryptography, digital signatures, authentication, and access control mechanisms. | |||||||||
5) Can establish network security policies and effectively manage security tools such as firewalls and intrusion detection/prevention systems. | |||||||||
6) Has expertise in applying cryptographic algorithms, using data encryption techniques, and analyzing cybersecurity intelligence. | |||||||||
7) Can conduct penetration tests and security assessments to identify system vulnerabilities and develop preventive measures. |
No Effect | 1 Lowest | 2 Low | 3 Average | 4 High | 5 Highest |
Program Outcomes | Level of Contribution | |
1) | Having knowledge and skills in security algorithms for programming | 5 |
1) | Possesses in-depth theoretical knowledge in information security, cybersecurity, network security, and data protection. | 2 |
2) | Understands information security management systems, national and international security standards, ethical considerations, and legal regulations. | |
2) | Ability to install and manage software required for end user security | 4 |
3) | Has analytical thinking skills in classifying cyber threats, attack vectors, and defense mechanisms. | |
3) | Having the ability to install and manage computer networks and use the network operating system | 3 |
4) | Theoretically comprehends security technologies such as cryptography, digital signatures, authentication, and access control mechanisms. | |
5) | Can establish network security policies and effectively manage security tools such as firewalls and intrusion detection/prevention systems. | |
6) | Has expertise in applying cryptographic algorithms, using data encryption techniques, and analyzing cybersecurity intelligence. | |
7) | Can conduct penetration tests and security assessments to identify system vulnerabilities and develop preventive measures. |
Anlatım | |
Bireysel çalışma ve ödevi | |
Course | |
Grup çalışması ve ödevi | |
Labs | |
Soru cevap/ Tartışma | |
Uygulama (Modelleme, Tasarım, Maket, Simülasyon, Deney vs.) | |
Web Tabanlı Öğrenme | |
Staj/Yerinde Uygulama |
Yazılı Sınav (Açık uçlu sorular, çoktan seçmeli, doğru yanlış, eşleştirme, boşluk doldurma, sıralama) | |
Sözlü sınav | |
Homework | |
Uygulama | |
Bireysel Proje | |
Sunum | |
Bilgisayar Destekli Sunum |
Semester Requirements | Number of Activities | Level of Contribution |
Midterms | 2 | % 60 |
Semester Final Exam | 1 | % 40 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 60 | |
PERCENTAGE OF FINAL WORK | % 40 | |
total | % 100 |
Activities | Number of Activities | Duration (Hours) | Workload |
Course Hours | 14 | 4 | 56 |
Laboratory | 14 | 4 | 56 |
Study Hours Out of Class | 14 | 4 | 56 |
Midterms | 1 | 10 | 10 |
Final | 1 | 10 | 10 |
Total Workload | 188 |