BİLİŞİM GÜVENLİĞİ TEKNOLOJİSİ
Qualification Awarded Program Süresi Toplam Kredi (AKTS) Öğretim Şekli Yeterliliğin Düzeyi ve Öğrenme Alanı
2 120 FULL TIME TYÇ, TR-NQF-HE, EQF-LLL, ISCED (2011):Level 5
QF-EHEA:Short Cycle
TR-NQF-HE, ISCED (1997-2013): 48,52

Ders Genel Tanıtım Bilgileri

Course Code: 2000121002
Ders İsmi: Programming II
Ders Yarıyılı: Spring
Ders Kredileri:
Theoretical Practical Labs Credit ECTS
2 2 0 3 6
Language of instruction: TR
Ders Koşulu:
Ders İş Deneyimini Gerektiriyor mu?: No
Other Recommended Topics for the Course:
Type of course: Necessary
Course Level:
Associate TR-NQF-HE:5. Master`s Degree QF-EHEA:Short Cycle EQF-LLL:5. Master`s Degree
Mode of Delivery: Face to face
Course Coordinator : Öğr.Gör. Ayşenur ÖZTÜRK
Course Lecturer(s):






Course Assistants:

Dersin Amaç ve İçeriği

Course Objectives: Teaching the Phyton programming language, Solving mathematical problems with the help of programming, Operations with matrices
Course Content: Introduction to the Phyton programming language
Input-Print-Cls commands
Decision Command structures; If Then, If Then Else,..
Loops; Goto, For-Next, Do-Loop, While-Wend,
Series
Ready Functions
Functions and Subroutines
Operations with characters and numbers

Learning Outcomes

The students who have succeeded in this course;
Learning Outcomes
1 - Knowledge
Theoretical - Conceptual
2 - Skills
Cognitive - Practical
1) Implementing the developed algorithms with the python language
2) Analyzing codes in the Python programming language
3 - Competences
Communication and Social Competence
1) Communication and social competence, learning competence
Learning Competence
Field Specific Competence
1) Developing algorithms to solve simple problems
Competence to Work Independently and Take Responsibility
1) Student designs phyton programs with decision structures, loops and functions

Ders Akış Planı

Week Subject Related Preparation
1) Object Oriented Programming Phyton ile veri bilimi, Dr. İlker Arslan The phytoon workbook Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt
2) Java Classes/Objects, Java Constructor Phyton ile veri bilimi, Dr. İlker Arslan The phytoon workbook Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt
3) Java Access Modifiers, Encapsulation Phyton ile veri bilimi, Dr. İlker Arslan The phytoon workbook Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt
4) Java Inheritance, Polimorphism, Inner Classes Phyton ile veri bilimi, Dr. İlker Arslan The phytoon workbook Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt
5) Abstraction Phyton ile veri bilimi, Dr. İlker Arslan The phytoon workbook Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt
6) Java Interface, Java Enum Phyton ile veri bilimi, Dr. İlker Arslan The phytoon workbook Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt
7) Java Lambda Phyton ile veri bilimi, Dr. İlker Arslan The phytoon workbook Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt
8) Midterm Phyton ile veri bilimi, Dr. İlker Arslan The phytoon workbook Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt
9) List, Arraylist, Linkedlist Phyton ile veri bilimi, Dr. İlker Arslan The phytoon workbook Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt
10) Map, HashMap, Set, HashSet Phyton ile veri bilimi, Dr. İlker Arslan The phytoon workbook Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt
11) Java Iterator, Java Wrapper Classes Phyton ile veri bilimi, Dr. İlker Arslan The phytoon workbook Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt
12) Midterm-2 Phyton ile veri bilimi, Dr. İlker Arslan The phytoon workbook Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt
13) Java Exceptions, Java Threads Phyton ile veri bilimi, Dr. İlker Arslan The phytoon workbook Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt
14) Web application development with Spring, Spring boot Phyton ile veri bilimi, Dr. İlker Arslan The phytoon workbook Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt
15) Web application development with Spring, Spring boot Phyton ile veri bilimi, Dr. İlker Arslan The phytoon workbook Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt
16) Final Exam Phyton ile veri bilimi, Dr. İlker Arslan The phytoon workbook Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt

Sources

Course Notes / Textbooks: Ders Notları
References: Phyton ile veri bilimi, Dr. İlker Arslan
The phytoon workbook
Sorularla Phyton, Hakan Yalçınkaya, Ercan Bozkurt

Ders - Program Öğrenme Kazanım İlişkisi

Ders Öğrenme Kazanımları

1

2

3

4

5

Program Outcomes
1) Having knowledge and skills in security algorithms for programming
1) Possesses in-depth theoretical knowledge in information security, cybersecurity, network security, and data protection.
2) Understands information security management systems, national and international security standards, ethical considerations, and legal regulations.
2) Ability to install and manage software required for end user security
3) Has analytical thinking skills in classifying cyber threats, attack vectors, and defense mechanisms.
3) Having the ability to install and manage computer networks and use the network operating system
4) Theoretically comprehends security technologies such as cryptography, digital signatures, authentication, and access control mechanisms.
5) Can establish network security policies and effectively manage security tools such as firewalls and intrusion detection/prevention systems.
6) Has expertise in applying cryptographic algorithms, using data encryption techniques, and analyzing cybersecurity intelligence.
7) Can conduct penetration tests and security assessments to identify system vulnerabilities and develop preventive measures.

Ders - Öğrenme Kazanımı İlişkisi

No Effect 1 Lowest 2 Low 3 Average 4 High 5 Highest
           
Program Outcomes Level of Contribution
1) Having knowledge and skills in security algorithms for programming 5
1) Possesses in-depth theoretical knowledge in information security, cybersecurity, network security, and data protection. 2
2) Understands information security management systems, national and international security standards, ethical considerations, and legal regulations.
2) Ability to install and manage software required for end user security 4
3) Has analytical thinking skills in classifying cyber threats, attack vectors, and defense mechanisms.
3) Having the ability to install and manage computer networks and use the network operating system 3
4) Theoretically comprehends security technologies such as cryptography, digital signatures, authentication, and access control mechanisms.
5) Can establish network security policies and effectively manage security tools such as firewalls and intrusion detection/prevention systems.
6) Has expertise in applying cryptographic algorithms, using data encryption techniques, and analyzing cybersecurity intelligence.
7) Can conduct penetration tests and security assessments to identify system vulnerabilities and develop preventive measures.

Öğrenme Etkinliği ve Öğretme Yöntemleri

Anlatım
Bireysel çalışma ve ödevi
Course
Grup çalışması ve ödevi
Labs
Soru cevap/ Tartışma
Uygulama (Modelleme, Tasarım, Maket, Simülasyon, Deney vs.)
Web Tabanlı Öğrenme
Staj/Yerinde Uygulama

Ölçme ve Değerlendirme Yöntemleri ve Kriterleri

Yazılı Sınav (Açık uçlu sorular, çoktan seçmeli, doğru yanlış, eşleştirme, boşluk doldurma, sıralama)
Sözlü sınav
Homework
Uygulama
Bireysel Proje
Sunum
Bilgisayar Destekli Sunum

Assessment & Grading

Semester Requirements Number of Activities Level of Contribution
Midterms 2 % 60
Semester Final Exam 1 % 40
total % 100
PERCENTAGE OF SEMESTER WORK % 60
PERCENTAGE OF FINAL WORK % 40
total % 100

İş Yükü ve AKTS Kredisi Hesaplaması

Activities Number of Activities Duration (Hours) Workload
Course Hours 14 4 56
Laboratory 14 4 56
Study Hours Out of Class 14 4 56
Midterms 1 10 10
Final 1 10 10
Total Workload 188