Week |
Subject |
Related Preparation |
1) |
Meeting students and explaining the content of the course |
1.Introduction to The Design and Analysis of Algorithms, Anany Levitin, Pearson ,3 RD Edition.
2. Algorithms and Programming Burcu Yılmazel, Sevcan Yılmaz Gündüz, Alper Kürşat Uysal, Anadolu University Publications,2016. |
2) |
What is Algorithm? Basic Features of Algorithms, Algorithm Notation Methods |
1.Introduction to The Design and Analysis of Algorithms, Anany Levitin, Pearson ,3 RD Edition.
2. Algorithms and Programming Burcu Yılmazel, Sevcan Yılmaz Gündüz, Alper Kürşat Uysal, Anadolu University Publications,2016. |
3) |
Classification of Algorithms, Data Structures |
1.Introduction to The Design and Analysis of Algorithms, Anany Levitin, Pearson ,3 RD Edition.
2. Algorithms and Programming Burcu Yılmazel, Sevcan Yılmaz Gündüz, Alper Kürşat Uysal, Anadolu University Publications,2016. |
4) |
Arrays, Linked Lists, Queues, and Stacks |
1.Introduction to The Design and Analysis of Algorithms, Anany Levitin, Pearson ,3 RD Edition.
2. Algorithms and Programming Burcu Yılmazel, Sevcan Yılmaz Gündüz, Alper Kürşat Uysal, Anadolu University Publications,2016. |
5) |
Trees, Binary Trees, Methods for Navigating Binary Trees |
1.Introduction to The Design and Analysis of Algorithms, Anany Levitin, Pearson ,3 RD Edition.
2. Algorithms and Programming Burcu Yılmazel, Sevcan Yılmaz Gündüz, Alper Kürşat Uysal, Anadolu University Publications,2016. |
6) |
Binary Search Trees, AVL Trees, Stack Trees |
1.Introduction to The Design and Analysis of Algorithms, Anany Levitin, Pearson ,3 RD Edition.
2. Algorithms and Programming Burcu Yılmazel, Sevcan Yılmaz Gündüz, Alper Kürşat Uysal, Anadolu University Publications,2016. |
7) |
Hash Tables |
1.Introduction to The Design and Analysis of Algorithms, Anany Levitin, Pearson ,3 RD Edition.
2. Algorithms and Programming Burcu Yılmazel, Sevcan Yılmaz Gündüz, Alper Kürşat Uysal, Anadolu University Publications,2016. |
8) |
Midterm Exam-1 |
|
9) |
Problem Solving with Algorithms, Algorithm Design Techniques |
1.Introduction to The Design and Analysis of Algorithms, Anany Levitin, Pearson ,3 RD Edition.
2. Algorithms and Programming Burcu Yılmazel, Sevcan Yılmaz Gündüz, Alper Kürşat Uysal, Anadolu University Publications,2016. |
10) |
Loop-Iteration Algorithms, Reduce-Conquer Method Algorithms, Recursive Function Algorithms and Divide-Conquer Method Algorithms |
1.Introduction to The Design and Analysis of Algorithms, Anany Levitin, Pearson ,3 RD Edition.
2. Algorithms and Programming Burcu Yılmazel, Sevcan Yılmaz Gündüz, Alper Kürşat Uysal, Anadolu University Publications,2016. |
11) |
Algorithm Analysis |
1.Introduction to The Design and Analysis of Algorithms, Anany Levitin, Pearson ,3 RD Edition.
2. Algorithms and Programming Burcu Yılmazel, Sevcan Yılmaz Gündüz, Alper Kürşat Uysal, Anadolu University Publications,2016. |
12) |
Midterm Exam-2 |
|
13) |
Comparison of Search Algorithms, Sequential Search, Binary Search and Search Algorithms |
1.Introduction to The Design and Analysis of Algorithms, Anany Levitin, Pearson ,3 RD Edition.
2. Algorithms and Programming Burcu Yılmazel, Sevcan Yılmaz Gündüz, Alper Kürşat Uysal, Anadolu University Publications,2016. |
14) |
Sorting Algorithms, Properties of Sorting Algorithms |
1.Introduction to The Design and Analysis of Algorithms, Anany Levitin, Pearson ,3 RD Edition.
2. Algorithms and Programming Burcu Yılmazel, Sevcan Yılmaz Gündüz, Alper Kürşat Uysal, Anadolu University Publications,2016. |
15) |
Graph Algorithms |
1.Introduction to The Design and Analysis of Algorithms, Anany Levitin, Pearson ,3 RD Edition.
2. Algorithms and Programming Burcu Yılmazel, Sevcan Yılmaz Gündüz, Alper Kürşat Uysal, Anadolu University Publications,2016. |
16) |
Final Exam |
|
|
Program Outcomes |
Level of Contribution |
1) |
Having knowledge and skills in security algorithms for programming |
5 |
1) |
Possesses in-depth theoretical knowledge in information security, cybersecurity, network security, and data protection. |
3 |
2) |
Understands information security management systems, national and international security standards, ethical considerations, and legal regulations. |
|
2) |
Ability to install and manage software required for end user security |
3 |
3) |
Has analytical thinking skills in classifying cyber threats, attack vectors, and defense mechanisms. |
|
3) |
Having the ability to install and manage computer networks and use the network operating system |
3 |
4) |
Theoretically comprehends security technologies such as cryptography, digital signatures, authentication, and access control mechanisms. |
|
5) |
Can establish network security policies and effectively manage security tools such as firewalls and intrusion detection/prevention systems. |
|
6) |
Has expertise in applying cryptographic algorithms, using data encryption techniques, and analyzing cybersecurity intelligence. |
|
7) |
Can conduct penetration tests and security assessments to identify system vulnerabilities and develop preventive measures. |
|