Course Objectives: |
In this course, knowledge of color, graphic formats, graphic file types, retouching, editing etc. using Adobe Photoshop software image editing tools. do operations, learn to achieve with masks and channels in layers. Learns the basics of using Animations from Flash, Scratch and 3Ds Max programs to make 3D animations. |
Course Content: |
In this course, color information, graphic formats, graphic file types, retouching, editing etc. using image editing tools in Adobe Photoshop program. learn to do operations, work with masks and channels in layers. Learns the basics of animation and using Flash, Scratch and 3Ds Max programs to make 3D animations. |
Week |
Subject |
Related Preparation |
1) |
Introduction to Basic Design – What is design? |
What is graphic design/Alice Twemlov Uygulamalı ve Örnekli Grafik ve Animasyon /Yrd. Doç. Dr. Zehra Alakoç Burma |
2) |
Basic Design Principles, Gestalt Theory, Bauhaus Movement |
What is graphic design/Alice Twemlov Uygulamalı ve Örnekli Grafik ve Animasyon /Yrd. Doç. Dr. Zehra Alakoç Burma |
3) |
Introduction to Photoshop, Getting to Know the Interface |
What is graphic design/Alice Twemlov Uygulamalı ve Örnekli Grafik ve Animasyon /Yrd. Doç. Dr. Zehra Alakoç Burma |
4) |
Getting to Know the Tools Panel and Side Panels |
What is graphic design/Alice Twemlov Uygulamalı ve Örnekli Grafik ve Animasyon /Yrd. Doç. Dr. Zehra Alakoç Burma |
5) |
Layers, Brush Usage and Colors |
What is graphic design/Alice Twemlov Uygulamalı ve Örnekli Grafik ve Animasyon /Yrd. Doç. Dr. Zehra Alakoç Burma |
6) |
Crop Tool, Color Adjustment and Collage Technique |
What is graphic design/Alice Twemlov Uygulamalı ve Örnekli Grafik ve Animasyon /Yrd. Doç. Dr. Zehra Alakoç Burma |
7) |
Tools Panel – Object Selection Tool, Getting to Know the Clone Tool |
What is graphic design/Alice Twemlov Uygulamalı ve Örnekli Grafik ve Animasyon /Yrd. Doç. Dr. Zehra Alakoç Burma |
8) |
Midterm Exam Week |
What is graphic design/Alice Twemlov Uygulamalı ve Örnekli Grafik ve Animasyon /Yrd. Doç. Dr. Zehra Alakoç Burma |
9) |
Photoshop – Options Panel |
What is graphic design/Alice Twemlov Uygulamalı ve Örnekli Grafik ve Animasyon /Yrd. Doç. Dr. Zehra Alakoç Burma |
10) |
Photoshop – Masking Tool |
What is graphic design/Alice Twemlov Uygulamalı ve Örnekli Grafik ve Animasyon /Yrd. Doç. Dr. Zehra Alakoç Burma |
11) |
Introduction to Typography |
What is graphic design/Alice Twemlov Uygulamalı ve Örnekli Grafik ve Animasyon /Yrd. Doç. Dr. Zehra Alakoç Burma |
12) |
Corporate Identity Studies |
What is graphic design/Alice Twemlov Uygulamalı ve Örnekli Grafik ve Animasyon /Yrd. Doç. Dr. Zehra Alakoç Burma |
13) |
Poster Design and Logo Design |
What is graphic design/Alice Twemlov Uygulamalı ve Örnekli Grafik ve Animasyon /Yrd. Doç. Dr. Zehra Alakoç Burma |
14) |
Visual Identity Studies – Project Presentation |
What is graphic design/Alice Twemlov Uygulamalı ve Örnekli Grafik ve Animasyon /Yrd. Doç. Dr. Zehra Alakoç Burma |
|
Program Outcomes |
Level of Contribution |
1) |
Having knowledge and skills in security algorithms for programming |
1 |
1) |
Possesses in-depth theoretical knowledge in information security, cybersecurity, network security, and data protection. |
1 |
2) |
Understands information security management systems, national and international security standards, ethical considerations, and legal regulations. |
|
2) |
Ability to install and manage software required for end user security |
1 |
3) |
Has analytical thinking skills in classifying cyber threats, attack vectors, and defense mechanisms. |
|
3) |
Having the ability to install and manage computer networks and use the network operating system |
1 |
4) |
Theoretically comprehends security technologies such as cryptography, digital signatures, authentication, and access control mechanisms. |
|
5) |
Can establish network security policies and effectively manage security tools such as firewalls and intrusion detection/prevention systems. |
|
6) |
Has expertise in applying cryptographic algorithms, using data encryption techniques, and analyzing cybersecurity intelligence. |
|
7) |
Can conduct penetration tests and security assessments to identify system vulnerabilities and develop preventive measures. |
|