BİLİŞİM GÜVENLİĞİ TEKNOLOJİSİ | |||||
---|---|---|---|---|---|
Qualification Awarded | Program Süresi | Toplam Kredi (AKTS) | Öğretim Şekli | Yeterliliğin Düzeyi ve Öğrenme Alanı | |
Associate (Short Cycle) Degree | 2 | 120 | FULL TIME |
TYÇ, TR-NQF-HE, EQF-LLL, ISCED (2011):Level 5 QF-EHEA:Short Cycle TR-NQF-HE, ISCED (1997-2013): 48,52 |
Course Code: | 2000002022 | ||||||||||
Ders İsmi: | Computer Hardware | ||||||||||
Ders Yarıyılı: | Spring | ||||||||||
Ders Kredileri: |
|
||||||||||
Language of instruction: | TR | ||||||||||
Ders Koşulu: | |||||||||||
Ders İş Deneyimini Gerektiriyor mu?: | No | ||||||||||
Other Recommended Topics for the Course: | None | ||||||||||
Type of course: | Bölüm Seçmeli | ||||||||||
Course Level: |
|
||||||||||
Mode of Delivery: | Face to face | ||||||||||
Course Coordinator : | Öğr.Gör. Esma TAYRAN | ||||||||||
Course Lecturer(s): | |||||||||||
Course Assistants: |
Course Objectives: | Knowing the hardware structure of the computer and the functions of computer components; Being able to test, maintain, simple repair and assemble computer components; To know occupational health and safety, ergonomics and customer relationship management issues in IT. |
Course Content: | Fundamentals of Computer Hardware; Processors; Motherboards; BIOS and CMOS; Memory Units; Expansion Slots; Connection Interfaces; Storage Units; Screens; Printers; Other Hardware Units; PC Components Assembly; Troubleshooting and Quality Standards; Occupational Safety and Ergonomics in the Working Environment. |
The students who have succeeded in this course;
|
Week | Subject | Related Preparation |
1) | Computer Hardware Fundamentals | Bilgisayar Donanımı, E-ders Notları, Özkan CANAY, Sakarya Üniversitesi, 2015 |
2) | Processors | Bilgisayar Donanımı, E-ders Notları, Özkan CANAY, Sakarya Üniversitesi, 2015 |
3) | Motherboards | Bilgisayar Donanımı, E-ders Notları, Özkan CANAY, Sakarya Üniversitesi, 2015 |
4) | BIOS and CMOS | Bilgisayar Donanımı, E-ders Notları, Özkan CANAY, Sakarya Üniversitesi, 2015 |
5) | Memory Units | Bilgisayar Donanımı, E-ders Notları, Özkan CANAY, Sakarya Üniversitesi, 2015 |
6) | Expansion Slots | Bilgisayar Donanımı, E-ders Notları, Özkan CANAY, Sakarya Üniversitesi, 2015 |
7) | Connection Interfaces | Bilgisayar Donanımı, E-ders Notları, Özkan CANAY, Sakarya Üniversitesi, 2015 |
8) | Midterm | Bilgisayar Donanımı, E-ders Notları, Özkan CANAY, Sakarya Üniversitesi, 2015 |
9) | Storage Units | Bilgisayar Donanımı, E-ders Notları, Özkan CANAY, Sakarya Üniversitesi, 2015 |
10) | Screens | Bilgisayar Donanımı, E-ders Notları, Özkan CANAY, Sakarya Üniversitesi, 2015 |
11) | Printers | Bilgisayar Donanımı, E-ders Notları, Özkan CANAY, Sakarya Üniversitesi, 2015 |
12) | Other Hardware Units | Bilgisayar Donanımı, E-ders Notları, Özkan CANAY, Sakarya Üniversitesi, 2015 |
13) | PC Components Assembly | Bilgisayar Donanımı, E-ders Notları, Özkan CANAY, Sakarya Üniversitesi, 2015 |
14) | Troubleshooting and Quality Standards | Bilgisayar Donanımı, E-ders Notları, Özkan CANAY, Sakarya Üniversitesi, 2015 |
15) | Occupational Safety and Ergonomics in the Working Environment | Bilgisayar Donanımı, E-ders Notları, Özkan CANAY, Sakarya Üniversitesi, 2015 |
Course Notes / Textbooks: | Bilgisayar Donanımı, E-ders Notları, Özkan CANAY, Sakarya Üniversitesi, 2015 |
References: | Canay Ö., Güngörsün T., “Bilgisayar Donanımı ve Bileşenleri”, ss.358, Değişim Yayınları, 2016, ISBN 978-605-4925-91-9 Yaşar E., Bilgisayar Donanımı, Ekin Kitabevi Yayınları, 2018 |
Ders Öğrenme Kazanımları | 1 |
3 |
2 |
||||||
---|---|---|---|---|---|---|---|---|---|
Program Outcomes | |||||||||
1) Having knowledge and skills in security algorithms for programming | |||||||||
1) Possesses in-depth theoretical knowledge in information security, cybersecurity, network security, and data protection. | |||||||||
2) Understands information security management systems, national and international security standards, ethical considerations, and legal regulations. | |||||||||
2) Ability to install and manage software required for end user security | |||||||||
3) Has analytical thinking skills in classifying cyber threats, attack vectors, and defense mechanisms. | |||||||||
3) Having the ability to install and manage computer networks and use the network operating system | |||||||||
4) Theoretically comprehends security technologies such as cryptography, digital signatures, authentication, and access control mechanisms. | |||||||||
5) Can establish network security policies and effectively manage security tools such as firewalls and intrusion detection/prevention systems. | |||||||||
6) Has expertise in applying cryptographic algorithms, using data encryption techniques, and analyzing cybersecurity intelligence. | |||||||||
7) Can conduct penetration tests and security assessments to identify system vulnerabilities and develop preventive measures. |
No Effect | 1 Lowest | 2 Low | 3 Average | 4 High | 5 Highest |
Program Outcomes | Level of Contribution | |
1) | Having knowledge and skills in security algorithms for programming | 4 |
1) | Possesses in-depth theoretical knowledge in information security, cybersecurity, network security, and data protection. | 3 |
2) | Understands information security management systems, national and international security standards, ethical considerations, and legal regulations. | |
2) | Ability to install and manage software required for end user security | 4 |
3) | Has analytical thinking skills in classifying cyber threats, attack vectors, and defense mechanisms. | |
3) | Having the ability to install and manage computer networks and use the network operating system | 3 |
4) | Theoretically comprehends security technologies such as cryptography, digital signatures, authentication, and access control mechanisms. | |
5) | Can establish network security policies and effectively manage security tools such as firewalls and intrusion detection/prevention systems. | |
6) | Has expertise in applying cryptographic algorithms, using data encryption techniques, and analyzing cybersecurity intelligence. | |
7) | Can conduct penetration tests and security assessments to identify system vulnerabilities and develop preventive measures. |
Bireysel çalışma ve ödevi | |
Course | |
Homework |
Yazılı Sınav (Açık uçlu sorular, çoktan seçmeli, doğru yanlış, eşleştirme, boşluk doldurma, sıralama) | |
Homework | |
Sunum |
Semester Requirements | Number of Activities | Level of Contribution |
Homework Assignments | 1 | % 20 |
Midterms | 1 | % 40 |
Semester Final Exam | 1 | % 40 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 60 | |
PERCENTAGE OF FINAL WORK | % 40 | |
total | % 100 |
Activities | Number of Activities | Duration (Hours) | Workload |
Course Hours | 15 | 3 | 45 |
Study Hours Out of Class | 10 | 2 | 20 |
Homework Assignments | 1 | 5 | 5 |
Midterms | 1 | 15 | 15 |
Final | 1 | 15 | 15 |
Total Workload | 100 |