Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | UNI291 | ||||
Course Name: | Holistic Approach in Science | ||||
Semester: |
Fall Spring |
||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | Yes | ||||
Type of course: | University Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | E-Learning | ||||
Course Coordinator: | Dr. Öğr. Üy. EBRU NUR AY | ||||
Course Lecturer(s): | Asst. Prof. Ebru Nur AY | ||||
Course Assistants: |
Course Objectives: | This course aims to teach a holistic approach model in science and to raise awareness about the subject, especially among researchers. In addition, it also aims to ensure that our students can approach holistic perspective and methodology for his/her future scientific studies in their research field. |
Course Content: | An elective course that provides a holistic perspective in science, research approaches, and methodologies skills. It is a weekly 2-hour course. |
The students who have succeeded in this course;
1) What is science? defines the answer to the question. 2) Understands the Importance of Scientific Knowledge and the Role of Scientist. 3) Knows what Research Methods and Techniques are and tries to apply them. 5) Defines and tries to apply the Qualitative Research Approach. 6) Gains knowledge about Multiple Holistic Information Models. |
Week | Subject | Related Preparation |
1) | Introduction to the Course, Objective of the Course and Learning Objectives | Lecturer notes |
2) | What is Science? | Lecturer notes |
3) | The Importance of Scientific Knowledge and the Role of Scientists | Lecturer notes |
4) | Research Methods and Techniques | Lecturer notes |
5) | Qualitative Research Approach I | Lecturer notes |
6) | Qualitative Research Approach II | Lecturer notes |
7) | Multiple Holistic Information Models | Lecturer notes |
8) | Midterm exam | |
9) | Student presentation | |
10) | Student presentation | |
11) | Student presentation | |
12) | Student presentation | |
13) | Student presentation | |
14) | Student presentation |
Course Notes / Textbooks: | Öğretim üyesi notları/ Instructor notes |
References: | Öğretim üyesi notları/ Instructor notes |
Course Learning Outcomes | 1 |
2 |
3 |
5 |
6 |
|||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | |
2) | Can install and manage software and hardware required for end user security. | |
3) | Can follow current security products. | |
4) | It can manage both software and people in the environment against cyber attack incidents. | |
5) | Installs the basic software and hardware of the computer. | |
6) | Installs and manages open source operating system and computer networks software. | |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | |
9) | Creates, manages and organizes space on cloud platforms. | |
10) | Firewall software also enables, manages and regulates the installation of hardware. | |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
Semester Requirements | Number of Activities | Level of Contribution |
Presentation | 1 | % 60 |
Midterms | 1 | % 40 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 100 | |
PERCENTAGE OF FINAL WORK | % | |
total | % 100 |
Activities | Number of Activities | Workload |
Course Hours | 7 | 14 |
Study Hours Out of Class | 13 | 52 |
Presentations / Seminar | 6 | 12 |
Homework Assignments | 13 | 39 |
Midterms | 1 | 1 |
Total Workload | 118 |