Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | UNI349 | ||||
Course Name: | Current Research in Cancer | ||||
Semester: | Spring | ||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | University Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | E-Learning | ||||
Course Coordinator: | Doç. Dr. HURİ DEDEAKAYOĞULLARI | ||||
Course Lecturer(s): | Huri Bulut | ||||
Course Assistants: |
Course Objectives: | To give information about the definition of cancer, its formation and development mechanisms, and the latest developments in cancer research. |
Course Content: | Gains analytical and critical thinking skills related to cancer. |
The students who have succeeded in this course;
1) Will be able to explain the molecular biology, formation mechanisms and types of cancer. 2) Defines the cell cycle and cell checkpoints. 3) Explain the protooncogene, oncogene and tumor suppressor genes. 4) It can explain antiapoptotic mechanisms and metastasis events in cancer. 5) Explain the role of oxidant systems in cancer formation. 6) Explain the role of antioxidant defense system in cancer mechanism. 7) Explains current treatment methods in cancer. |
Week | Subject | Related Preparation |
1) | Cancer Cells and Cancer | Oxford Textbook of Cancer Biology |
2) | Mutations in Cancer-1 | Oxford Textbook of Cancer Biology |
3) | Mutations in Cancer-2 | Oxford Textbook of Cancer Biology, 2019 |
4) | Free radicals and cancer | Oxford Textbook of Cancer Biology, 2019 |
4) | Free radicals and cancer | Oxford Textbook of Cancer Biology, 2019 |
Course Notes / Textbooks: | Oxford Textbook of Cancer Biology, 2nd edition, 2019 Öğretim Üyesine ait ders notları |
References: | Oxford Textbook of Cancer Biology, 2nd edition, 2019 Öğretim Üyesine ait ders notları |
Course Learning Outcomes | 1 |
2 |
3 |
4 |
5 |
6 |
7 |
|||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | |
2) | Can install and manage software and hardware required for end user security. | |
3) | Can follow current security products. | |
4) | It can manage both software and people in the environment against cyber attack incidents. | |
5) | Installs the basic software and hardware of the computer. | |
6) | Installs and manages open source operating system and computer networks software. | |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | |
9) | Creates, manages and organizes space on cloud platforms. | |
10) | Firewall software also enables, manages and regulates the installation of hardware. | |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
Semester Requirements | Number of Activities | Level of Contribution |
Homework Assignments | 1 | % 60 |
Seminar | 1 | % 40 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 100 | |
PERCENTAGE OF FINAL WORK | % | |
total | % 100 |
Activities | Number of Activities | Preparation for the Activity | Spent for the Activity Itself | Completing the Activity Requirements | Workload | ||
Course Hours | 1 | 0 | 14 | 14 | 28 | ||
Study Hours Out of Class | 3 | 6 | 6 | 6 | 54 | ||
Homework Assignments | 3 | 6 | 6 | 6 | 54 | ||
Total Workload | 136 |