Information Security Technology
Associate TR-NQF-HE: Level 5 QF-EHEA: Short Cycle EQF-LLL: Level 5

Course Introduction and Application Information

Course Code: MYO064
Course Name: Object-Based Programming
Semester: Spring
Course Credits:
ECTS
3
Language of instruction: Turkish
Course Condition:
Does the Course Require Work Experience?: No
Type of course: Departmental Elective
Course Level:
Associate TR-NQF-HE:5. Master`s Degree QF-EHEA:Short Cycle EQF-LLL:5. Master`s Degree
Mode of Delivery: Face to face
Course Coordinator: Öğr. Gör. RAMAZAN ŞEN
Course Lecturer(s): Ramazan ŞEN
Course Assistants:

Course Objective and Content

Course Objectives: It is aimed to comprehend the basic concepts of object-oriented software architecture, which is a modeling of real life, and to raise awareness about the relationships between entities in the life pattern consisting of objects.
Course Content: In order to programmatically model real life patterns, the necessary definitions, techniques and approaches to analyze and define assets, create their hierarchies and create a space within the scope of the project are examined in a multidisciplinary manner and the created designs are converted into software code. C# is used as a software development tool.

Learning Outcomes

The students who have succeeded in this course;

Course Flow Plan

Week Subject Related Preparation

Sources

Course Notes / Textbooks: Öğr. El. Notları
References: Öğr. El. Notları

Course - Program Learning Outcome Relationship

Course Learning Outcomes
Program Outcomes
1) Has knowledge and skills about creating program algorithms.
2) Can install and manage software and hardware required for end user security.
3) Can follow current security products.
4) It can manage both software and people in the environment against cyber attack incidents.
5) Installs the basic software and hardware of the computer.
6) Installs and manages open source operating system and computer networks software.
7) It manages software, hardware and people in the environment in cyber attack incidents.
8) It creates and organizes the web page and database itself and can scan for vulnerabilities.
9) Creates, manages and organizes space on cloud platforms.
10) Firewall software also enables, manages and regulates the installation of hardware.
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions.
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field.

Course - Learning Outcome Relationship

No Effect 1 Lowest 2 Average 3 Highest
       
Program Outcomes Level of Contribution
1) Has knowledge and skills about creating program algorithms. 1
2) Can install and manage software and hardware required for end user security. 1
3) Can follow current security products. 1
4) It can manage both software and people in the environment against cyber attack incidents. 1
5) Installs the basic software and hardware of the computer. 1
6) Installs and manages open source operating system and computer networks software. 1
7) It manages software, hardware and people in the environment in cyber attack incidents. 1
8) It creates and organizes the web page and database itself and can scan for vulnerabilities.
9) Creates, manages and organizes space on cloud platforms. 1
10) Firewall software also enables, manages and regulates the installation of hardware. 2
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. 1
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. 1

Assessment & Grading

Semester Requirements Number of Activities Level of Contribution
total %
PERCENTAGE OF SEMESTER WORK % 0
PERCENTAGE OF FINAL WORK %
total %