Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | JOB111 | ||||
Course Name: | Stock Exchange and Investment Applications with Yatırım Finansman | ||||
Semester: | Spring | ||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | University Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | E-Learning | ||||
Course Coordinator: | Doç. Dr. ÇİĞDEM GÜRSOY | ||||
Course Lecturer(s): | Dr. Barış Esen | ||||
Course Assistants: |
Course Objectives: | Despite the recent increasing interest in capital markets, financial literacy is quite low. With this course, students will be provided with practical information about the stock market and other capital markets. This course aims to enable students to follow the developments in financial markets more closely. |
Course Content: | This course will start with capital market activities and brokerage houses. Stock transactions at Borsa Istanbul will continue with derivative transactions and foreign transactions. Issues related to portfolio management will also be addressed in the course. Information about investor psychology will also be given in the course. |
The students who have succeeded in this course;
1) Can understand instruments in capital markets. 2) Can understand technological developments regarding financial services 3) Can understand stock transactions in Borsa Istanbul. 4) Understands the functioning of derivative markets. 5) Understand developments regarding foreign markets. 6) Understand investor psychology. |
Week | Subject | Related Preparation |
1) | Introduction to Capital markets | |
2) | Instruments in capital markets | |
3) | Stock transactions at Borsa Istanbul | |
4) | Foreign markets and derivative transactions | |
5) | The impact of macroeconomics on markets. | |
6) | The impact of current economic developments on the stock market. | |
7) | Investor Psychology. | |
8) | Midterm | |
9) | Portfolio management. | |
10) | Selection of shares in the stock market. | |
11) | Investment strategies in the stock market | |
12) | The importance of research in the stock market. | |
13) | Technical analysis | |
14) | The impact of current economic developments on the stock market . | |
15) | Final exam |
Course Notes / Textbooks: | YOK |
References: | Akıllı Yatırımcı - Benjamin Graham Siyah Kuğu - Nassim Nicholas Taleb Paranın Psikolojisi-Morgan Housel |
Course Learning Outcomes | 1 |
2 |
3 |
4 |
5 |
6 |
||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | |
2) | Can install and manage software and hardware required for end user security. | |
3) | Can follow current security products. | |
4) | It can manage both software and people in the environment against cyber attack incidents. | |
5) | Installs the basic software and hardware of the computer. | |
6) | Installs and manages open source operating system and computer networks software. | |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | |
9) | Creates, manages and organizes space on cloud platforms. | |
10) | Firewall software also enables, manages and regulates the installation of hardware. | |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
Semester Requirements | Number of Activities | Level of Contribution |
Midterms | 1 | % 40 |
Final | 1 | % 60 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 40 | |
PERCENTAGE OF FINAL WORK | % 60 | |
total | % 100 |
Activities | Number of Activities | Workload |
Course Hours | 13 | 39 |
Study Hours Out of Class | 3 | 6 |
Midterms | 8 | 24 |
Final | 15 | 44 |
Total Workload | 113 |