ATA101 Atatürk's Principles and History of Turkish Revolution 1Istinye UniversityDegree Programs Information Security TechnologyGeneral Information For StudentsDiploma SupplementErasmus Policy StatementNational Qualifications
Information Security Technology

Preview

Associate TR-NQF-HE: Level 5 QF-EHEA: Short Cycle EQF-LLL: Level 5

Course Introduction and Application Information

Course Code: ATA101
Course Name: Atatürk's Principles and History of Turkish Revolution 1
Semester: Fall
Course Credits:
ECTS
2
Language of instruction: Turkish
Course Condition:
Does the Course Require Work Experience?: No
Type of course: Compulsory Courses
Course Level:
Associate TR-NQF-HE:5. Master`s Degree QF-EHEA:Short Cycle EQF-LLL:5. Master`s Degree
Mode of Delivery: E-Learning
Course Coordinator: Dr. Öğr. Üy. SUAT EREN ÖZYİĞİT
Course Lecturer(s): Dr. Öğr. Üy. SUAT EREN ÖZYİĞİT
Course Assistants:

Course Objective and Content

Course Objectives: 1)Ensuring understanding of the situation before the Turkish Independence War. Revolution and Principles of Atatürk, Ataturk's ideas, and to give accurate information about the History of the Republic of Turkey. 2)To provide accurate information about threats against Turkey and Ataturk's principles and revolutions.
3)In an indivisible unity of Turkey, Atatürk Revolution and in accordance with the Principles, to unite national targets.
4)To educate and strengthen the students in line with Kemalist thought.
Course Content: The Collapse of the Ottoman Empire, Tanzimat and Reform Edict, I. and II. Constitutional Era, Tripoli and Balkan Wars, Worl War I, Mudros Armistice, War of Independence; Amasya Circular, National Congresses, Establishment of Turkish Grand National Assembly, Declaration of Republic

Learning Outcomes

The students who have succeeded in this course;
1) To be aware of Atatürk's principles and to be knowledgeable about Revolution History.
2) To explain the collapse of the Ottoman Empire and the reasons that make up the Turkish Revolution.
3) To be able to explain the reforms in the Ottoman Empire.
4) To be able to explain the causes and consequences of the Balkan and World War I which caused the collapse of the Ottoman Empire.
5) To be able to explain the reactions to the occupations.
6) To explain the establishment of TGNA and declaration of republic.

Course Flow Plan

Week Subject Related Preparation
1) Initial Reforms of the Ottoman Empire
2) 1839 Tanzimat Era, Reform Edict
3) I. Constitutional Era, II. Abdulhamid Absolutions, Young Ottomans
4) II. Abdulhamid Absolutions and Young Turks
5) II. Constitutional Era
6) Tripoli and Balkan Wars
7) Bab-ı Ali Raid (coup d'etat)
8) Midterm
9) World War I (1914-1916)
10) World War I (1916-1918)
11) Mudros Armistice, Amasya Circular, Congresses
12) War of Independence (1919-1921)
13) War of Independence (1921-1923)
14) Declaration of Republic, Abolishment of Caliphate
15) Final

Sources

Course Notes / Textbooks: Modern Türkiye'nin Doğuşu, Bernard Lewis; Osmanlı İmparatorluğu ve Modern Türkiye II, Stanford J. Shaw&Ezel Kural Shaw.
Emergence of Modern Turkey, Bernard Lewis; Ottoman Empire and Modern Turkey II, Stanford J. Shaw&Ezel Kural Shaw.
References:

Course - Program Learning Outcome Relationship

Course Learning Outcomes

1

2

3

4

5

6

Program Outcomes
1) Has knowledge and skills about creating program algorithms.
2) Can install and manage software and hardware required for end user security.
3) Can follow current security products.
4) It can manage both software and people in the environment against cyber attack incidents.
5) Installs the basic software and hardware of the computer.
6) Installs and manages open source operating system and computer networks software.
7) It manages software, hardware and people in the environment in cyber attack incidents.
8) It creates and organizes the web page and database itself and can scan for vulnerabilities.
9) Creates, manages and organizes space on cloud platforms.
10) Firewall software also enables, manages and regulates the installation of hardware.
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions.
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field.

Course - Learning Outcome Relationship

No Effect 1 Lowest 2 Average 3 Highest
       
Program Outcomes Level of Contribution
1) Has knowledge and skills about creating program algorithms.
2) Can install and manage software and hardware required for end user security.
3) Can follow current security products.
4) It can manage both software and people in the environment against cyber attack incidents.
5) Installs the basic software and hardware of the computer.
6) Installs and manages open source operating system and computer networks software.
7) It manages software, hardware and people in the environment in cyber attack incidents.
8) It creates and organizes the web page and database itself and can scan for vulnerabilities.
9) Creates, manages and organizes space on cloud platforms.
10) Firewall software also enables, manages and regulates the installation of hardware.
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions.
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field.

Assessment & Grading

Semester Requirements Number of Activities Level of Contribution
Midterms 1 % 40
Final 1 % 60
total % 100
PERCENTAGE OF SEMESTER WORK % 40
PERCENTAGE OF FINAL WORK % 60
total % 100

Workload and ECTS Credit Calculation

Activities Number of Activities Workload
Course Hours 14 28
Quizzes 16 16
Midterms 1 1
Final 1 1
Total Workload 46