Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | UNI017 | ||||
Course Name: | Communication Methods | ||||
Semester: | Fall | ||||
Course Credits: |
|
||||
Language of instruction: | |||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | University Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | Face to face | ||||
Course Coordinator: | Öğr. Gör. VEHBİ DOĞAN | ||||
Course Lecturer(s): | Öğr.Gör.Fatih CAYMAZ | ||||
Course Assistants: |
Course Objectives: | The aim of this course is to make students aware of the types and types of communication and to inform them about their importance in social life. Also; It is aimed to increase both personal and corporate achievements thanks to their effective communication skills. Lesson; The course aims to improve students' ability to think, analyze and discuss in the field of communication. |
Course Content: | In the content of the course, the concept of communication, communication tools and types of communication take place in both historical and social process. In addition, the students' communication skills and practices to improve the use of the course is covered. |
The students who have succeeded in this course;
1) Have information about the concept of communication. 2) Learn and define the types of communication. 3) Learn and use effective communication and presentation methods. |
Week | Subject | Related Preparation |
1) | Basic information about the concept of communication | |
2) | History of Communication, Communication and Language, Objectives and Functions in Communication, Communication Tools, Communication Disciplines. Communication Process and Elements, Basic Characteristics of Communication | |
3) | Communication and Information, How Do We Communicate? Types of Communication: Verbal-Nonverbal Communication. Written Communication-Visual Communication. Communication with the Person, Interpersonal Communication | |
4) | Communication Types: Group Communication | |
5) | TCommunication Types: Organizational / Corporate Communication | |
6) | Conflict Management. Active Listening | |
7) | Public Communication. International Communication. Mass Communication | |
8) | Midterm Exam | |
9) | Effective Communication Techniques, Body Language | |
10) | Effective Presentation Techniques | |
11) | Main Communication Theories Developed by Mainstream Approaches | |
12) | Group Presentations I | |
13) | Group Presentations II | |
14) | Group Presentations III | |
15) | Final Exam |
Course Notes / Textbooks: | Ünsal Oskay, İletişimin ABC’si, İnkilap Kitaevi, 2017. |
References: | Aysel Aziz, İletişime Giriş, Hiperlink, 2016. Levent Yaylagül, Kitle İletişim Kuramları, Egemen ve Eleştirel Yaklaşımlar, Dipnot Yayınları, 2016. Deniz McQuail&Sven Windahl, Kitle İletişim Modelleri, İmge Kitapevi, 2010. |
Course Learning Outcomes | 1 |
2 |
3 |
|||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | |
2) | Can install and manage software and hardware required for end user security. | |
3) | Can follow current security products. | |
4) | It can manage both software and people in the environment against cyber attack incidents. | |
5) | Installs the basic software and hardware of the computer. | |
6) | Installs and manages open source operating system and computer networks software. | |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | |
9) | Creates, manages and organizes space on cloud platforms. | |
10) | Firewall software also enables, manages and regulates the installation of hardware. | |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
Semester Requirements | Number of Activities | Level of Contribution |
Homework Assignments | 1 | % 30 |
Midterms | 1 | % 30 |
Final | 1 | % 40 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 60 | |
PERCENTAGE OF FINAL WORK | % 40 | |
total | % 100 |
Activities | Number of Activities | Preparation for the Activity | Spent for the Activity Itself | Completing the Activity Requirements | Workload | ||
Course Hours | 14 | 1 | 2 | 42 | |||
Study Hours Out of Class | 15 | 2 | 30 | ||||
Homework Assignments | 1 | 15 | 15 | ||||
Midterms | 1 | 10 | 1 | 11 | |||
Final | 1 | 15 | 1 | 16 | |||
Total Workload | 114 |