Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | UNI031 | ||||
Course Name: | Technological Transformation in Defense Industry | ||||
Semester: |
Fall Spring |
||||
Course Credits: |
|
||||
Language of instruction: | |||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | University Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | Face to face | ||||
Course Coordinator: | Prof. Dr. FAHRİ ERENEL | ||||
Course Lecturer(s): | Prof.Dr. Fahri Erenel | ||||
Course Assistants: |
Course Objectives: | To create awareness by explaining the developments in our national defense industry to our students, to make them proud of the level reached by our country, to reveal different options for career road maps. |
Course Content: | To examine the development process of our national defense industry, the legislation, human resources, organizational structure and financial resources of our defense industry, to analyze the necessity of a domestic and national defence industry with students, the defense industry. To provide information about the trainings given in our country, to examine technology and Resources and Development Management Activities, to analyze the project management process, clustering and completed project processes, to introduce warfare, weapons and tools. |
The students who have succeeded in this course;
1) Knowing why a national and domestic defence industry is necessary. 2) Analysing how the level of our industry reached its currect situation within the historical process. 3) Being informed about the projects carried out under the concept of project management. 4) Knowing the activities of Resources and Development Management Activities and technology management. 5) Knowing how to monitor and analyse developments in the field of defense industry |
Week | Subject | Related Preparation |
1) | -Information on how the course is processed -The evolution of war -The development process of our defense industry | |
2) | -Definition of defense industry, market characteristics of defense industry, characteristics of defense industry products, characteristics of defense industry firms, importance of defense industry | |
3) | -Our defense industry facilities and export capacity | |
4) | -Human resources management and needs in defense industry | |
5) | - Resources and Development Management Activities and technology management in defense industry | |
6) | -Introducing our original land warfare weapons and vehicles (Altay tank, storm howitzes, national infantry rifle, etc.) | |
7) | An Overview | |
8) | Midterm Exam | |
9) | Introducing our original air warfare weapons and vehicles (attack helicopter, unmanned aerial vehicles, etc.) | |
10) | - Introducing the original naval warfare weapons and vehicles (National ship, Anatolian amphibian ship, etc.) | |
11) | -Robotic systems and artificial intelligence studies | |
12) | - Cyber security | |
13) | - Military of the future | |
14) | - Anti-terrorism, Euphrates Shield and Olive branch operation and weapon systems | |
15) | An Overview | |
16) | Final Exam |
Course Notes / Textbooks: | Savunma Sanayi Başkanlığı Web Sayfası Defence Industry Directorate Web Page Savunma Teknolojileri Merkezi Web Sayfası Defence Technology Center Web Page |
References: | Savunma Sanayi Alanı İle İlgili Web Sayfaları Web pages related to defense industry area |
Course Learning Outcomes | 1 |
2 |
3 |
4 |
5 |
|||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | |
2) | Can install and manage software and hardware required for end user security. | |
3) | Can follow current security products. | |
4) | It can manage both software and people in the environment against cyber attack incidents. | |
5) | Installs the basic software and hardware of the computer. | |
6) | Installs and manages open source operating system and computer networks software. | |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | |
9) | Creates, manages and organizes space on cloud platforms. | |
10) | Firewall software also enables, manages and regulates the installation of hardware. | |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
Semester Requirements | Number of Activities | Level of Contribution |
Attendance | 14 | % 10 |
Homework Assignments | 1 | % 15 |
Midterms | 1 | % 30 |
Final | 1 | % 45 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 55 | |
PERCENTAGE OF FINAL WORK | % 45 | |
total | % 100 |
Activities | Number of Activities | Preparation for the Activity | Spent for the Activity Itself | Completing the Activity Requirements | Workload | ||
Course Hours | 14 | 3 | 42 | ||||
Study Hours Out of Class | 14 | 3 | 42 | ||||
Presentations / Seminar | 4 | 2 | 8 | ||||
Homework Assignments | 1 | 8 | 8 | ||||
Quizzes | 2 | 2 | 4 | ||||
Midterms | 1 | 4 | 4 | ||||
Final | 1 | 6 | 6 | ||||
Total Workload | 114 |