Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | UNI194 | ||||
Course Name: | Problem Solving Techniques | ||||
Semester: |
Fall Spring |
||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | University Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | E-Learning | ||||
Course Coordinator: | Dr. Öğr. Üy. TAYFUN UTAŞ | ||||
Course Lecturer(s): | Asst.Prof. Üyesi Tayfun Utaş | ||||
Course Assistants: |
Course Objectives: | This course aims to ensure the smooth flow of the process in product and service processes and to transform it into a culture. This course is to teach students how to prevent and manage the probabilities of problems proactively without problems, instead of understanding the solution after the problem occurs. In addition to teaching modern techniques, the course teaches how to manage as a team by taking into account the basic elements of human management, and to place the culture of integration. |
Course Content: | Problems , matrix systems, team work , problem solving tools , quality tools |
The students who have succeeded in this course;
1) problem solving 2) team works 3) systems |
Week | Subject | Related Preparation |
1) | what is thE PROBLEM ? | PC power point presendations |
2) | Problem solving systems | " |
3) | Decision Making | " |
4) | Lean tools | " |
5) | KAİZEN A3 management | " |
6) | Proces Mnagement | " |
7) | midterm | |
8) | Statistic 7 tool | " |
9) | Statsitic | " |
10) | project management | " |
11) | lean value map workshop | " |
12) | lean value maping workshop -2 | " |
13) | lidership | " |
14) | FMEA | " |
15) | FİNAL EXAM |
Course Notes / Textbooks: | Sunuşlar /presendation |
References: | 7 KALİTE ARACI , SEVEN QUALİTY TOOLS . CA ISBN : 6904464660-56 M.ALTUR |
Course Learning Outcomes | 1 |
2 |
3 |
|||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | |
2) | Can install and manage software and hardware required for end user security. | |
3) | Can follow current security products. | |
4) | It can manage both software and people in the environment against cyber attack incidents. | |
5) | Installs the basic software and hardware of the computer. | |
6) | Installs and manages open source operating system and computer networks software. | |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | |
9) | Creates, manages and organizes space on cloud platforms. | |
10) | Firewall software also enables, manages and regulates the installation of hardware. | |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
Semester Requirements | Number of Activities | Level of Contribution |
Project | 1 | % 50 |
Midterms | 1 | % 20 |
Final | 1 | % 30 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 70 | |
PERCENTAGE OF FINAL WORK | % 30 | |
total | % 100 |
Activities | Number of Activities | Preparation for the Activity | Spent for the Activity Itself | Completing the Activity Requirements | Workload | ||
Course Hours | 14 | 0 | 3 | 42 | |||
Project | 1 | 50 | 50 | ||||
Midterms | 1 | 0 | 10 | 10 | |||
Final | 1 | 20 | 20 | ||||
Total Workload | 122 |