Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | UNI196 | ||||
Course Name: | Branding in Dietetics | ||||
Semester: | Spring | ||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | University Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | E-Learning | ||||
Course Coordinator: | Dr. YALÇIN YAMAN DURUSOY | ||||
Course Lecturer(s): | Dr.Y.Yaman Durusoy | ||||
Course Assistants: |
Course Objectives: | After graduation, students will step into real life, learn branding and brand value classification and properties. |
Course Content: | The course will be explained and followed from the prepeared booklet. In the general classroom eviroment, questions, answers and discussions will be studied. |
The students who have succeeded in this course;
1) To be able to perceive multi-dimensional in the context of critical thinking cencept. 2) Problem solving and self-expression after proactive participation 3) Understanding the limits of business management 4) To have knowledge about the realities of business life with the knowledge learned. |
Week | Subject | Related Preparation |
1) | What is brand | |
2) | Brandin and Marketing | |
3) | Brand Management | |
4) | Marketing resarch in brand management | |
5) | Positioning | |
6) | Corporate identity and brand expansion | |
7) | General evaluation | |
8) | Midterm Exam | |
9) | Brand creation | |
10) | Brand stories | |
11) | Brand identity and brand image | |
12) | Brand value | |
13) | General evaluation | |
14) | Final exam | |
15) | Final exam | |
16) | Final exam |
Course Notes / Textbooks: | Mirze, K., (2010), İşletme, Literatür Yayınları, İstanbul Akdemir, A., (2012), İşletmeciliğin Temel Bilgileri, Ekin Yayıncılık, Bursa Çavuşoğlu. B.,(2011), Marka Yönetimi ve Pazarlama Stratejileri, Nobel Yayın, Ankara Gümüş. S., Saraç. P., (2013), Pazarlamada Markalaşma Stratejileri, Hiperlink, İstanbul |
References: | Harvard Business Review, Capital, Forbes e-dergiler |
Course Learning Outcomes | 1 |
2 |
3 |
4 |
||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | |
2) | Can install and manage software and hardware required for end user security. | |
3) | Can follow current security products. | |
4) | It can manage both software and people in the environment against cyber attack incidents. | |
5) | Installs the basic software and hardware of the computer. | |
6) | Installs and manages open source operating system and computer networks software. | |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | |
9) | Creates, manages and organizes space on cloud platforms. | |
10) | Firewall software also enables, manages and regulates the installation of hardware. | |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
Semester Requirements | Number of Activities | Level of Contribution |
Midterms | 1 | % 40 |
Final | 1 | % 60 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 40 | |
PERCENTAGE OF FINAL WORK | % 60 | |
total | % 100 |