Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | BGT107 | ||||
Course Name: | Basic Programming (Python) | ||||
Semester: | Fall | ||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | Compulsory Courses | ||||
Course Level: |
|
||||
Mode of Delivery: | Face to face | ||||
Course Coordinator: | Öğr. Gör. RAMAZAN ŞEN | ||||
Course Lecturer(s): | Lecturer Kemal OLÇA | ||||
Course Assistants: |
Course Objectives: | To apply algorithmic thinking method, to be able to design software in line with the demands with Python programming language and to convert this design into a software product. |
Course Content: | - Flow charts and Algorithms, - Programming Languages developments and Python - Comment Lines, Variables, Data Types and Operators - Basic Functions - Conditional and Logical Expressions - Loop Structures - Lists And Features - Functions, Global and Local Variables - Dictionaries And Bundles - Working with Files - Advanced Data Structures - Working with modules - Error Catching and Exceptions - Object-oriented programming |
The students who have succeeded in this course;
1) Ability to design algorithms 2) Ability to analyze algorithms 3) Being able to use the Python programming language 4) Being able to create functions in Python programming language 5) Ability to select the appropriate data structure during software 6) Ability to program object-oriented software 7) To be able to develop software in line with the demands |
Week | Subject | Related Preparation |
1) | Flow charts and Algorithms | |
2) | Programming Languages developments and Python | |
3) | Comment Lines, Variables, Data Types and Operators | |
4) | Basic Functions | |
5) | Conditional and Logical Expressions | |
6) | Loop Structures | |
7) | Lists And Features | |
8) | Functions, Global and Local Variables | |
9) | Dictionaries and Bundles | |
10) | Working with Files | |
11) | Advanced Data Structures | |
12) | Working with modules | |
13) | Error Catching and Exceptions | |
14) | Object-oriented programming | |
15) | Final Exam | |
16) | Final Exam |
Course Notes / Textbooks: | Sıfırdan Uzmanlığa Python Programlama - Atıl Samancıoğlu UNIKOD |
References: | Python Programlama Dili Prof. Dr. Mithat Uysal NİRVANA YAYINLARI Python 3 Veri Yapıları Prof. Dr. Timur Çay - Seçkin Her Yönüyle Python Fırat Özgül Kodlab Python Eğitim Kitabı - Volkan Taşçı Dikeyeksen Yayın Dağıtım |
Course Learning Outcomes | 1 |
2 |
3 |
4 |
5 |
6 |
7 |
|||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | 1 | 1 | 1 | 1 | 1 | 1 | 1 | |||||
2) Can install and manage software and hardware required for end user security. | 1 | 1 | 1 | 1 | 1 | 1 | 1 | |||||
3) Can follow current security products. | 1 | 1 | ||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | 1 |
2) | Can install and manage software and hardware required for end user security. | 1 |
3) | Can follow current security products. | 1 |
4) | It can manage both software and people in the environment against cyber attack incidents. | 1 |
5) | Installs the basic software and hardware of the computer. | 1 |
6) | Installs and manages open source operating system and computer networks software. | 1 |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | 1 |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | 1 |
9) | Creates, manages and organizes space on cloud platforms. | 1 |
10) | Firewall software also enables, manages and regulates the installation of hardware. | 1 |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | 1 |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. | 1 |
Semester Requirements | Number of Activities | Level of Contribution |
Attendance | 14 | % 0 |
Application | 14 | % 0 |
Homework Assignments | 3 | % 20 |
Midterms | 1 | % 30 |
Final | 1 | % 50 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 50 | |
PERCENTAGE OF FINAL WORK | % 50 | |
total | % 100 |
Activities | Number of Activities | Workload |
Course Hours | 14 | 56 |
Application | 14 | 28 |
Homework Assignments | 3 | 15 |
Midterms | 1 | 11 |
Final | 1 | 15 |
Total Workload | 125 |