Information Security Technology
Associate TR-NQF-HE: Level 5 QF-EHEA: Short Cycle EQF-LLL: Level 5

Course Introduction and Application Information

Course Code: MYO006
Course Name: Software Development
Semester: Spring
Course Credits:
ECTS
3
Language of instruction: Turkish
Course Condition:
Does the Course Require Work Experience?: No
Type of course: Departmental Elective
Course Level:
Associate TR-NQF-HE:5. Master`s Degree QF-EHEA:Short Cycle EQF-LLL:5. Master`s Degree
Mode of Delivery: Face to face
Course Coordinator: Öğr. Gör. RAMAZAN ŞEN
Course Lecturer(s): Ramazan ŞEN
Course Assistants:

Course Objective and Content

Course Objectives: These lessons include loops, control structures, arrays, etc. Recognizes the building blocks of programming languages ​​such as. They will also learn how to keep good records of reporting and programming.
Course Content: Basic building blocks of programming, arrays, debugging, version control systems.

Learning Outcomes

The students who have succeeded in this course;
1) Student will be able to define the basic concepts in programming,
2) The student will be able to write programs in Java, compile them and report errors.
3) The student will be able to use control structures (decision and loop statements) in Java.
4) The student will be able to design functions in Java.
5) The student will be able to use Version control systems.

Course Flow Plan

Week Subject Related Preparation
1) How a Computer Works (Memory, CPU, ALU) Timur Karaçay - Yazılım Mühendisliğine Giriş
2) Version Control (git)
3) Programming Best Practices (Naming conventions, packaging)
4) Components of Programming
5) Getting Starting with Primitive Types
6) Working with Strings Lecture notes
7) MIDTERM Lecture notes
8) Control Structures Lecture notes
9) Arrays Lecture notes
10) 2D and Multidimensional Arrays Lecture notes
11) Iteration (Loops) Lecture notes
12) Writing Functions Lecture notes
13) Recursions Lecture notes
14) Debugging Lecture notes
15) FINAL FINAL

Sources

Course Notes / Textbooks: Öğr. Gör. Verileri
References: Öğr. Gör. Verileri

Course - Program Learning Outcome Relationship

Course Learning Outcomes

1

2

3

4

5

Program Outcomes
1) Has knowledge and skills about creating program algorithms. 3 1 1 1 1
2) Can install and manage software and hardware required for end user security. 1 1 1 1 2
3) Can follow current security products. 1 1 1
4) It can manage both software and people in the environment against cyber attack incidents.
5) Installs the basic software and hardware of the computer.
6) Installs and manages open source operating system and computer networks software.
7) It manages software, hardware and people in the environment in cyber attack incidents.
8) It creates and organizes the web page and database itself and can scan for vulnerabilities.
9) Creates, manages and organizes space on cloud platforms.
10) Firewall software also enables, manages and regulates the installation of hardware.
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions.
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field.

Course - Learning Outcome Relationship

No Effect 1 Lowest 2 Average 3 Highest
       
Program Outcomes Level of Contribution
1) Has knowledge and skills about creating program algorithms. 1
2) Can install and manage software and hardware required for end user security. 1
3) Can follow current security products. 1
4) It can manage both software and people in the environment against cyber attack incidents. 1
5) Installs the basic software and hardware of the computer. 1
6) Installs and manages open source operating system and computer networks software. 1
7) It manages software, hardware and people in the environment in cyber attack incidents. 1
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. 1
9) Creates, manages and organizes space on cloud platforms. 1
10) Firewall software also enables, manages and regulates the installation of hardware. 1
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. 1
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. 1

Assessment & Grading

Semester Requirements Number of Activities Level of Contribution
Midterms 1 % 40
Final Pratik 1 % 60
total % 100
PERCENTAGE OF SEMESTER WORK % 100
PERCENTAGE OF FINAL WORK %
total % 100

Workload and ECTS Credit Calculation

Activities Number of Activities Preparation for the Activity Spent for the Activity Itself Completing the Activity Requirements Workload
Course Hours 14 0 0
Laboratory 14 0 0
Study Hours Out of Class 14 0 0
Project 20 0 0
Midterms 1 0 0
Final 1 0 0
Total Workload 0