Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
1 - Knowledge |
Theoretical - Conceptual |
1) Can install and manage software and hardware required for end user security. |
2) Can follow current security products. |
3) It can manage both software and people in the environment against cyber attack incidents. |
4) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
2 - Skills |
Cognitive - Practical |
1) Has knowledge and skills about creating program algorithms. |
2) Installs the basic software and hardware of the computer. |
3) Installs and manages open source operating system and computer networks software. |
4) It manages software, hardware and people in the environment in cyber attack incidents. |
5) It creates and organizes the web page and database itself and can scan for vulnerabilities. |
6) Creates, manages and organizes space on cloud platforms. |
7) Firewall software also enables, manages and regulates the installation of hardware. |
8) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. |
3 - Competences |
Communication and Social Competence |
Learning Competence |
Field Specific Competence |
Competence to Work Independently and Take Responsibility |
Program Outcomes | TR-NQF-HE 5 (Associate) Level Descriptors | TR-NQF-HE Main Field Descriptors 48 - Computing |
TR-NQF-HE Main Field Descriptors 86 - Security services |
1 - Knowledge | |||
Theoretical - Conceptual | |||
1) Can install and manage software and hardware required for end user security. 2) Can follow current security products. 3) It can manage both software and people in the environment against cyber attack incidents. 4) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
1) Possess theoretical and practical knowledge supported by textbooks with updated information, practice equipments and other resource on basic level based on qualifications gained at secondary education level. |
1) Matematik, hesaplama ve bilgisayar bilimleri konularında temel kuramsal ve uygulamalı bilgilere sahiptir. |
|
2 - Skills | |||
Cognitive - Practical | |||
1) Has knowledge and skills about creating program algorithms. 2) Installs the basic software and hardware of the computer. 3) Installs and manages open source operating system and computer networks software. 4) It manages software, hardware and people in the environment in cyber attack incidents. 5) It creates and organizes the web page and database itself and can scan for vulnerabilities. 6) Creates, manages and organizes space on cloud platforms. 7) Firewall software also enables, manages and regulates the installation of hardware. 8) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. |
1) Gain the skills to use basic level theoretical and practical knowledge acquired within the field in the same field of a higher education level or in a field of same level. 2) Interpret and evaluate data, define problems, do analysis, produce solutions based on proof with using basic level knowledge and practices gained within the field. |
1) Tanımlanan bilişim ve/veya bilgisayar bilimleri problemlerini ve modellerini kurgular ve temel çözüm önerilerini uygular. 2) Algoritmik düşünme ve planlama yaklaşımını uygulamalarında kullanır. 3) Belirtimleri (spesifikasyon) tanımlanmış yazılım bileşenlerini geliştirir. |
|
3 - Competences | |||
Communication and Social Competence | |||
1) Transfer the ideas based on the basic knowledge and skills acquired within the field through written and oral communication. 2) Share the ideas and solution proposals to problems about issues within the field with professionals and non-professionals. 3) Monitor the developments in the field and communicate with peers by using a foreign language at least at a level of European Language Portfolio A2 General Level. 4) Use informatics and communication technologies with at least a minimum level of European Computer Driving License Basic Level software knowledge. |
1) Sözlü ve yazılı iletişim kurar; en az bir yabancı dili en az Avrupa Dil Portföyü A2 Genel Düzeyinde kullanır, bilişim ve bilgisayar bilimleri alanındaki bilgileri izler ve meslektaşları ile iletişim kurar. |
||
Learning Competence | |||
1) Evaluate the acquired knowledge and skills at basic level within the field with a critical approach, determine and respond to learning needs. 2) Direct the education received to a higher education level in the same field or to an occupation in the same level. 3) Gain awareness of lifelong learning. |
1) Yaşam boyu öğrenmenin gerekliliği bilinci ile bilgi ve iletişim teknolojilerindeki güncel gelişmeleri izler. |
||
Field Specific Competence | |||
1) Possess social, scientific, cultural and ethic values on the stages of gathering, implementation and release of the results of data related to the field. 2) Possess sufficient consciousness about the issues of universality of social rights, social justice, quality, cultural values and also, environmental protection, worker's health and security. |
1) Mesleki ve etik sorumluluk bilinci taşır, bilişim uygulamalarında meslek etiğinin gözetilmesi konusunda farkındalığa sahiptir. |
||
Competence to Work Independently and Take Responsibility | |||
1) Conduct studies at basic level within the field independently. 2) Take responsibility as a team member in order to solve unexpected complex problems faced in the implementations within the field. 3) Conduct activities towards the development of subordinates within a project. |
1) Bireysel olarak veya takımlarda etkin çalışır. |
1) Has knowledge and skills about creating program algorithms. |
2) Can install and manage software and hardware required for end user security. |
3) Can follow current security products. |
4) It can manage both software and people in the environment against cyber attack incidents. |
5) Installs the basic software and hardware of the computer. |
6) Installs and manages open source operating system and computer networks software. |
7) It manages software, hardware and people in the environment in cyber attack incidents. |
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. |
9) Creates, manages and organizes space on cloud platforms. |
10) Firewall software also enables, manages and regulates the installation of hardware. |
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. |
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |