Information Security Technology
Course Details

KTO KARATAY UNIVERSITY
Trade and Industry Vocational School
Programme of Information Security Technology
Course Details
Trade and Industry Vocational School
Programme of Information Security Technology
Course Details

| Course Code | Course Name | Year | Period | Semester | T+A+L | Credit | ECTS |
|---|---|---|---|---|---|---|---|
| 08121102 | Current Technologies in Computer | 1 | Spring | 2 | 2+2+0 | 5 | 5 |
| Course Type | Elective |
| Course Cycle | Associate (Short Cycle) (TQF-HE: Level 5 / QF-EHEA: Short Cycle / EQF-LLL: Level 5) |
| Course Language | Turkish |
| Methods and Techniques | 1. Theoretical Explanation: Topics are explained theoretically within the course. Students listen to lectures to understand the fundamental concepts of programming and the logic of algorithms. 2. Practical Activities: Students, under the guidance of the course instructor, practice various examples to put the theoretical concepts into practice. They strive to achieve specific learning outcomes. 3. Step-by-Step Solution: Problems encountered are solved step-by-step, explaining how each step works. This method helps students gain a deeper understanding of the topics. 4. Real-Life Examples: Real-life examples and problem scenarios are presented to enhance understanding of the topics. This allows students to see how to apply what they have learned in practice. |
| Mode of Delivery | Face to Face |
| Prerequisites | Dersin herhangi bir ön koşulu bulunmamaktadır. Tüm öğrencilere temel seviyeden başlanarak eğitim verilmektedir. |
| Coordinator | - |
| Instructor(s) | Lect. Ayşe Merve BÜYÜKBAŞ |
| Instructor Assistant(s) | - |
Course Instructor(s)
| Name and Surname | Room | E-Mail Address | Internal | Meeting Hours |
|---|---|---|---|---|
| Lect. Ayşe Merve BÜYÜKBAŞ | C-127 | [email protected] | 7436 | Wednesday 10:00-12:00 |
Course Content
This course; Introduction to the course, historical development and current trends of computer technologies, Recent developments in hardware and software, Fundamentals of artificial intelligence (AI) and machine learning, Deep learning, natural language processing (NLP) and image processing applications, Big data and data analytics technologies, Cloud computing and virtualization technologies, Internet of Things (IoT) concept, sensor technologies and application areas, Cybersecurity, data privacy and ethical principles, Blockchain technology and cryptocurrencies, Augmented reality (AR), virtual reality (VR) and mixed reality applications, 5G, quantum computing and next-generation communication technologies, Current software development trends (AI-supported tools, low-code platforms, etc.), Future technologies, professional and societal impacts, and general evaluation topics are included.
Objectives of the Course
The Current Technologies in Informatics course aims to introduce students to the latest innovations and developments in the field of informatics and to help them understand the rapidly changing trends in the world of technology. Within the scope of this course, students will explore current technologies such as cloud computing, artificial intelligence, big data, the internet of things (IoT), blockchain, cybersecurity and 5G, and analyze the potential impacts of these technologies on the business world, social structure and the future. At the end of the course, students will have mastered the latest developments in informatics, understand the basic principles of these technologies and have the necessary knowledge infrastructure to develop innovative projects.
Contribution of the Course to Field Teaching
| Basic Vocational Courses | X |
| Specialization / Field Courses | |
| Support Courses | |
| Transferable Skills Courses | |
| Humanities, Communication and Management Skills Courses |
Relationships between Course Learning Outcomes and Program Outcomes
| Relationship Levels | ||||
| Lowest | Low | Medium | High | Highest |
| 1 | 2 | 3 | 4 | 5 |
| # | Program Learning Outcomes | Level |
|---|---|---|
| P1 | He/she has basic, current and practical knowledge about his/her profession. | 5 |
| P3 | Follows current developments and practices for his/her profession and uses them effectively. | 4 |
| P6 | Can effectively present thoughts through written and verbal communication at the level of knowledge and skills and express them in an understandable manner. | 3 |
| P12 | Explains and applies techniques for network and internet security and protection against cyber threats. | 2 |
Course Learning Outcomes
| Upon the successful completion of this course, students will be able to: | |||
|---|---|---|---|
| No | Learning Outcomes | Outcome Relationship | Measurement Method ** |
| O1 | P.1.1 | 1,2 | |
| O2 | P.1.2 | 1,2,7 | |
| O3 | P.3.1 | 1,2,7 | |
| O4 | P.3.4 | 1,2 | |
| O5 | P.12.1 | 1,2 | |
| O6 | P.6.2 | 2,5 | |
| O7 | P.6.4 | 1,2 | |
| ** Written Exam: 1, Oral Exam: 2, Homework: 3, Lab./Exam: 4, Seminar/Presentation: 5, Term Paper: 6, Application: 7 | |||
Weekly Detailed Course Contents
| Week | Topics |
|---|---|
| 1 | The course introduction covers the historical development and current trends in computer technologies |
| 2 | Recent developments in hardware and software, fundamentals of artificial intelligence (AI) and machine learning |
| 3 | Deep learning |
| 4 | Natural language processing (NLP) and image processing applications |
| 5 | Big data and data analytics technologies |
| 6 | Cloud computing and virtualization technologies |
| 7 | The concept of the Internet of Things (IoT), sensor technologies and their application areas |
| 8 | Midterm Exam |
| 9 | Cybersecurity, data privacy, and ethical principles |
| 10 | Blockchain technology and cryptocurrencies |
| 11 | Augmented reality (AR), virtual reality (VR), and mixed reality applications |
| 12 | 5G, quantum computing, and next-generation communication technologies |
| 13 | Current software development trends (AI-enabled tools, low-code platforms, etc.). |
| 14 | Future technologies, professional and societal impacts, and general assessment |
| 15 | Final Exam |
Textbook or Material
| Resources | Notes shared by the course instructor |
Evaluation Method and Passing Criteria
| In-Term Studies | Quantity | Percentage |
|---|---|---|
| Attendance | - | - |
| Laboratory | - | - |
| Practice | - | - |
| Field Study | - | - |
| Course Specific Internship (If Any) | - | - |
| Homework | - | - |
| Presentation | - | - |
| Projects | - | - |
| Seminar | - | - |
| Quiz | - | - |
| Listening | - | - |
| Midterms | 1 | 40 (%) |
| Final Exam | 1 | 60 (%) |
| Total | 100 (%) | |
ECTS / Working Load Table
| Quantity | Duration | Total Work Load | |
|---|---|---|---|
| Course Week Number and Time | 14 | 8 | 112 |
| Out-of-Class Study Time (Pre-study, Library, Reinforcement) | 0 | 0 | 0 |
| Midterms | 1 | 14 | 14 |
| Quiz | 0 | 0 | 0 |
| Homework | 0 | 0 | 0 |
| Practice | 14 | 1 | 14 |
| Laboratory | 0 | 0 | 0 |
| Project | 0 | 0 | 0 |
| Workshop | 0 | 0 | 0 |
| Presentation/Seminar Preparation | 0 | 0 | 0 |
| Fieldwork | 0 | 0 | 0 |
| Final Exam | 1 | 10 | 10 |
| Other | 0 | 0 | 0 |
| Total Work Load: | 150 | ||
| Total Work Load / 30 | 5 | ||
| Course ECTS Credits: | 5 | ||
Course - Learning Outcomes Matrix
| Relationship Levels | ||||
| Lowest | Low | Medium | High | Highest |
| 1 | 2 | 3 | 4 | 5 |
| # | Learning Outcomes | P1 | P3 | P6 | P12 |
|---|---|---|---|---|---|
| O1 | Bilişim güvenliği temel kavramlarını tanımlar. | - | - | - | - |
| O2 | Bilgisayar ve güvenliği hakkında bilgi sahibidir. | - | - | - | - |
| O3 | Alanındaki yenilikleri ve gelişmeleri düzenli olarak takip eder ve mesleki gelişimine uygular. | - | - | - | - |
| O4 | Güncel siber tehditler hakkında bilgi sahibidir. | - | - | - | - |
| O5 | Topluluk önünde kendinden emin bir şekilde konuşur ve sunum yapar. | - | - | - | - |
| O6 | Mesleki terminolojiyi doğru kullanır. | - | - | - | - |
| O7 | Ağ ve internet güvenliğinin temel kavramlarını tanımlar ve işlevlerini açıklar. | - | - | - | - |
