TEXTILE AND FASHION DESIGN | |||||
Bachelor | TR-NQF-HE: Level 6 | QF-EHEA: First Cycle | EQF-LLL: Level 6 |
Course Code | Course Name | Semester | Theoretical | Practical | Credit | ECTS |
COP4471 | Huawei-Information Security Management | Spring | 3 | 0 | 3 | 6 |
This catalog is for information purposes. Course status is determined by the relevant department at the beginning of semester. |
Language of instruction: | English |
Type of course: | Non-Departmental Elective |
Course Level: | Bachelor’s Degree (First Cycle) |
Mode of Delivery: | Face to face |
Course Coordinator : | Assist. Prof. TARKAN AYDIN |
Course Lecturer(s): |
Assoc. Prof. TEVFİK AYTEKİN |
Course Objectives: | "This course intends to provide an introduction to the increasingly important cyber security issues for academic students on an academic and sectoral basis. It is sustainable through a multidisciplinary approach and, in general, sectoral and technical concepts as well as administrative and political issues are examined in detail. The course aims to ensure that the student programs and careers through case studies, assignments, readings, in-class presentations and exams have sufficient knowledge awareness and managerial competence to ensure that advanced research on information security policy and management is adequate as time progresses. The students who take the course will concentrate on these areas by choosing two areas of expertise (Programming, Cloud Computing, Databases, Web, Operating Systems) within the course and they will gain sectoral and academic competence in the fields." |
The students who have succeeded in this course; 1) To provide effective security, basic concepts of cyber security, key applications and processes, 2) Security issues affecting networks include, but are not limited to, basic network building blocks (such as topologies, protocols, address transformations and services) "3) Basic cryptology and why it is important for computer and information security, 4) The lack of software and the types of security vulnerabilities associated with them 5) How access controls and authentication methods are used to make systems more secure "6) Explanations affecting operating systems and their management, 7) Creating and implementing a risk plan to manage security programs and processes, 8) The key elements of event management in information security, detection, recovery and recovery 9) To transform security into a critical business element for organizational purposes 10) The legal, ethical and regulatory issues shaping Polika development and security implementation, 11) The organizational and social costs of insecure software |
Computer and Information Security, Access Control and Cryptography, Security in Programs and Programming, Web-User Direction in Information Security, Security in |
Week | Subject | Related Preparation |
1) | Introduction to ınformation Security: What is Computer and Information Security? What are the Basic Concepts? | |
2) | Authorization, Access Control and Cryptography | |
3) | Programms and Programming I | |
4) | Programms and Programming II | |
5) | Web and Operating Systems | |
6) | Networks I | |
7) | Networks II | |
8) | Database | |
9) | Cloud Computing | |
10) | Privacy | |
11) | Management Methods and Incidents | |
12) | Legal Issues and Ethics | |
13) | Details of Cryptography | |
14) | New Issues in Information Security |
Course Notes / Textbooks: | "Pfleeger, Charles P., Pfleeger, Shari L., and Margulies, Jonathan. Security in Computing 5th Edition. Upper Saddle River, NJ: Prentice Hall, 2015. Print ISBN:978-0-13-408504-3 (SC) Rice, David. Geekonomics: The Real Cost of Insecure Software. Upper Saddle River, NJ: Pearson Education, 2008. Print ISBN: 978-0-32-21735973 (GS)" |
References: | |
Semester Requirements | Number of Activities | Level of Contribution |
Application | 2 | % 15 |
Homework Assignments | 5 | % 15 |
Midterms | 2 | % 30 |
Final | 1 | % 40 |
Total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 60 | |
PERCENTAGE OF FINAL WORK | % 40 | |
Total | % 100 |
Activities | Number of Activities | Duration (Hours) | Workload |
Course Hours | 3 | 14 | 42 |
Application | 2 | 10 | 20 |
Homework Assignments | 5 | 5 | 25 |
Midterms | 2 | 20 | 40 |
Final | 1 | 25 | 25 |
Total Workload | 152 |
No Effect | 1 Lowest | 2 Low | 3 Average | 4 High | 5 Highest |
Program Outcomes | Level of Contribution | |
1) | Understands the principles of artistic creation and basic design and applies the art and design objects he creates within this framework. | |
2) | Conducts the multifaceted research required for textile and fashion design processes and analyzes and interprets the results. | |
3) | Creates original and applicable fabric, clothing and pattern designs by using elements from different historical periods and cultures in accordance with his purpose. | |
4) | Recognizes textile raw materials and equipments. | |
5) | Uses computer programs effectively in the garment and fabric surface design process. | |
6) | Has professional technical knowledge regarding the implementation of clothing designs and production; In this context, recognizes and uses technological tools and equipment. | |
7) | Understands the importance of interdisciplinary interaction and communication in textile and clothing design-production-presentation processes and reflects this on the processes. | |
8) | Works in a programmed and disciplined manner in professional practices. | |
9) | Realizes the necessity of lifelong learning to maintain his productivity, creativity and professional competence. | |
10) | Understands, adopts and applies ethical responsibilities in professional practices; Has knowledge of relevant legal regulations. | |
11) | Establishes effective visual, written and verbal communication in the field of textile and fashion design. | |
12) | Reflects his knowledge on current and contemporary issues from all fields to his professional theoretical and practical studies on textile and clothing design; Understands the social and universal effects of these issues. | |
13) | Has sufficient awareness about social justice, environmental awareness, quality culture and protection of cultural values. |