TÜRKÇE
Gazi University
Information Package
Home
Information on the Institution
Information on Degree Programmes
Information for Students
HOME
»
GRADUATE SCHOOL OF NATURAL AND APPLIED SCIENCES
» INFORMATION SECURITY ENGINEERING
Programme Information
Qualification Awarded
Course Structure Diagram with Credits
Program Learning Outcomes
Course&Program L. Outcomes
Teaching & Learning Methods
Specific Admission Requirements
Recognition of Prior Learning
Graduation Requirements
Occupational Profiles of Graduates
Access to Further Studies
Examination Regulations, Assessment and Grading
Mode of Study
Profile of the Programme
Programme Director & ECTS Coord.
Search
GAZI UNIVERSITY INFORMATION PACKAGE - 2019 ACADEMIC YEAR
Course&Program L. Outcomes
--The Matrix for Course & Program Learning Outcomes
COURSE
PROGRAM LEARNING OUTCOMES
1
2
3
4
5
6
7
8
9
10
11
12
13
5011339-MACHINE LEARNING AND APPLICATIONS IN INFORMATION SECURITY ENGINEERING
3
3
4
4
4
4
4
5
4
5
4
4
4
5021339-CYBER WARFARE, DEFENSE AND SECURITY
5
4
4
3
3
3
4
3
4
3
3
5
4
5031339-CYBER SECURITY IN SMART GRIDS
4
4
4
4
4
4
5
4
4
4
4
5
5
5041339-NATIONAL AND INTERNATIONAL INFORMATION SECURITY POLICIES
4
5
3
5
5
4
4
4
5
4
4
5
4
5051339-NETWORK FORENSICS
5
5
4
5
4
4
4
4
5
4
5
4
5
5061339-INFORMATION SECURITY APPLICATIONS IN DIGITAL IMAGE & VIDEO PROCESSING
3
3
4
4
4
5
5
4
5
3
3
3
3
5071339-WIRELESS DEVICE SECURITY
3
4
3
4
3
3
3
5
4
5
3
3
3
5081339-BIOMETRIC IDENTIFICATION AND VERIFICATION SYSTEMS
4
4
4
5
3
3
3
4
4
4
4
3
3
5091339-CRITICAL INFRASTRUCTURES AND SECURITY
5
5
4
4
4
4
4
4
4
4
3
3
3
5101339-INFORMATION SECURITY LAW
4
4
4
5
4
4
4
4
4
4
3
4
4
5111339-NEW GENERATION NETWORK SECURITY
5
5
4
5
4
3
2
5
3
3
2
2
3
5121339-INFORMATION SECURITY RISK MANAGEMENT IN MOBILE TECHNOLOGIES
4
4
3
2
4
3
4
5
4
3
4
3
4
5131339-EMBEDDED SYSTEMS SECURITY
4
3
5
5
3
3
4
5
3
3
5
4
3
5141339-CRYPTOGRAPHIC METHODS
3
3
4
4
4
4
4
5
5
4
5
4
4
5151339-APPLICATIONS of DATA MINING for INSTRUSION DETECTION
3
3
3
5
2
3
3
4
3
3
2
4
3
5161339-MEDICAL DATA SECURITY and STEGANOGRAPHY APPLICATIONS
5
5
4
4
4
5
5
4
4
4
4
4
5
5171339-INFORMATION SECURITY and MANAGEMENT
4
5
4
5
5
4
5
5
5
5
5
5
5
5181339-SECURITY in WIRELLES SENSOR NETWORKS
3
3
4
4
4
4
4
5
4
5
4
4
4
5191339-CYBER CRIMES AND COMPUTER FORENSICS
3
5
2
4
3
5
3
5
3
4
3
3
3
5201339-CONTROL in INFORMATION TECHNOLOGY
2
2
3
3
3
3
4
3
5
3
3
5
3
5211339-CYBER SECURITY FUNDAMENTALS
4
3
4
4
2
3
4
4
3
2
4
3
4
5221339-LAW OF COMPUTER FORENSICS
3
3
3
3
2
3
3
3
1
2
2
3
3
5231339-MOBILE MALWARE ANALYSIS
5
5
4
5
5
5
5
4
5
5
4
5
5
5241339-BIG DATA AND PRIVACY
3
4
3
5
3
4
4
5
3
5
1
2
4
5251339-CLOUD COMPUTING SECURITY
2
2
3
3
3
4
4
3
3
3
3
3
4
5261339-GEOPOLITIC DEVELOPMENTS, HYBRID WAR AND CYBER TERROR
5
5
4
5
5
4
5
5
5
4
5
5
4
5908339-PREPARATION for M. Sc. THESIS
1
3
5
1
1
3
4
2
3
3
3
5
2
5928339-M.Sc. THESIS STUDY
3
4
5
4
5
5
5
5
5
5
5
3
4
5988339- M. Sc. SEMINAR
3
3
3
3
1
1
1
1
1
1
5
1
1
Course number related with program competency / 29
29
29
29
29
29
29
29
29
29
29
29
29
29
Program competency weight
105
111
108
117
101
107
113
119
111
107
105
107
106
* Relationship level 0 (none) and 5 (highest) are expressed in.