TÜRKÇE
Gazi University
Information Package
Home
Information on the Institution
Information on Degree Programmes
Information for Students
HOME
»
GRADUATE SCHOOL OF NATURAL AND APPLIED SCIENCES
» INFORMATION SECURITY ENGINEERING
Programme Information
Qualification Awarded
Course Structure Diagram with Credits
Program Learning Outcomes
Course&Program L. Outcomes
Teaching & Learning Methods
Specific Admission Requirements
Recognition of Prior Learning
Graduation Requirements
Occupational Profiles of Graduates
Access to Further Studies
Examination Regulations, Assessment and Grading
Mode of Study
Profile of the Programme
Programme Director & ECTS Coord.
Search
GAZI UNIVERSITY INFORMATION PACKAGE - 2019 ACADEMIC YEAR
Course&Program L. Outcomes
--The Matrix for Course & Program Learning Outcomes
COURSE
PROGRAM LEARNING OUTCOMES
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
5011339-MACHINE LEARNING AND APPLICATIONS IN INFORMATION SECURITY ENGINEERING
4
4
4
4
4
5
5
5
5
4
4
5
5
4
4
5021339-CYBER WARFARE, DEFENSE AND SECURITY
5
4
4
4
3
3
3
4
3
4
3
3
3
5
4
5031339-CYBER SECURITY IN SMART GRIDS
4
4
4
4
5
4
5
5
4
4
4
4
5
4
5
5041339-NATIONAL AND INTERNATIONAL INFORMATION SECURITY POLICIES
4
5
3
5
5
4
4
4
5
4
4
4
3
5
4
5051339-NETWORK FORENSICS
5
4
4
4
5
5
4
4
5
5
4
5
4
5
5
5061339-INFORMATION SECURITY APPLICATIONS IN DIGITAL IMAGE & VIDEO PROCESSING
3
3
4
4
4
5
5
4
5
3
3
3
3
4
4
5071339-WIRELESS DEVICE SECURITY
3
4
3
4
3
3
3
5
4
5
3
3
3
4
3
5081339-BIOMETRIC IDENTIFICATION AND VERIFICATION SYSTEMS
4
4
4
5
3
3
3
4
4
4
3
3
3
4
3
5091339-CRITICAL INFRASTRUCTURES AND SECURITY
5
5
4
4
4
4
4
3
4
2
4
4
3
3
3
5101339-INFORMATION SECURITY LAW
4
5
5
4
5
4
4
4
4
4
4
5
4
4
4
5111339-NEW GENERATION NETWORK SECURITY
5
5
4
5
4
3
2
3
5
2
3
3
2
2
3
5121339-INFORMATION SECURITY RISK MANAGEMENT IN MOBILE TECHNOLOGIES
4
4
3
5
4
3
3
5
4
3
4
5
4
3
5
5131339-EMBEDDED SYSTEMS SECURITY
4
3
5
5
3
3
4
5
3
3
5
4
3
3
3
5141339-CRYPTOGRAPHIC METHODS
3
3
4
4
4
4
4
5
5
4
5
4
5
4
4
5151339-APPLICATIONS of DATA MINING for INSTRUSION DETECTION
3
3
3
5
2
3
3
4
3
3
2
4
3
4
2
5161339-MEDICAL DATA SECURITY and STEGANOGRAPHY APPLICATIONS
5
5
4
4
4
5
5
4
4
4
4
5
5
4
5
5171339-INFORMATION SECURITY and MANAGEMENT
4
5
4
5
5
4
5
5
5
5
5
5
5
5
5
5181339-SECURITY in WIRELLES SENSOR NETWORKS
3
3
4
4
4
4
4
5
4
5
4
4
4
4
4
5191339-CYBER CRIMES AND COMPUTER FORENSICS
3
5
2
4
3
5
3
5
3
4
3
3
3
5
3
5201339-CONTROL in INFORMATION TECHNOLOGY
2
2
3
3
3
3
4
3
5
3
3
3
4
3
5
5211339-CYBER SECURITY FUNDAMENTALS
4
3
4
4
2
3
4
4
3
2
4
3
4
3
5
5221339-LAW OF COMPUTER FORENSICS
3
3
3
3
2
3
3
3
1
2
2
3
3
3
2
5231339-MOBILE MALWARE ANALYSIS
5
5
4
5
5
4
5
5
5
4
5
4
5
5
5
5241339-BIG DATA AND PRIVACY
3
4
3
5
3
4
4
5
3
5
1
2
4
3
2
5251339-CLOUD COMPUTING SECURITY
4
4
5
5
4
5
3
4
3
5
2
4
2
2
3
5261339-GEOPOLITIC DEVELOPMENTS, HYBRID WAR AND CYBER TERROR
5
5
4
5
5
4
5
5
5
4
5
5
5
5
4
5918339-PREPARATION of Ph.D. DISSERTATION
3
3
2
5
1
3
2
1
3
4
5
3
4
3
3
5938339-PH.D. DISSERTATION STUDY
3
4
5
3
5
5
3
5
5
5
3
5
3
5
5
5978339- QUALIFICATION EXAMINATION
3
3
5
5
1
1
2
3
3
4
3
4
2
1
3
6988339-Ph. D. SEMINAR
5
4
5
5
5
4
5
5
5
5
4
3
3
4
4
Course number related with program competency / 30
30
30
30
30
30
30
30
30
30
30
30
30
30
30
30
Program competency weight
115
118
115
131
110
113
113
126
120
115
108
115
109
113
114
* Relationship level 0 (none) and 5 (highest) are expressed in.