Fundamentals of Computing (SEC 500)

2019 Fall
Faculty of Engineering and Natural Sciences
Security(SEC)
3
6
Albert Levi levi@sabanciuniv.edu,
Click here to view.
Doctoral, Master
--
Click here to view.

CONTENT

-Introduction to Programming -Computers -Operating Systems -Software Stack -Computer Architectures -User Interface -Storage, Database Systems -Networking

PROGRAMME OUTCOMES


1. Develop the ability to use critical, analytical, and reflective thinking and reasoning 4

2. Reflect on social and ethical responsibilities in his/her professional life. 1

3. Gain experience and confidence in the dissemination of project/research outputs 1

4. Work responsibly and creatively as an individual or as a member or leader of a team and in multidisciplinary environments. 1

5. Communicate effectively by oral, written, graphical and technological means and have competency in English. 2

6. Independently reach and acquire information, and develop appreciation of the need for continuously learning and updating. 2


1. Design and model engineering systems and processes and solve engineering problems with an innovative approach. 4

2. Establish experimental setups, conduct experiments and/or simulations. 2

3. Analytically acquire and interpret data. 3


1. To have acquired basic theoretical knowledge and technical infrastructure in the field of cyber security 2

2. To have developed a deep experience and understanding on the basic methods and human-induced and techinal weaknesses followed by the existing and future cyber attacks, threats and counterfeiting 2

3. To be able to analyze an IT infrastructure comprehensively and to determine risk by monitoring the existing weaknesses and to determine a cyber security strategy 1

4. To take the necessary measures to prevent possible costs and destruction during the occurrence of cyber attacks, 1

5. To be able to use current cyber security software tools and related software for professional purposes, 2

6. To follow the cyber security intelligence news and to combine and analyze data from different sources to take measures for preventing or reducing the prospective cyber attacks, 1

7. To be able to take preventive measures to hinder possible drawbacks by creating a deep understanding and awareness in legal, ethical and social aspects of protecting the security and privacy of personal and corporate data. 1