Graduate Seminar I (SEC 551)

2019 Spring
Faculty of Engineering and Natural Sciences
Security(SEC)
0
1
Michel Lavrauw mlavrauw@sabanciuniv.edu,
Click here to view.
Doctoral, Master
--
Click here to view.

CONTENT

PROGRAMME OUTCOMES


1. Develop and deepen the current and advanced knowledge in the field with original thought and/or research and come up with innovative definitions based on Master's degree qualifications 2

2. Conceive the interdisciplinary interaction which the field is related with ; come up with original solutions by using knowledge requiring proficiency on analysis, synthesis and assessment of new and complex ideas. 3

3. Evaluate and use new information within the field in a systematic approach. 3

4. Develop an innovative knowledge, method, design and/or practice or adapt an already known knowledge, method, design and/or practice to another field; research, conceive, design, adapt and implement an original subject. 1

5. Critical analysis, synthesis and evaluation of new and complex ideas. 3

6. Gain advanced level skills in the use of research methods in the field of study. 3

7. Contribute the progression in the field by producing an innovative idea, skill, design and/or practice or by adapting an already known idea, skill, design, and/or practice to a different field independently. 1

8. Broaden the borders of the knowledge in the field by producing or interpreting an original work or publishing at least one scientific paper in the field in national and/or international refereed journals. 1

9. Demonstrate leadership in contexts requiring innovative and interdisciplinary problem solving. 2

10. Develop new ideas and methods in the field by using high level mental processes such as creative and critical thinking, problem solving and decision making. 3

11. Investigate and improve social connections and their conducting norms and manage the actions to change them when necessary. 1

12. Defend original views when exchanging ideas in the field with professionals and communicate effectively by showing competence in the field. 1

13. Ability to communicate and discuss orally, in written and visually with peers by using a foreign language at least at a level of European Language Portfolio C1 General Level. 2

14. Contribute to the transition of the community to an information society and its sustainability process by introducing scientific, technological, social or cultural improvements. 1

15. Demonstrate functional interaction by using strategic decision making processes in solving problems encountered in the field. 1

16. Contribute to the solution finding process regarding social, scientific, cultural and ethical problems in the field and support the development of these values. 1


1. Develop the ability to use critical, analytical, and reflective thinking and reasoning 2

2. Reflect on social and ethical responsibilities in his/her professional life. 1

3. Gain experience and confidence in the dissemination of project/research outputs 2

4. Work responsibly and creatively as an individual or as a member or leader of a team and in multidisciplinary environments. 1

5. Communicate effectively by oral, written, graphical and technological means and have competency in English. 3

6. Independently reach and acquire information, and develop appreciation of the need for continuously learning and updating. 3


1. Design and model engineering systems and processes and solve engineering problems with an innovative approach. 1

2. Establish experimental setups, conduct experiments and/or simulations. 1

3. Analytically acquire and interpret data. 1


1. To have acquired basic theoretical knowledge and technical infrastructure in the field of cyber security, 5

2. To have developed a deep experience and understanding on the basic methods and human-induced and techinal weaknesses followed by the existing and future cyber attacks, threats and counterfeiting, 5

3. To be able to analyze an IT infrastructure comprehensively and to determine risk by monitoring the existing weaknesses and to determine a cyber security strategy, 1

4. To take the necessary measures to prevent possible costs and destruction during the occurrence of cyber attacks, 5

5. To be able to use current cyber security software tools and related software for professional purposes 1