<meta http-equiv="refresh" content="0; URL=noscript.html"> METU | Course Syllabus

Program Outcomes Matrix

Program Outcomes Level of Contribution
0 1 2 3
1 leads and manages application and research projects related to the theoretical and methodological approaches on information security.
2 knows fundamental concepts and techniques on enterprise information security management, information security management systems, ethics and information security governance.
3 has in-depth and wide knowledge on cyber systems, operating systems and network security technologies, security risks including their analysis and risk mitigation techniques and methods.
4 applies theoretical and methodical approaches of information security.
5 has knowledge on analysis, design, implementation, and management of information systems requiring information security; uses related principles, methods, and tools.
6 has deep and wide knowledge on cyber security and information security technology at a level to develop advanced applications.
7 develops innovative solutions in the design of cyber security applications, processes, and systems.
8 applies different quantitative and qualitative scientific research methods, has the ability to conduct scientific studies.
9 conducts experimental and applied research.
10 identifies the problems and the underlying causes in their area of expertise, develops methods to solve them, evaluates the results in line with objectives.
11 follows academic literature on cyber security and information technologies; performs critical analysis of the information.
12 works effectively both independently and in multi-disciplinary teams as a team member or leader.
13 pays attention to ethical values and applies them at her professional and scientific studies.
14 presents the recent developments in the field and their work, by supporting with qualitative and quantitative data effectively in written and spoken English and Turkish.


Program Outcomes Level of Contribution
0 1 2 3
1 leads and manages applications and projects related to the theoretical and methodological approaches on information security.
2 has in-depth and wide knowledge to develop information technology and systems with advanced information security aspects.
3 applies theoretical and methodical approaches of information security.
4 knows fundamental concepts and techniques on enterprise information security management, information security management systems, ethics and information security governance.
5 has in-depth and wide knowledge on cyber systems, operating systems and network security technologies, security risks including their analysis and risk mitigation techniques and methods.
6 has knowledge on analysis, design, implementation, and management of information systems requiring information security; uses related principles, methods, and tools.
7 develops innovative solutions in the design of cyber security applications, processes, and systems.
8 knows the recent techniques and methods applied in the information technology and cyber security; knows their impact and results and use them in her studies.
9 analyzes recent technical development and applications, evaluates them and leads learning objectives.
10 identifies the problems and the underlying causes in their area of expertise, develops methods to solve them, evaluates the results in line with objectives.
11 conducts experimental and applied research; solves the complex situations encountered in during the process, evaluates and uses the information.
12 follows academic literature on cyber security and information technologies; performs critical analysis of the information.
13 works effectively both independently and in multi-disciplinary teams as a team member or leader.
14 pays attention to ethical values and applies them at her professional and scientific studies.
15 presents the recent developments in the field and their work, by supporting with qualitative and quantitative data effectively in written and spoken English and Turkish.
0: No Contribution 1: Little Contribution 2: Partial Contribution 3: Full Contribution