<meta http-equiv="refresh" content="0; URL=noscript.html"> METU | Course Syllabus

Program Outcomes Matrix

Program Outcomes Level of Contribution
0 1 2 3
1 leads and manages application and research projects related to the theoretical and methodological approaches on information security. X
2 knows fundamental concepts and techniques on enterprise information security management, information security management systems, ethics and information security governance. X
3 has in-depth and wide knowledge on cyber systems, operating systems and network security technologies, security risks including their analysis and risk mitigation techniques and methods. X
4 applies theoretical and methodical approaches of information security. X
5 has knowledge on analysis, design, implementation, and management of information systems requiring information security; uses related principles, methods, and tools. X
6 has deep and wide knowledge on cyber security and information security technology at a level to develop advanced applications. X
7 develops innovative solutions in the design of cyber security applications, processes, and systems. X
8 applies different quantitative and qualitative scientific research methods, has the ability to conduct scientific studies. X
9 conducts experimental and applied research. X
10 identifies the problems and the underlying causes in their area of expertise, develops methods to solve them, evaluates the results in line with objectives. X
11 follows academic literature on cyber security and information technologies; performs critical analysis of the information. X
12 works effectively both independently and in multi-disciplinary teams as a team member or leader. X
13 pays attention to ethical values and applies them at her professional and scientific studies. X
14 presents the recent developments in the field and their work, by supporting with qualitative and quantitative data effectively in written and spoken English and Turkish. X


Program Outcomes Level of Contribution
0 1 2 3
1 leads and manages applications and projects related to the theoretical and methodological approaches on information security. X
2 has in-depth and wide knowledge to develop information technology and systems with advanced information security aspects. X
3 applies theoretical and methodical approaches of information security. X
4 knows fundamental concepts and techniques on enterprise information security management, information security management systems, ethics and information security governance. X
5 has in-depth and wide knowledge on cyber systems, operating systems and network security technologies, security risks including their analysis and risk mitigation techniques and methods. X
6 has knowledge on analysis, design, implementation, and management of information systems requiring information security; uses related principles, methods, and tools. X
7 develops innovative solutions in the design of cyber security applications, processes, and systems. X
8 knows the recent techniques and methods applied in the information technology and cyber security; knows their impact and results and use them in her studies. X
9 analyzes recent technical development and applications, evaluates them and leads learning objectives. X
10 identifies the problems and the underlying causes in their area of expertise, develops methods to solve them, evaluates the results in line with objectives. X
11 conducts experimental and applied research; solves the complex situations encountered in during the process, evaluates and uses the information. X
12 follows academic literature on cyber security and information technologies; performs critical analysis of the information. X
13 works effectively both independently and in multi-disciplinary teams as a team member or leader. X
14 pays attention to ethical values and applies them at her professional and scientific studies. X
15 presents the recent developments in the field and their work, by supporting with qualitative and quantitative data effectively in written and spoken English and Turkish. X
0: No Contribution 1: Little Contribution 2: Partial Contribution 3: Full Contribution