TR EN

General Information

Aim of the Program

Valuable and critical information such as health records, financial transactions, defense and education data is stored and processed on the Internet. Information security technology program to ensure the security of this information, documents and data; It aims to train expert staff who can produce solutions to security problems that may occur.

Target of the Program

Information security policies help protect the confidentiality, integrity and availability of data. The aim of this program is to train expert software developers and technicians who will work as technical support staff to protect important data and ensure the continuity of business and public works. In addition, it aims to train qualified technical support staff who can produce faster and more accurate solutions to information problems that follow the developments in network, mobile, database and web security, software development and security science.

Career Opportunities

Our students from this program should be able to provide internet and e-mail services, have a multi-user computer system, have a computer network, do electronic commerce, do distance education, etc. in organizations; They can work as system security specialist, IT specialist, system support specialist, system and network consultant and internet programmer.

Future of the Department

Recently, attacks and security breaches of information systems have been increasing rapidly. The need for experts in the field of information security has increased as the risks caused by problems such as the increase in cybercrime and the insecurity of e-commerce channels threaten the existence and security of private and public institutions. The analysis of systems and applications in this field is carried out by information security experts.
 
With the effect of the digital revolution in the world, it is predicted that data-based growth will develop in the next 20 years and that all online services will be provided only through data. In our country, issues such as the transfer of information to digital environments, information security, facilitating access to information, digitalization of infrastructures and widespread use of information management systems are becoming increasingly important. Considering the short-term future of artificial intelligence, as the capabilities of the said technology increase, attacks will increase in parallel. At this point, according to experts, it is indispensable to give more importance to artificial intelligence. One of the most basic recommendations is to work with artificial intelligence security experts. The belief that artificial intelligence will develop together with innovative solutions based on the secure integration of digital life is among the promising expectations for the future.

Who Should Choose

First of all, it is necessary to understand the importance of security in human life. We exist in a world where there is a lot of doubt about trust in every area of ??life. For this reason, the danger of losing the things we can do with a single button is a big problem. That's why it's important to specialize. Although we do not think that there is an informatics problem that cannot be solved by properly equipped people, we cannot pass without saying that the follow-up of the developing technology also plays a big role.

Engineering, which can be achieved as a result of being a technician and after being successful in the vertical transfer exam, are also departments that seek numerical talent. Numerical ability does not contain only the ability to perform mathematical operations; It also requires problem solving skills, producing solutions and analytical thinking. In addition to these, imagination, design ability, attention, care and patience, which we can call emotional intelligence, are also very important details to have.

Working Places

Graduates of the information security technology program will gain the title of technician. The job employment field of graduates covers both government institutions and private sector organizations. Information Security Technology graduates;
 
-In government institutions such as hospitals, schools, social security institutions, municipalities, banks
 
- In any institution or organization that provides e-mail service
 
-Technical services
 
-Computer outlets
 
-Data processing units of various stores
 
-Can work in fields such as universities.

Programmes allowing Horizontal Transfer

They can transfer to associate degree programs that accept students with TYT score type.

Programmes allowing Vertical Transfer

1. Computer Engineering
 
2. Computer Technology and Information Systems
 
3. Computer and Instructional Technologies Teaching
 
4. Computer and Software Engineering
 
5. Computer-Informatics
 
6. Information Systems Engineering
 
7. Information Systems and Technologies
 
8. Industrial Engineering
 
9. Physics
 
10. Physics Engineering
 
11. Statistics
 
12. Statistics and Computer Science
 
13. Control and Automation Engineering
 
14. Mathematics and Computer Science
 
15. Mathematics - Computer
 
16. Meteorological Engineering
 
17. Computer Science
 
18. Aerospace Engineering
 
19. Software Engineering