Technology of Information Security / جامعة بيكوز

موقعك : اسطنبول/ تكنولوجيا أمن المعلومات / المستوى: الزمالة/ المدة: 2 سنة / لغة الدراسة : تركي/ نوع الدراسة : دوام كامل، نظامي/ رسم التعليم: 2.250 دولار أمريكي / رسوم مخفضة: 1.800 دولار أمريكي


Information security is the processes and tools designed to protect sensitive information from invasion. Today more and more information is processed, stored, transported and archived in digital media.

The aim of the Information Security Technology Programme at Beykoz University is to educate qualified and well-equipped professionals who can use current software languages and respond with theoretical and practical skills to the needs of institutions and organizations who need the right workforce to use the right technologies in the right way, in order to profit, provide added value, create competition and provide corporate sustainability.

Students who graduate from this programme will find employment at processing centres and software firms. They will be able to work as system security specialist, computing specialist, system support specialist, system and network consultant or programmer.

The Technology of Information Security Associate Degree Programme Graduates; will be equipped and competent in the field of information security technology and have 21st-century competencies in line with the expectations of the sector.

The graduates will be able to produce algorithmic thinking, analytical methods and solutions by using new generation cyber security tools and software and they will be knowledgeable in the cyber security risk management systems.

The graduates will be equipped with knowledge of the corporate cyber security rules and guidelines, information security procedures, non-technological tools and methods against cyber-attack.

The graduates will know the national and international legislation and regulations related to the field of Information Security Technology and have the skills to identify and prevent any exploitation of hardware. They will be able to identify and prevent any abuse that may occur in software components or in local area networks.

Submit Your Query
Have a Query? Send it to us.

    من اجل المزيد
    من المعلومات؟



    يرجى منك، من أجل الحصول على المزيد من المعلومات بشأن هذه الجامعة أو البرنامج، ملء القسيمة الموجودة أدناه.


    من خلال قيامك بإرسال هذه القسيمة ، فإنك توافق على قيام بوابة studyportalturkey بإستعمال ومشاركة المعلومات التي قدمتها إلينا هنا، جنبًا إلى جنب مع اسمك وعنوان بريدك الإلكتروني ورقم هاتفك مع الجامعة وإلى قيام الجامعة بالإتصال بك.



    وبالتسجيل فإنك توافق على سياسة الخصوصية الخاصة بنا.privacy policy