The information and program qualifications related to the Cyber Security Analyst and Operator Associate Program, under the Department of Computer Technologies of the Cyber Security Vocational School, are summarized below.
Information About The Program
The Presidential Digital Transformation Office and the Council of Higher Education, within the scope of the cooperation protocol signed on October 5, 2022, will open vocational higher education institutions that provide education and training at the associate degree level in the field of cybersecurity. The schools will offer theoretical and practic
Click here for the program's website.
Registration Requirements
Admission is carried out in accordance with Article 6 of the Istanbul Technical University Cybersecurity Vocational School Associate Degree Education and Training Regulation.
Click here for the relevant regulation.
YKS Quotas, Student Success Ranking, Minimum and Maximum Scores for the Last Five Years
Cyber Security Analyst and Operator Associate Program (%30 English)
Year | Point Type | Qoata | Min Point | Max Point |
2023 | TYT | 25 | 452,13698 | 500,32625 |
2024 | TYT | 25 | 456,51172 | 525,43778 |
Year | Lowest Success Ranking | Heighest Success Ranking | Average Success Ranking |
2023 | 76635 | 18168 | 49185 |
2024 | 72154 | 4785 | 56033 |
Cyber Security Analyst and Operator Associate Program (%30 English) Graph of Minimum and Maximum Scores by Year
English Proficiency
Regulations and Guidelines
Academic Calendar
Course Plans, Prerequisites and Course Equivalence
Course Information
Course Schedules
Course Adjustment and Exemption Procedures
Program Educational Objectives
Cybersecurity Vocational Schools will be established with the primary goals of building competent and qualified workforce in the field of cybersecurity, making cybersecurity an attractive career path for young individuals, and enhancing the concept of cybersecurity expertise through professional qualifications.
Measurement and Evaluation
Student success is evaluated in consideration of Articles 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, and 29 of the Istanbul Technical University Cybersecurity Vocational School Associate Degree Education and Training Regulation.
Click here for the relevant regulation.
Internship
This program 40 days contains mandatory intership.
Graduation Requirements
Graduation procedures are carried out in accordance with Article 30 of the Istanbul Technical University Cybersecurity Vocational School Associate Degree Education and Training Regulation.
Click here for the relevant regulation.
The Awarded Degree and Title
Degree : Associate Title : Technician
Program Employment Opportunities
Graduates can find job opportunities in the field of cybersecurity. Many institutions and organizations, including private companies, public entities, banks, information security firms, and more, require the services of cybersecurity experts. Graduates can work in various institutions and organizations, including:
Public institutions and organizations
Critical infrastructure institutions and organizations
Institutions and organizations with information and communication infrastructure and service provision
Financial institutions and organizations
Institutions and organizations responsible for national security
Educational institutions
Health service providers
Institutions and organizations involved in the design and production of cybersecurity software and hardware
Institutions and organizations providing cybersecurity services
All organizations engaged in electronic commerce
Additionally, graduates can advance their careers by participating in certification programs and enhancing their skills and experience.
Number of Graduates
There are no graduates.
Program Outcomes
P.O.1 It conducts analysis to identify security vulnerabilities in information systems and assess potential threats and risks.
P.O.2 It operates in activities to review and improve the organization's existing security policies and procedures.
P.O.3 Monitors abnormal activities in networks and systems, detects attack attempts, and develops protective measures against attacks. It utilizes cybersecurity tools and analyzes cybersecurity incidents for this purpose.
P.O.4 It assesses cybersecurity incidents and determines their priority level. It conducts the necessary analysis and intervention procedures in accordance with the organization's cybersecurity incident management process.
P.O.5 It conducts penetration tests to identify vulnerabilities in the organization's information systems.
P.O.6
In the event of a cybersecurity breach, it promptly and effectively intervenes in accordance with the organization's security incident management process. It investigates the cause of the breach, thwarts attackers based on the incident response scenario, and works to restore affected systems to their previous state.