Cyber Security Analyst and Operator Associate Program


The information and program qualifications related to the Cyber Security Analyst and Operator Associate Program, under the Department of Computer Technologies of the Cyber Security Vocational School, are summarized below.

Information About The Program

The Presidential Digital Transformation Office and the Council of Higher Education, within the scope of the cooperation protocol signed on October 5, 2022, will open vocational higher education institutions that provide education and training at the associate degree level in the field of cybersecurity. The schools will offer theoretical and practic

Click here for the program's website.
 

Registration Requirements

Admission is carried out in accordance with Article 6 of the Istanbul Technical University Cybersecurity Vocational School Associate Degree Education and Training Regulation. Click here for the relevant regulation.

 

YKS Quotas, Student Success Ranking, Minimum and Maximum Scores for the Last Five Years


Cyber Security Analyst and Operator Associate Program (%30 English)
YearPoint TypeQoataMin PointMax Point
 
2023TYT25452,13698500,32625
2024TYT25456,51172525,43778
YearLowest Success RankingHeighest Success RankingAverage Success Ranking
2023766351816849185
202472154478556033

Cyber Security Analyst and Operator Associate Program (%30 English) Graph of Minimum and Maximum Scores by Year


English Proficiency



Regulations and Guidelines

Regulations and Guidelines


Academic Calendar

Academic Calendar


Course Plans, Prerequisites and Course Equivalence



Course Information



Course Schedules



Course Adjustment and Exemption Procedures

Course adjustment and exemption procedures are carried out in accordance with the Exemption and Adjustment Procedures Regulation of Istanbul Technical University.
Exemption and Adjustment Procedures Regulation


Program Educational Objectives

Cybersecurity Vocational Schools will be established with the primary goals of building competent and qualified workforce in the field of cybersecurity, making cybersecurity an attractive career path for young individuals, and enhancing the concept of cybersecurity expertise through professional qualifications.


Measurement and Evaluation

Student success is evaluated in consideration of Articles 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, and 29 of the Istanbul Technical University Cybersecurity Vocational School Associate Degree Education and Training Regulation. Click here for the relevant regulation.


Internship

This program 40 days contains mandatory intership.


Graduation Requirements

Graduation procedures are carried out in accordance with Article 30 of the Istanbul Technical University Cybersecurity Vocational School Associate Degree Education and Training Regulation. Click here for the relevant regulation.


The Awarded Degree and Title

Degree : Associate    Title : Technician


Program Employment Opportunities

Graduates can find job opportunities in the field of cybersecurity. Many institutions and organizations, including private companies, public entities, banks, information security firms, and more, require the services of cybersecurity experts. Graduates can work in various institutions and organizations, including:

Public institutions and organizations
Critical infrastructure institutions and organizations
Institutions and organizations with information and communication infrastructure and service provision
Financial institutions and organizations
Institutions and organizations responsible for national security
Educational institutions
Health service providers
Institutions and organizations involved in the design and production of cybersecurity software and hardware
Institutions and organizations providing cybersecurity services
All organizations engaged in electronic commerce

Additionally, graduates can advance their careers by participating in certification programs and enhancing their skills and experience.


Number of Graduates

There are no graduates.


Program Outcomes

P.O.1 It conducts analysis to identify security vulnerabilities in information systems and assess potential threats and risks.
P.O.2 It operates in activities to review and improve the organization's existing security policies and procedures.
P.O.3 Monitors abnormal activities in networks and systems, detects attack attempts, and develops protective measures against attacks. It utilizes cybersecurity tools and analyzes cybersecurity incidents for this purpose.
P.O.4 It assesses cybersecurity incidents and determines their priority level. It conducts the necessary analysis and intervention procedures in accordance with the organization's cybersecurity incident management process.
P.O.5 It conducts penetration tests to identify vulnerabilities in the organization's information systems.
P.O.6 In the event of a cybersecurity breach, it promptly and effectively intervenes in accordance with the organization's security incident management process. It investigates the cause of the breach, thwarts attackers based on the incident response scenario, and works to restore affected systems to their previous state.