The information and program qualifications related to the Cyber Security Analyst and Operator Associate Program, under the Department of Computer Technologies of the Cyber Security Vocational School, are summarized below.
Information About The Program
The Presidential Digital Transformation Office and the Council of Higher Education, within the scope of the cooperation protocol signed on October 5, 2022, will open vocational higher education institutions that provide education and training at the associate degree level in the field of cybersecurity. The schools will offer theoretical and practic
Click here for the program's website.
Active Student Count
Program Profile
The ITU Cyber Security Vocational School was established under the cooperation protocol signed between the Digital Transformation Office of the Presidency and the Council of Higher Education on October 5, 2022. In a rapidly digitalizing world, the primary purpose of the program is to meet Turkiye’s need for a qualified cyber security workforce, to transform cyber security into a sustainable career path for young people, and to establish cyber security expertise as a recognized and prestigious professional identity.
Our program possesses an innovative vision where theoretical knowledge is blended with practical application:
Industry-Oriented Education Model
The program implements a 3+1 education model, which allows students to receive full-time vocational training in the industry during their final semester. A strong foundation for university-industry collaboration has been laid by signing internship cooperation protocols with leading IT and cyber security companies.
Modern and Dynamic Curriculum
Shaped by the expertise of our academic staff and industry requirements, the educational content covers critical subjects such as network security, web security, mobil application security, database security, machine learning.
Artificial Intelligence Integration
Updating the curriculum in line with advancements in Artificial Intelligence (AI) and ensuring the full, ethical and effective integration of AI into education are among the program's top priorities.
Innovation and Entrepreneurship
Beyond technical skills, the program strongly supports guiding students into the entrepreneurship ecosystem and helping them become successful entrepreneurs.
In the long term, the ITU Cyber Security Vocational School aims to become a center of excellence that brings together education, practice and innovation in the field of cyber security.
Registration Requirements
Admission is carried out in accordance with Article 6 of the Istanbul Technical University Cybersecurity Vocational School Associate Degree Education and Training Regulation.
Click here for the relevant regulation.
Program Learning Environments
The ITU Cyber Security Vocational School provides students comprehensive physical, virtual and sector-integrated learning environments where they can translate theoretical knowledge into practical skills.
A) Physical Laboratories and Collaborative Workspaces:
1) BeeSecure Lab: A versatile cyber security laboratory supported by Baykar Technology, equipped with 25 student computers and an instructor terminal.
2) General Purpose Cyber Security Laboratory: A fully equipped facility utilized for departmental courses and dedicated preparation for cyber security competitions such as CTFs.
3) Student-Club Room: A designated physical workspace that fosters a culture of collaboration, allowing students to conduct individual research and execute team-based projects.
B) Virtual and Advanced Technological Infrastructures:
1) EVE-NG Based Virtual Environment: Provides an advanced platform for students to safely simulate, test and analyze complex network architectures and cyber security scenarios on virtual systems.
C) Sectoral and Interactive Learning Ecosystems:
1) Industry Field Environments: Through extensive internship cooperation protocols established with 12 leading IT and cyber security companies, students gain the opportunity to experience real-world problem-solving directly in the professional field.
2) Competition and Event Platforms: Ecosystems such as ITU CTF vulnerability detection competitions and CyberCon events serve as interactive platforms where students engage with industry professionals and hone their technical skills.
YKS Quotas, Student Success Ranking, Minimum and Maximum Scores for the Last Five Years
Cyber Security Analyst and Operator Associate Program (%30 English)
| Year | Point Type | Qoata | Min Point | Max Point |
| 2023 | TYT | 25 | 452,13698 | 500,32625 |
| 2024 | TYT | 25 | 456,51172 | 525,43778 |
| 2025 | TYT | 25 | 443,45729 | 485,87446 |
| Year | Lowest Success Ranking | Heighest Success Ranking | Average Success Ranking |
| 2023 | 76635 | 18168 | 49185 |
| 2024 | 72154 | 4785 | 56033 |
| 2025 | 63131 | 14186 | 45970 |
Cyber Security Analyst and Operator Associate Program (%30 English) Graph of Minimum and Maximum Scores by Year
English Proficiency
Regulations and Guidelines
Academic Calendar
Course Plans, Prerequisites and Course Equivalence
Course Information
Course Schedules
Course Adjustment and Exemption Procedures
Program Educational Objectives
Cybersecurity Vocational Schools will be established with the primary goals of building competent and qualified workforce in the field of cybersecurity, making cybersecurity an attractive career path for young individuals, and enhancing the concept of cybersecurity expertise through professional qualifications.
Measurement and Evaluation
Student success is evaluated in consideration of Articles 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, and 29 of the Istanbul Technical University Cybersecurity Vocational School Associate Degree Education and Training Regulation.
Click here for the relevant regulation.
Internship
This program 40 days contains mandatory intership.
Graduation Requirements
Graduation procedures are carried out in accordance with Article 30 of the Istanbul Technical University Cybersecurity Vocational School Associate Degree Education and Training Regulation.
Click here for the relevant regulation.
The Awarded Degree and Title
Degree : Associate Title : Technician
Program Employment Opportunities
Graduates can find job opportunities in the field of cybersecurity. Many institutions and organizations, including private companies, public entities, banks, information security firms, and more, require the services of cybersecurity experts. Graduates can work in various institutions and organizations, including:
Public institutions and organizations
Critical infrastructure institutions and organizations
Institutions and organizations with information and communication infrastructure and service provision
Financial institutions and organizations
Institutions and organizations responsible for national security
Educational institutions
Health service providers
Institutions and organizations involved in the design and production of cybersecurity software and hardware
Institutions and organizations providing cybersecurity services
All organizations engaged in electronic commerce
Additionally, graduates can advance their careers by participating in certification programs and enhancing their skills and experience.
Number of Graduates
There are no graduates from 2025 or earlier. The 2026 graduate numbers have not yet been transferred to this page.
Program Outcomes
P.O.1 It conducts analysis to identify security vulnerabilities in information systems and assess potential threats and risks.
P.O.2 It operates in activities to review and improve the organization's existing security policies and procedures.
P.O.3 Monitors abnormal activities in networks and systems, detects attack attempts, and develops protective measures against attacks. It utilizes cybersecurity tools and analyzes cybersecurity incidents for this purpose.
P.O.4 It assesses cybersecurity incidents and determines their priority level. It conducts the necessary analysis and intervention procedures in accordance with the organization's cybersecurity incident management process.
P.O.5 It conducts penetration tests to identify vulnerabilities in the organization's information systems.
P.O.6
In the event of a cybersecurity breach, it promptly and effectively intervenes in accordance with the organization's security incident management process. It investigates the cause of the breach, thwarts attackers based on the incident response scenario, and works to restore affected systems to their previous state.
Turkish Qualifications Database
The qualification has not yet been incorporated into the TYÇ.