IT 411-Syllabus in Information Technology

edelynbergantin 19 views 8 slides Aug 17, 2024
Slide 1
Slide 1 of 8
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8

About This Presentation

syllabus


Slide Content

BIT International College
City of Tagbilaran
S Y L L A B U S
Issue Date : Prepared by: Reviewed by: Approved by:
Revision Status: MRS. EDELYN A. BERGANTIN ENGR. DIOSDADO B. POJAS JR.ENGR. LIBERATO H. LUPOT JR. CE, PhD
Revision Date: Instructor IT-Program Chair Dean, CET
COLLEGE :College of Engineering and Technology
COURSE CODE :IT 311
COURSE TITLE :Information Assurance & Security I
COURSE DESCRIPTION :This course provides an in-depth understanding of information assurance and security principles. Students will learn
about various security threats, vulnerabilities, and risk management strategies. Topics include network security,
cryptography, access control, security policies, and incident response. The course aims to equip students with the
knowledge and skills to protect information assets and ensure the confidentiality, integrity, and availability of data.
PRE-REQUISITE :CS 221
CO-REQUISITE :None
CREDIT UNIT(S) :3 units (2 hrs. lecture) 1 unit (lab.)
CLASS SCHEDULE :
QUALITY POLICY, VISION, MISSION AND CORE VALUES
QUALITY POLICY
BIT International College is committed to provide EXCELLENCE in Administration & in Teaching-Learning Environment and SERVICE to the community through a
dynamic quality management system.
VISION
Bastion of Intelligence, Technology, Innovation and Competence: A Groundwork to University Status
MISSION
Building an Individual’s Tomorrow
CORE VALUES
Benevolence, Industry, Trustworthy, Innovative, Competence
BIT IC ACA Form 010/Rev 1/09-11-18

GRADUATE ATTRIBUTES OF A BIT IC’ian INSTITUTIONAL LEARNING OUTCOMES
Benevolent and committed to community service a. Apply moral and ethical standards in leading others
b. Initiate the creation of, and participate actively in, community-oriented advocacies that contribute to
community development and nation building
Industrious, motivated and articulate communicator d. Express ideas effectively using proper, polite and technically correct language
e. Initiate projects that make an impact to communities
Technology-literate f. Utilize technology at work with ease
g. Continue to improve skills in using technology at work
Innovative and critical thinker h. Apply problem-solving skills
i. Produce alternative solutions, processes, and approaches to problem-solving
Competent, life- and career-skilled individual j. Apply the standards and practices of their major or program of study
k. Engage in continuing personal and professional development
PROGRAM LEARNING OUTCOMES
Common to All CET Programs
Engage in lifelong learning and understanding of the need to keep abreast of the developments in engineering and technology practice;
Communicate orally and in writing;
Work independently and in multi-disciplinary and multi-cultural teams.;
Act in recognition and practice of professional, social, and ethical accountability and responsibility;
Apply knowledge in mathematics, science and technology in solving problems related to the profession and the workplace;
Evaluate the impact and implications of various contemporary issues in the global and social context of the profession.
Use appropriate techniques, skills and modern tools in the practice of the profession in order to remain globally competitive;
Conduct research using appropriate research methodologies; and
Participate in various types of employment, development activities, and public discourses particularly in response to the needs of the community one serves.
BSITE Learning Outcomes
a.Identify, formulate, and apply knowledge of mathematics and science to solve complex IT problems.
b.Design and conduct experiments, as well as analyze and interpret data in the field of information technology.
c.Understand the impact of IT solutions in a global, economic, environmental, and societal context.
d.Use techniques, skills, and modern IT tools necessary for IT practice.
e.Design IT systems, components, or processes to meet desired needs within realistic constraints and standards.
f.Demonstrate knowledge and understanding of engineering and management principles as a member and leader in a team, to manage projects and work in multidisciplinary
environments.
g.Demonstrate professional and ethical responsibility in IT practice.
h.Communicate effectively in both technical and non-technical contexts.

Week
Numbe
r
Topics Intended Learning Outcomes
At the end of the chapter, the
students should be able to:
Teaching
Learning Activity
Assessment References and
Equipment
Remarks
1-3
I. Introduction to
Information
Assurance and
Security
1. - Importance of
Information
Security
2. - Security Threat
Landscape
Understand the importance of
information security and its
significance in today's digital
world.
Analyzed the security threat
landscape, including current
and emerging threats.
Lecture and
discussions on
the importance
of information
security
Case studies
and real-world
examples
Hands-on
practice in
navigating the
security threat
landscape
Examination and
assessment of
evidence obtained
from one or more
of the following:
1.Seatwork
2.Board work
3.Quizzes
4.Summative
assessment
CM1
CM2
R1
4-5
II. Security Threats
and Vulnerabilities
1. - Types of
Security
Threats
2. - Vulnerability
Assessment
Identify and categorize various
types of security threats,
including cyber attacks and
vulnerabilities.
Conduct vulnerability
assessments to evaluate and
prioritize security risks
effectively.
Lectures on
types of
security threats
Practical
demonstrations
and simulations
of common
vulnerabilities
Vulnerability
assessment
exercises with
Examination and
assessment of
evidence obtained
from one or more
of the following:
1.Seatwork
2.Board work
3.Quizzes
4.Summative
assessment
5.Preliminary
Examination
CM1
CM2
R1

hands-on
practice
PRELIMINARY EXAMINATION
6-7
III. Risk Management
and Security
Policies
1. - Risk Assessment
and Mitigation
2. - Security Policies
and Procedures
Perform comprehensive
risk assessments to identify
potential threats and
vulnerabilities and develop
mitigation strategies.
Develop and implement
effective security policies
and procedures to protect
organizational assets.
Lectures on
risk
assessment
and
mitigation
strategies
Interactive
workshops
for
developing
and
analyzing
security
policies
Hands-on
risk
assessment
exercises
Examination and
assessment of
evidence obtained
from one or more
of the following:
1.Seatwork
2.Board work
3.Quizzes
4.Summative
assessment
CM1
CM2
R1
8-9
IV. Network Security
1. - Network Threats
and
Countermeasures
2. - Firewalls and
Intrusion
Detection Systems
Recognize network threats and
countermeasures, including
common network-based
attacks.
Configure and manage
firewalls and intrusion
detection systems to enhance
network security.
Lectures on
network threats
and
countermeasur
es
Network
security
simulations and
Examination and
assessment of
evidence obtained
from one or more
of the following:
1.Seatwork
2.Board work
3.Quizzes
4.Summative
CM1
CM2
R1
R2

hands-on
practice
Configuration
of firewalls and
intrusion
detection
systems in a lab
environment
assessment
5.Midterm
Examination
MIDTERM EXAMINATION
10-12
V. Cryptography and
Encryption
1. -
Cryptographic
Concepts
2. - Encryption
Algorithms
Explain cryptographic concepts
and their role in ensuring data
confidentiality and integrity.
Evaluate and select
appropriate encryption
algorithms for different
security scenarios.
Lectures on
cryptographic
concepts
Hands-on
cryptographic
exercises and
algorithm
implementation
Encryption
algorithm
selection and
practical
implementation
Examination and
assessment of
evidence obtained
from one or more
of the following:
1.Seatwork
2.Board work
3.Quizzes
4.Summative
assessment
CM1
CM2
R1
R2
13-14
VI. Access Control
and
Authentication
1. - Access
Control Models
2. -
Authentication
and
Describe access control
models and their role in
controlling user access to
resources.
Implement authentication and
authorization mechanisms to
enhance access control.
Lectures on
access control
models
Interactive
discussions and
case studies on
authentication
Examination and
assessment of
evidence obtained
from one or more
of the following:
1.Seatwork
2.Board work
3.Quizzes
CM1
CM2
R1
R2

Authorization and
authorization
Hands-on
implementation
of access
control
mechanisms
4.Summative
assessment
5.Semi-Final
Examination
SEMI-FINAL EXAMINATION
15-16
VII. Security
Architecture and
Design
1. - Secure
System Design
2. - Security
Standards and
Frameworks
Design secure systems
considering security best
practices and principles.
Apply relevant security
standards and frameworks to
ensure a robust security
architecture.
Lectures on
secure system
design
principles
Workshops for
designing
secure systems
with practical
exercises.
Exploration of
security
standards and
frameworks
through hands-
on activities
Examination and
assessment of
evidence obtained
from one or more
of the following:
1.Seatwork
2.Board work
3.Quizzes
4.Summative
assessment
CM1
CM2
R1
R2
17-18
VIII. Security
Operations and
Incident
Response
1. - Security
Operations
Understand the role and
functions of a Security
Operations Center (SOC) in
monitoring and responding to
security incidents.
Develop and execute effective
Simulated
Security
Operations
Center (SOC)
environment
with lectures
Examination and
assessment of
evidence obtained
from one or more
of the following:
1.Seatwork

Center (SOC)
2. - Incident
Response and
Handling
incident response and
handling procedures to
mitigate security breaches.
and monitoring
practice
Incident
response drills,
simulations,
and hands-on
scenarios
Hands-on
experience in
handling
security
incidents and
breaches
2.Board work
3.Quizzes
4.Summative
assessment.
5.Final
examination
FINAL EXAMINATION
Course Evaluation Compilation of exercises
Research works/internet research
Formative examinations
Official examinations
Course Requirements Prelim- Complete Notes
Midterm- Complete Notes
Semi Finals- Complete Notes
Finals- Complete Notes
Grades InterpretationPrelim to Final
Chapter Test …………..35%
Periodical Test…………45%
Practical Test….……….20 %
% Grade Letter GradeDescriptive
Rating
Five Point
Grading
Remarks
90-100% A Excellent 1.0 Meets minimum competence with exceptional score
80-89 % B Very Good 1.5 Meets minimum competence with over and above average score
70-79 % C Good 2.0 Meets minimum competence with above average score

60-69 % D Satisfactory2.5 Meets minimum competence with average score
50-59 % E Pass 3.0 Meets minimum competence
0-49 % F Fail 5.0 Does not meet the minimum competence
Available Course MaterialCM1: Online learning platform for hands-on labs and simulations.
CM2: Digital resources, including video tutorials, e-books, and additional readings.
References R1- "Principles of Information Security" by Michael E. Whitman and Herbert J. Mattord
R2 - "Network Security Essentials: Applications and Standards" by William Stallings
Other Policies OP1 Attendance- 10 consecutive or non-consecutive absences means drop.
OP2 No proper uniform, no entry.
OP3 Fifteen minutes late is considered absent.
OP4 The cost of test papers and handouts (xerox copies) will be one peso per page.
OP5 During periodic test, strictly no admission, no test.
OP6 Special examination will be given only two weeks after the scheduled final examination.
OP7 No special exam for missed chapter tests.
OP8 Expenses of the research output shall be divided equally by every group member.
OP9 Each group shall not to exceed five members. The instructor will be the one to identify the leaders and members of the group.
OP10 Any complain regarding behavior of group mates shall be put into writing and it will be acted upon.