SlideShare a Scribd company logo
BIT International College
City of Tagbilaran
S Y L L A B U S
Issue Date : Prepared by: Reviewed by: Approved by:
Revision Status : MRS. EDELYN A. BERGANTIN ENGR. DIOSDADO B. POJAS JR. ENGR. LIBERATO H. LUPOT JR. CE, PhD
Revision Date : Instructor IT-Program Chair Dean, CET
COLLEGE : College of Engineering and Technology
COURSE CODE : IT 311
COURSE TITLE : Information Assurance & Security I
COURSE DESCRIPTION : This course provides an in-depth understanding of information assurance and security principles. Students will learn
about various security threats, vulnerabilities, and risk management strategies. Topics include network security,
cryptography, access control, security policies, and incident response. The course aims to equip students with the
knowledge and skills to protect information assets and ensure the confidentiality, integrity, and availability of data.
PRE-REQUISITE : CS 221
CO-REQUISITE : None
CREDIT UNIT(S) : 3 units (2 hrs. lecture) 1 unit (lab.)
CLASS SCHEDULE :
QUALITY POLICY, VISION, MISSION AND CORE VALUES
QUALITY POLICY
BIT International College is committed to provide EXCELLENCE in Administration & in Teaching-Learning Environment and SERVICE to the community through a
dynamic quality management system.
VISION
Bastion of Intelligence, Technology, Innovation and Competence: A Groundwork to University Status
MISSION
Building an Individual’s Tomorrow
CORE VALUES
Benevolence, Industry, Trustworthy, Innovative, Competence
BIT IC ACA Form 010/Rev 1/09-11-18
GRADUATE ATTRIBUTES OF A BIT IC’ian INSTITUTIONAL LEARNING OUTCOMES
Benevolent and committed to community service a. Apply moral and ethical standards in leading others
b. Initiate the creation of, and participate actively in, community-oriented advocacies that contribute to
community development and nation building
Industrious, motivated and articulate communicator d. Express ideas effectively using proper, polite and technically correct language
e. Initiate projects that make an impact to communities
Technology-literate f. Utilize technology at work with ease
g. Continue to improve skills in using technology at work
Innovative and critical thinker h. Apply problem-solving skills
i. Produce alternative solutions, processes, and approaches to problem-solving
Competent, life- and career-skilled individual j. Apply the standards and practices of their major or program of study
k. Engage in continuing personal and professional development
PROGRAM LEARNING OUTCOMES
Common to All CET Programs
Engage in lifelong learning and understanding of the need to keep abreast of the developments in engineering and technology practice;
Communicate orally and in writing;
Work independently and in multi-disciplinary and multi-cultural teams.;
Act in recognition and practice of professional, social, and ethical accountability and responsibility;
Apply knowledge in mathematics, science and technology in solving problems related to the profession and the workplace;
Evaluate the impact and implications of various contemporary issues in the global and social context of the profession.
Use appropriate techniques, skills and modern tools in the practice of the profession in order to remain globally competitive;
Conduct research using appropriate research methodologies; and
Participate in various types of employment, development activities, and public discourses particularly in response to the needs of the community one serves.
BSITE Learning Outcomes
a. Identify, formulate, and apply knowledge of mathematics and science to solve complex IT problems.
b. Design and conduct experiments, as well as analyze and interpret data in the field of information technology.
c. Understand the impact of IT solutions in a global, economic, environmental, and societal context.
d. Use techniques, skills, and modern IT tools necessary for IT practice.
e. Design IT systems, components, or processes to meet desired needs within realistic constraints and standards.
f. Demonstrate knowledge and understanding of engineering and management principles as a member and leader in a team, to manage projects and work in multidisciplinary
environments.
g. Demonstrate professional and ethical responsibility in IT practice.
h. Communicate effectively in both technical and non-technical contexts.
Week
Numbe
r
Topics Intended Learning Outcomes
At the end of the chapter, the
students should be able to:
Teaching
Learning Activity
Assessment References and
Equipment
Remarks
1-3
I. Introduction to
Information
Assurance and
Security
1. - Importance of
Information
Security
2. - Security Threat
Landscape
 Understand the importance of
information security and its
significance in today's digital
world.
 Analyzed the security threat
landscape, including current
and emerging threats.
 Lecture and
discussions on
the importance
of information
security
 Case studies
and real-world
examples
 Hands-on
practice in
navigating the
security threat
landscape
Examination and
assessment of
evidence obtained
from one or more
of the following:
1. Seatwork
2. Board work
3. Quizzes
4. Summative
assessment
CM1
CM2
R1
4-5
II. Security Threats
and Vulnerabilities
1. - Types of
Security
Threats
2. - Vulnerability
Assessment
 Identify and categorize various
types of security threats,
including cyber attacks and
vulnerabilities.
 Conduct vulnerability
assessments to evaluate and
prioritize security risks
effectively.
 Lectures on
types of
security threats
 Practical
demonstrations
and simulations
of common
vulnerabilities
 Vulnerability
assessment
exercises with
Examination and
assessment of
evidence obtained
from one or more
of the following:
1. Seatwork
2. Board work
3. Quizzes
4. Summative
assessment
5. Preliminary
Examination
CM1
CM2
R1
hands-on
practice
PRELIMINARY EXAMINATION
6-7
III. Risk Management
and Security
Policies
1. - Risk Assessment
and Mitigation
2. - Security Policies
and Procedures
 Perform comprehensive
risk assessments to identify
potential threats and
vulnerabilities and develop
mitigation strategies.
 Develop and implement
effective security policies
and procedures to protect
organizational assets.
 Lectures on
risk
assessment
and
mitigation
strategies
 Interactive
workshops
for
developing
and
analyzing
security
policies
 Hands-on
risk
assessment
exercises
Examination and
assessment of
evidence obtained
from one or more
of the following:
1. Seatwork
2. Board work
3. Quizzes
4. Summative
assessment
CM1
CM2
R1
8-9
IV. Network Security
1. - Network Threats
and
Countermeasures
2. - Firewalls and
Intrusion
Detection Systems
 Recognize network threats and
countermeasures, including
common network-based
attacks.
 Configure and manage
firewalls and intrusion
detection systems to enhance
network security.
 Lectures on
network threats
and
countermeasur
es
 Network
security
simulations and
Examination and
assessment of
evidence obtained
from one or more
of the following:
1. Seatwork
2. Board work
3. Quizzes
4. Summative
CM1
CM2
R1
R2
hands-on
practice
 Configuration
of firewalls and
intrusion
detection
systems in a lab
environment
assessment
5. Midterm
Examination
MIDTERM EXAMINATION
10-12
V. Cryptography and
Encryption
1. -
Cryptographic
Concepts
2. - Encryption
Algorithms
 Explain cryptographic concepts
and their role in ensuring data
confidentiality and integrity.
 Evaluate and select
appropriate encryption
algorithms for different
security scenarios.
 Lectures on
cryptographic
concepts
 Hands-on
cryptographic
exercises and
algorithm
implementation
 Encryption
algorithm
selection and
practical
implementation
Examination and
assessment of
evidence obtained
from one or more
of the following:
1. Seatwork
2. Board work
3. Quizzes
4. Summative
assessment
CM1
CM2
R1
R2
13-14
VI. Access Control
and
Authentication
1. - Access
Control Models
2. -
Authentication
and
 Describe access control
models and their role in
controlling user access to
resources.
 Implement authentication and
authorization mechanisms to
enhance access control.
 Lectures on
access control
models
 Interactive
discussions and
case studies on
authentication
Examination and
assessment of
evidence obtained
from one or more
of the following:
1. Seatwork
2. Board work
3. Quizzes
CM1
CM2
R1
R2
Authorization and
authorization
 Hands-on
implementation
of access
control
mechanisms
4. Summative
assessment
5. Semi-Final
Examination
SEMI-FINAL EXAMINATION
15-16
VII. Security
Architecture and
Design
1. - Secure
System Design
2. - Security
Standards and
Frameworks
 Design secure systems
considering security best
practices and principles.
 Apply relevant security
standards and frameworks to
ensure a robust security
architecture.
 Lectures on
secure system
design
principles
 Workshops for
designing
secure systems
with practical
exercises.
 Exploration of
security
standards and
frameworks
through hands-
on activities
Examination and
assessment of
evidence obtained
from one or more
of the following:
1. Seatwork
2. Board work
3. Quizzes
4. Summative
assessment
CM1
CM2
R1
R2
17-18
VIII. Security
Operations and
Incident
Response
1. - Security
Operations
 Understand the role and
functions of a Security
Operations Center (SOC) in
monitoring and responding to
security incidents.
 Develop and execute effective
 Simulated
Security
Operations
Center (SOC)
environment
with lectures
Examination and
assessment of
evidence obtained
from one or more
of the following:
1. Seatwork
Center (SOC)
2. - Incident
Response and
Handling
incident response and
handling procedures to
mitigate security breaches.
and monitoring
practice
 Incident
response drills,
simulations,
and hands-on
scenarios
 Hands-on
experience in
handling
security
incidents and
breaches
2. Board work
3. Quizzes
4. Summative
assessment.
5. Final
examination
FINAL EXAMINATION
Course Evaluation Compilation of exercises
Research works/internet research
Formative examinations
Official examinations
Course Requirements Prelim- Complete Notes
Midterm- Complete Notes
Semi Finals- Complete Notes
Finals- Complete Notes
Grades Interpretation Prelim to Final
Chapter Test …………..35%
Periodical Test…………45%
Practical Test….……….20 %
% Grade Letter Grade Descriptive
Rating
Five Point
Grading
Remarks
90-100% A Excellent 1.0 Meets minimum competence with exceptional score
80-89 % B Very Good 1.5 Meets minimum competence with over and above average score
70-79 % C Good 2.0 Meets minimum competence with above average score
60-69 % D Satisfactory 2.5 Meets minimum competence with average score
50-59 % E Pass 3.0 Meets minimum competence
0-49 % F Fail 5.0 Does not meet the minimum competence
Available Course Material CM1: Online learning platform for hands-on labs and simulations.
CM2: Digital resources, including video tutorials, e-books, and additional readings.
References R1- "Principles of Information Security" by Michael E. Whitman and Herbert J. Mattord
R2 - "Network Security Essentials: Applications and Standards" by William Stallings
Other Policies OP1 Attendance- 10 consecutive or non-consecutive absences means drop.
OP2 No proper uniform, no entry.
OP3 Fifteen minutes late is considered absent.
OP4 The cost of test papers and handouts (xerox copies) will be one peso per page.
OP5 During periodic test, strictly no admission, no test.
OP6 Special examination will be given only two weeks after the scheduled final examination.
OP7 No special exam for missed chapter tests.
OP8 Expenses of the research output shall be divided equally by every group member.
OP9 Each group shall not to exceed five members. The instructor will be the one to identify the leaders and members of the group.
OP10 Any complain regarding behavior of group mates shall be put into writing and it will be acted upon.

More Related Content

DOCX
BSCS_IASN21C-24-25-Information-Assurance-and-Security-1 (1).docx
DOCX
KING’S OWN INSTITUTE Success in Higher Education ICT 20.docx
PPT
INT529 zero lecture.pptdsfsdffewwretetrtetretr
PDF
CYBER SECURITY Enginnering course .pdf
PDF
Ethical Hacking
DOCX
IS_Syllabus_4_credits_2018.docx
DOCX
LITC-Living-in-the-IT-Era-for-CBA-Students.docx
DOCX
IS_Front Pages-2024-2025.docxbhvghvhbhbu
BSCS_IASN21C-24-25-Information-Assurance-and-Security-1 (1).docx
KING’S OWN INSTITUTE Success in Higher Education ICT 20.docx
INT529 zero lecture.pptdsfsdffewwretetrtetretr
CYBER SECURITY Enginnering course .pdf
Ethical Hacking
IS_Syllabus_4_credits_2018.docx
LITC-Living-in-the-IT-Era-for-CBA-Students.docx
IS_Front Pages-2024-2025.docxbhvghvhbhbu

Similar to IT 411-Syllabus in Information Technology (20)

PPTX
cybersecurityandthe importance of the that
PDF
Discover the top cyber security courses in India to boost your career in digi...
PPT
ICSE6104 Lecturedfffffffffffffffffffff 1.ppt
PDF
Become a Master of Cybersecurity with Real World Business Challenges
PDF
Information Security Management Education Program - Concept Document
DOCX
BA 632 INFORMATION SYSTEMS SECURITY Instructor Informat.docx
PPTX
Unit1 Cyber NIET Greater Noida Uttar Pradesh
PDF
Career Opportunities in Cyber Security
DOCX
Running Header LEARNING RESOURCE1 NETFLIX4LEARNING RESO.docx
PPTX
BE Cyber Security Course at Cheran College – Coimbatore
DOCX
IT-era-Syllabus-dox-for-school-purposes-
PPTX
Ethical hacking
PDF
Cyber Security -Career and Job Opportunities after Msc.it
PDF
ASSIGNMENT BOOKLET 2018 DIPLOMA IN IT 3 YEARS 1ST YEAR
PDF
Concepts of Cyber Security lecture note.pdf
PPTX
Provide Network System Administrationa.pptx
PDF
ISA.pdf
DOCX
ConnieJusticeCV-2016
DOCX
Corporate Cyber Security Training at Cyberous
PDF
CISSP Certification Training By Edvistaar
cybersecurityandthe importance of the that
Discover the top cyber security courses in India to boost your career in digi...
ICSE6104 Lecturedfffffffffffffffffffff 1.ppt
Become a Master of Cybersecurity with Real World Business Challenges
Information Security Management Education Program - Concept Document
BA 632 INFORMATION SYSTEMS SECURITY Instructor Informat.docx
Unit1 Cyber NIET Greater Noida Uttar Pradesh
Career Opportunities in Cyber Security
Running Header LEARNING RESOURCE1 NETFLIX4LEARNING RESO.docx
BE Cyber Security Course at Cheran College – Coimbatore
IT-era-Syllabus-dox-for-school-purposes-
Ethical hacking
Cyber Security -Career and Job Opportunities after Msc.it
ASSIGNMENT BOOKLET 2018 DIPLOMA IN IT 3 YEARS 1ST YEAR
Concepts of Cyber Security lecture note.pdf
Provide Network System Administrationa.pptx
ISA.pdf
ConnieJusticeCV-2016
Corporate Cyber Security Training at Cyberous
CISSP Certification Training By Edvistaar
Ad

Recently uploaded (20)

PPTX
G10 HOMEROOM PARENT-TEACHER ASSOCIATION MEETING SATURDAY.pptx
PPTX
Slide_Egg-81850-About Us PowerPoint Template Free.pptx
PDF
Dating-Courtship-Marriage-and-Responsible-Parenthood.pdf
PPTX
400kV_Switchyard_Training_with_Diagrams.pptx
PPTX
DIMAYUGA ANDEA MAE P. BSED ENG 3-2 (CHAPTER 7).pptx
PPTX
65bc3704-6ed1-4724-977d-a70f145d40da.pptx
PDF
Arts and Crats of Cagayan and Central Luzon.pdf
PPTX
SlideEgg_21518-Company Presentation.pptx
PDF
Love & Romance in Every Sparkle_ Discover the Magic of Diamond Painting.pdf
PPTX
Theatre Studies - Powerpoint Entertainmn
PPTX
Callie Slide Show Slide Show Slide Show S
PPTX
Green and Orange Illustration Understanding Climate Change Presentation.pptx
PPTX
Visual-Arts.pptx power point elements of art the line, shape, form
PPTX
4277547e-f8e2-414e-8962-bf501ea91259.pptx
PPTX
CPAR_QR1_WEEK1_INTRODUCTION TO CPAR.pptx
PPTX
unit5-servicesrelatedtogeneticsinnursing-241221084421-d77c4adb.pptx
PPTX
EJ Wedding 520 It's official! We went to Xinyi District to do the documents
PPSX
opcua_121710.ppsxthsrtuhrbxdtnhtdtndtyty
PDF
waiting, Queuing, best time an event cab be done at a time .pdf
PPTX
Military history & Evolution of Armed Forces of the Philippines
G10 HOMEROOM PARENT-TEACHER ASSOCIATION MEETING SATURDAY.pptx
Slide_Egg-81850-About Us PowerPoint Template Free.pptx
Dating-Courtship-Marriage-and-Responsible-Parenthood.pdf
400kV_Switchyard_Training_with_Diagrams.pptx
DIMAYUGA ANDEA MAE P. BSED ENG 3-2 (CHAPTER 7).pptx
65bc3704-6ed1-4724-977d-a70f145d40da.pptx
Arts and Crats of Cagayan and Central Luzon.pdf
SlideEgg_21518-Company Presentation.pptx
Love & Romance in Every Sparkle_ Discover the Magic of Diamond Painting.pdf
Theatre Studies - Powerpoint Entertainmn
Callie Slide Show Slide Show Slide Show S
Green and Orange Illustration Understanding Climate Change Presentation.pptx
Visual-Arts.pptx power point elements of art the line, shape, form
4277547e-f8e2-414e-8962-bf501ea91259.pptx
CPAR_QR1_WEEK1_INTRODUCTION TO CPAR.pptx
unit5-servicesrelatedtogeneticsinnursing-241221084421-d77c4adb.pptx
EJ Wedding 520 It's official! We went to Xinyi District to do the documents
opcua_121710.ppsxthsrtuhrbxdtnhtdtndtyty
waiting, Queuing, best time an event cab be done at a time .pdf
Military history & Evolution of Armed Forces of the Philippines
Ad

IT 411-Syllabus in Information Technology

  • 1. BIT International College City of Tagbilaran S Y L L A B U S Issue Date : Prepared by: Reviewed by: Approved by: Revision Status : MRS. EDELYN A. BERGANTIN ENGR. DIOSDADO B. POJAS JR. ENGR. LIBERATO H. LUPOT JR. CE, PhD Revision Date : Instructor IT-Program Chair Dean, CET COLLEGE : College of Engineering and Technology COURSE CODE : IT 311 COURSE TITLE : Information Assurance & Security I COURSE DESCRIPTION : This course provides an in-depth understanding of information assurance and security principles. Students will learn about various security threats, vulnerabilities, and risk management strategies. Topics include network security, cryptography, access control, security policies, and incident response. The course aims to equip students with the knowledge and skills to protect information assets and ensure the confidentiality, integrity, and availability of data. PRE-REQUISITE : CS 221 CO-REQUISITE : None CREDIT UNIT(S) : 3 units (2 hrs. lecture) 1 unit (lab.) CLASS SCHEDULE : QUALITY POLICY, VISION, MISSION AND CORE VALUES QUALITY POLICY BIT International College is committed to provide EXCELLENCE in Administration & in Teaching-Learning Environment and SERVICE to the community through a dynamic quality management system. VISION Bastion of Intelligence, Technology, Innovation and Competence: A Groundwork to University Status MISSION Building an Individual’s Tomorrow CORE VALUES Benevolence, Industry, Trustworthy, Innovative, Competence BIT IC ACA Form 010/Rev 1/09-11-18
  • 2. GRADUATE ATTRIBUTES OF A BIT IC’ian INSTITUTIONAL LEARNING OUTCOMES Benevolent and committed to community service a. Apply moral and ethical standards in leading others b. Initiate the creation of, and participate actively in, community-oriented advocacies that contribute to community development and nation building Industrious, motivated and articulate communicator d. Express ideas effectively using proper, polite and technically correct language e. Initiate projects that make an impact to communities Technology-literate f. Utilize technology at work with ease g. Continue to improve skills in using technology at work Innovative and critical thinker h. Apply problem-solving skills i. Produce alternative solutions, processes, and approaches to problem-solving Competent, life- and career-skilled individual j. Apply the standards and practices of their major or program of study k. Engage in continuing personal and professional development PROGRAM LEARNING OUTCOMES Common to All CET Programs Engage in lifelong learning and understanding of the need to keep abreast of the developments in engineering and technology practice; Communicate orally and in writing; Work independently and in multi-disciplinary and multi-cultural teams.; Act in recognition and practice of professional, social, and ethical accountability and responsibility; Apply knowledge in mathematics, science and technology in solving problems related to the profession and the workplace; Evaluate the impact and implications of various contemporary issues in the global and social context of the profession. Use appropriate techniques, skills and modern tools in the practice of the profession in order to remain globally competitive; Conduct research using appropriate research methodologies; and Participate in various types of employment, development activities, and public discourses particularly in response to the needs of the community one serves. BSITE Learning Outcomes a. Identify, formulate, and apply knowledge of mathematics and science to solve complex IT problems. b. Design and conduct experiments, as well as analyze and interpret data in the field of information technology. c. Understand the impact of IT solutions in a global, economic, environmental, and societal context. d. Use techniques, skills, and modern IT tools necessary for IT practice. e. Design IT systems, components, or processes to meet desired needs within realistic constraints and standards. f. Demonstrate knowledge and understanding of engineering and management principles as a member and leader in a team, to manage projects and work in multidisciplinary environments. g. Demonstrate professional and ethical responsibility in IT practice. h. Communicate effectively in both technical and non-technical contexts.
  • 3. Week Numbe r Topics Intended Learning Outcomes At the end of the chapter, the students should be able to: Teaching Learning Activity Assessment References and Equipment Remarks 1-3 I. Introduction to Information Assurance and Security 1. - Importance of Information Security 2. - Security Threat Landscape  Understand the importance of information security and its significance in today's digital world.  Analyzed the security threat landscape, including current and emerging threats.  Lecture and discussions on the importance of information security  Case studies and real-world examples  Hands-on practice in navigating the security threat landscape Examination and assessment of evidence obtained from one or more of the following: 1. Seatwork 2. Board work 3. Quizzes 4. Summative assessment CM1 CM2 R1 4-5 II. Security Threats and Vulnerabilities 1. - Types of Security Threats 2. - Vulnerability Assessment  Identify and categorize various types of security threats, including cyber attacks and vulnerabilities.  Conduct vulnerability assessments to evaluate and prioritize security risks effectively.  Lectures on types of security threats  Practical demonstrations and simulations of common vulnerabilities  Vulnerability assessment exercises with Examination and assessment of evidence obtained from one or more of the following: 1. Seatwork 2. Board work 3. Quizzes 4. Summative assessment 5. Preliminary Examination CM1 CM2 R1
  • 4. hands-on practice PRELIMINARY EXAMINATION 6-7 III. Risk Management and Security Policies 1. - Risk Assessment and Mitigation 2. - Security Policies and Procedures  Perform comprehensive risk assessments to identify potential threats and vulnerabilities and develop mitigation strategies.  Develop and implement effective security policies and procedures to protect organizational assets.  Lectures on risk assessment and mitigation strategies  Interactive workshops for developing and analyzing security policies  Hands-on risk assessment exercises Examination and assessment of evidence obtained from one or more of the following: 1. Seatwork 2. Board work 3. Quizzes 4. Summative assessment CM1 CM2 R1 8-9 IV. Network Security 1. - Network Threats and Countermeasures 2. - Firewalls and Intrusion Detection Systems  Recognize network threats and countermeasures, including common network-based attacks.  Configure and manage firewalls and intrusion detection systems to enhance network security.  Lectures on network threats and countermeasur es  Network security simulations and Examination and assessment of evidence obtained from one or more of the following: 1. Seatwork 2. Board work 3. Quizzes 4. Summative CM1 CM2 R1 R2
  • 5. hands-on practice  Configuration of firewalls and intrusion detection systems in a lab environment assessment 5. Midterm Examination MIDTERM EXAMINATION 10-12 V. Cryptography and Encryption 1. - Cryptographic Concepts 2. - Encryption Algorithms  Explain cryptographic concepts and their role in ensuring data confidentiality and integrity.  Evaluate and select appropriate encryption algorithms for different security scenarios.  Lectures on cryptographic concepts  Hands-on cryptographic exercises and algorithm implementation  Encryption algorithm selection and practical implementation Examination and assessment of evidence obtained from one or more of the following: 1. Seatwork 2. Board work 3. Quizzes 4. Summative assessment CM1 CM2 R1 R2 13-14 VI. Access Control and Authentication 1. - Access Control Models 2. - Authentication and  Describe access control models and their role in controlling user access to resources.  Implement authentication and authorization mechanisms to enhance access control.  Lectures on access control models  Interactive discussions and case studies on authentication Examination and assessment of evidence obtained from one or more of the following: 1. Seatwork 2. Board work 3. Quizzes CM1 CM2 R1 R2
  • 6. Authorization and authorization  Hands-on implementation of access control mechanisms 4. Summative assessment 5. Semi-Final Examination SEMI-FINAL EXAMINATION 15-16 VII. Security Architecture and Design 1. - Secure System Design 2. - Security Standards and Frameworks  Design secure systems considering security best practices and principles.  Apply relevant security standards and frameworks to ensure a robust security architecture.  Lectures on secure system design principles  Workshops for designing secure systems with practical exercises.  Exploration of security standards and frameworks through hands- on activities Examination and assessment of evidence obtained from one or more of the following: 1. Seatwork 2. Board work 3. Quizzes 4. Summative assessment CM1 CM2 R1 R2 17-18 VIII. Security Operations and Incident Response 1. - Security Operations  Understand the role and functions of a Security Operations Center (SOC) in monitoring and responding to security incidents.  Develop and execute effective  Simulated Security Operations Center (SOC) environment with lectures Examination and assessment of evidence obtained from one or more of the following: 1. Seatwork
  • 7. Center (SOC) 2. - Incident Response and Handling incident response and handling procedures to mitigate security breaches. and monitoring practice  Incident response drills, simulations, and hands-on scenarios  Hands-on experience in handling security incidents and breaches 2. Board work 3. Quizzes 4. Summative assessment. 5. Final examination FINAL EXAMINATION Course Evaluation Compilation of exercises Research works/internet research Formative examinations Official examinations Course Requirements Prelim- Complete Notes Midterm- Complete Notes Semi Finals- Complete Notes Finals- Complete Notes Grades Interpretation Prelim to Final Chapter Test …………..35% Periodical Test…………45% Practical Test….……….20 % % Grade Letter Grade Descriptive Rating Five Point Grading Remarks 90-100% A Excellent 1.0 Meets minimum competence with exceptional score 80-89 % B Very Good 1.5 Meets minimum competence with over and above average score 70-79 % C Good 2.0 Meets minimum competence with above average score
  • 8. 60-69 % D Satisfactory 2.5 Meets minimum competence with average score 50-59 % E Pass 3.0 Meets minimum competence 0-49 % F Fail 5.0 Does not meet the minimum competence Available Course Material CM1: Online learning platform for hands-on labs and simulations. CM2: Digital resources, including video tutorials, e-books, and additional readings. References R1- "Principles of Information Security" by Michael E. Whitman and Herbert J. Mattord R2 - "Network Security Essentials: Applications and Standards" by William Stallings Other Policies OP1 Attendance- 10 consecutive or non-consecutive absences means drop. OP2 No proper uniform, no entry. OP3 Fifteen minutes late is considered absent. OP4 The cost of test papers and handouts (xerox copies) will be one peso per page. OP5 During periodic test, strictly no admission, no test. OP6 Special examination will be given only two weeks after the scheduled final examination. OP7 No special exam for missed chapter tests. OP8 Expenses of the research output shall be divided equally by every group member. OP9 Each group shall not to exceed five members. The instructor will be the one to identify the leaders and members of the group. OP10 Any complain regarding behavior of group mates shall be put into writing and it will be acted upon.