KEMBAR78
IT Security and Management Syllabus | PDF | Information Security | Computer Security
100% found this document useful (1 vote)
251 views3 pages

IT Security and Management Syllabus

The IT Security and Management course (IS 8XX) is a 3-unit program designed for BS Information System students, focusing on identifying threats, developing security policies, and understanding ethical considerations in IT security. The syllabus outlines weekly topics, teaching methods, and assessments over an 18-week term, including lectures, hands-on labs, and group projects. Key program and course outcomes emphasize problem analysis, system design, and risk management principles.

Uploaded by

josephugay1986
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
251 views3 pages

IT Security and Management Syllabus

The IT Security and Management course (IS 8XX) is a 3-unit program designed for BS Information System students, focusing on identifying threats, developing security policies, and understanding ethical considerations in IT security. The syllabus outlines weekly topics, teaching methods, and assessments over an 18-week term, including lectures, hands-on labs, and group projects. Key program and course outcomes emphasize problem analysis, system design, and risk management principles.

Uploaded by

josephugay1986
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Course Syllabus: IT Security and

Management
Course Title: IT Security and Management

Course Code: IS 8XX (placeholder)

Course Credit: 3 units

Pre-requisite: Fundamentals of Information Systems

Program: BS Information System

Academic Term: [Insert Term and Year]

Instructor: [Insert Name]

Program Outcomes (POs)


1. PO1: Analyze complex problems and define the computing requirements appropriate to
their solution.
2. PO2: Apply computing knowledge and skills in analyzing organizational problems.
3. PO3: Design and develop information systems that meet user and business needs.
4. PO4: Apply security principles and practices to maintain operations in the presence of
risks and threats.
5. PO5: Engage in independent learning and keep pace with developments in the field of
information systems.

Course Outcomes (COs)


6. CO1: Identify threats and vulnerabilities in IT systems and apply risk management
principles.
7. CO2: Develop security policies and procedures for IT systems in organizations.
8. CO3: Demonstrate ethical and legal considerations in the implementation of IT security
and management.

Desired Learning Outcomes and Weekly Plan (18 Weeks)


Week Topics / Course Teaching & Learning Outcome-Based
Content Activities Assessment

1 Introduction to IT Lecture, Class Quiz, Recitation


Security &
Management Discussion

2 Concepts: Case Studies, Small Reflection Paper


Confidentiality, Group Discussions
Integrity,
Availability

3 Threats, Interactive Lecture, Short Exam


Vulnerabilities, and Group Activity
Attacks

4 Types of Malware, Video Quiz


Social Engineering, Demonstration,
Insider Threats Debate

5 Risk Management Simulation Risk Assessment


Principles Exercises, Lecture Matrix

6 Security Policies: Hands-on Policy Policy Document


Formulation and Drafting Submission
Implementation

7 Authentication, Hands-on Labs, Lab Report


Access Control, and Scenario Solving
Authorization

8 Network Security Lecture, Packet Quiz


Basics Sniffing Demo

9 Midterm Exam and Exam + Discussion Written Exam


Review

10 Operating System Virtual Lab, Class Lab Activity Report


and Application Demo
Security

11 Encryption, Lecture, Hands-on Encrypted File


Cryptography, Encryption Tools Submission
Digital Signatures

12 Firewall, IDS, and Lab Simulation Network Security


IPS Technologies Diagram

13 Security in Cloud Research Reports, Group Presentation


and Virtualization Video Presentation

14 Disaster Recovery Workshop, Case Continuity Plan


and Business
Continuity Planning Analysis Proposal

15 Legal, Ethical, and Lecture, Role- Reaction Paper


Privacy Issues Playing Activity

16 Incident Response Workshop, Role- Incident Handling


and Digital play Simulation
Forensics

17 Security Audit and Guest Lecture / Compliance


Compliance (e.g., Seminar Checklist Output
ISO 27001, NIST)

18 Final Project Capstone Output + Final Project +


Presentation and Oral Defense Rubric
Course Wrap-Up

Course Requirements
 Attendance and Participation
 Quizzes and Exams
 Individual and Group Projects
 Capstone/Final Security Plan
 Class Presentations

References (Alphabetical Order, 2018 and above)


9. Andress, J. (2019). The Basics of Information Security: Understanding the Fundamentals
of InfoSec. Syngress.
10. Bayuk, J. (2021). Cybersecurity for Executives: A Practical Guide. Springer.
11. Peltier, T. R. (2018). Information Security Policies, Procedures, and Standards:
Guidelines for Effective Information Security Management. Auerbach Publications.
12. Stallings, W. (2020). Network Security Essentials: Applications and Standards (6th ed.).
Pearson.
13. Whitman, M. E., & Mattord, H. J. (2021). Principles of Information Security (7th ed.).
Cengage Learning.

You might also like