Course Syllabus: IT Security and
Management
Course Title: IT Security and Management
Course Code: IS 8XX (placeholder)
Course Credit: 3 units
Pre-requisite: Fundamentals of Information Systems
Program: BS Information System
Academic Term: [Insert Term and Year]
Instructor: [Insert Name]
Program Outcomes (POs)
1. PO1: Analyze complex problems and define the computing requirements appropriate to
their solution.
2. PO2: Apply computing knowledge and skills in analyzing organizational problems.
3. PO3: Design and develop information systems that meet user and business needs.
4. PO4: Apply security principles and practices to maintain operations in the presence of
risks and threats.
5. PO5: Engage in independent learning and keep pace with developments in the field of
information systems.
Course Outcomes (COs)
6. CO1: Identify threats and vulnerabilities in IT systems and apply risk management
principles.
7. CO2: Develop security policies and procedures for IT systems in organizations.
8. CO3: Demonstrate ethical and legal considerations in the implementation of IT security
and management.
Desired Learning Outcomes and Weekly Plan (18 Weeks)
Week Topics / Course Teaching & Learning Outcome-Based
Content Activities Assessment
1 Introduction to IT Lecture, Class Quiz, Recitation
Security &
Management Discussion
2 Concepts: Case Studies, Small Reflection Paper
Confidentiality, Group Discussions
Integrity,
Availability
3 Threats, Interactive Lecture, Short Exam
Vulnerabilities, and Group Activity
Attacks
4 Types of Malware, Video Quiz
Social Engineering, Demonstration,
Insider Threats Debate
5 Risk Management Simulation Risk Assessment
Principles Exercises, Lecture Matrix
6 Security Policies: Hands-on Policy Policy Document
Formulation and Drafting Submission
Implementation
7 Authentication, Hands-on Labs, Lab Report
Access Control, and Scenario Solving
Authorization
8 Network Security Lecture, Packet Quiz
Basics Sniffing Demo
9 Midterm Exam and Exam + Discussion Written Exam
Review
10 Operating System Virtual Lab, Class Lab Activity Report
and Application Demo
Security
11 Encryption, Lecture, Hands-on Encrypted File
Cryptography, Encryption Tools Submission
Digital Signatures
12 Firewall, IDS, and Lab Simulation Network Security
IPS Technologies Diagram
13 Security in Cloud Research Reports, Group Presentation
and Virtualization Video Presentation
14 Disaster Recovery Workshop, Case Continuity Plan
and Business
Continuity Planning Analysis Proposal
15 Legal, Ethical, and Lecture, Role- Reaction Paper
Privacy Issues Playing Activity
16 Incident Response Workshop, Role- Incident Handling
and Digital play Simulation
Forensics
17 Security Audit and Guest Lecture / Compliance
Compliance (e.g., Seminar Checklist Output
ISO 27001, NIST)
18 Final Project Capstone Output + Final Project +
Presentation and Oral Defense Rubric
Course Wrap-Up
Course Requirements
Attendance and Participation
Quizzes and Exams
Individual and Group Projects
Capstone/Final Security Plan
Class Presentations
References (Alphabetical Order, 2018 and above)
9. Andress, J. (2019). The Basics of Information Security: Understanding the Fundamentals
of InfoSec. Syngress.
10. Bayuk, J. (2021). Cybersecurity for Executives: A Practical Guide. Springer.
11. Peltier, T. R. (2018). Information Security Policies, Procedures, and Standards:
Guidelines for Effective Information Security Management. Auerbach Publications.
12. Stallings, W. (2020). Network Security Essentials: Applications and Standards (6th ed.).
Pearson.
13. Whitman, M. E., & Mattord, H. J. (2021). Principles of Information Security (7th ed.).
Cengage Learning.