Co - DKB3323

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

KOLEJ KOLEJ VOKASIONAL DATUK SERI MOHD ZIN

JABATAN TEKNOLOGI MAKLUMAT


PROGRAM DIPLOMA TEKNOLOGI MAKLUMAT

PERANCANGAN KURSUS
COURSE OUTLINE

MAKLUMAT KURSUS (COURSE INFORMATION)

SEMESTER/TAHUN (SEMESTER/YEAR) : SEMESTER 1 TAHUN 2

KOD KURSUS (COURSE CODE) : DKB 3323

NAMA KURSUS (NAME OF COURSE) : COMPUTER NETWORK SECURITY


DEPLOYMENT

BEBAN AKADEMIK PELAJAR (STUDENT ACADEMIC LOAD) :


Kategori Aktiviti Aktiviti Pembelajaran Jumlah Jam/Semester
(Category of Activities) (Learning Activity) (Total Hours/Semester)
Kuliah
14
(Lecture)
Pembelajaran berbantu Amali
(Guided learning) 36
(Practical)
F2F
Tutorial
14
(Tutoriall)
Pembelajaran kendiri
Pembelajaran kendiri 50
(Independent learning)
(Self-learning) Persediaan bagi penilaian
NF2F 10
(Preparation for assessment)
Penilaian berterusan
6
(Continuous assessments)
Penilaian rasmi Menduduki peperiksaan akhir teori
2
(Formal assessments) (Final examination sitting for theory)
Menduduki peperiksaan akhir amali
2
(Final examination sitting for practical)
JUMLAH JAM BELAJAR (JJB) 134
TOTAL STUDENT LEARNING TIME (SLT)
NILAI KREDIT
3
(CREDIT VALUE)

Kursus Pra-syarat : None


(Pre-requisite Course)
Nama Pensyarah : MUHAMMAD AFIQ BIN ARIFIN
(Name of Lecturer) MOHAMAD RANI BIN SARINGAT

Disediakan oleh : KETUA PROGRAM Disahkan oleh : KETUA JABATAN


(Prepared by) TEKNOLOGI MAKLUMAT (Approved by) TEKNOLOGI MAKLUMAT

Tandatangan : Tandatangan :
(Signature) (Signature)

Nama : ZALIZA BT HARI Nama : JAMALLIAH BT IBRAHIM


(Name) (Name):

Tarikh : 19 APRIL 2021 Tarikh : 19 APRIL 2021


(Date): (Date)
MATLAMAT (GOALS):

This course will examine the need for security to secure the computing environment as is
increasingly more difficult as networks become increasingly interconnected and data flows ever
more freely.

SINOPSIS (SYNOPSIS):

This course is designed to introduce students to produce a reliable and secure computer network
system, as well as confidentiality, integrity and availability of company’s data and record according to
the company’s requirement.

HASIL PEMBELAJARAN (LEARNING OUTCOMES):

Upon completion of the course, students will be able to:


1. Explain computer network security deployment according to the current computer network
security technology. (C3, PLO3)
2. Execute computer network security deployment according to computer network security
deployment plan. (P4, PLO2)
3. Complete the network security report according to the executed computer network security
deployment. (A3, PLO6)
ISI KANDUNGAN (CONTENT):

MINGGU KANDUNGAN PENTAKSIRAN


(WEEK) (CONTENT) (ASSESSMENT)
1–3 1.0 COMPUTER NETWORK SECURITY DEPLOYMENT • Test 1
REQUIREMENTS • Practical test
(15 HOURS) • Project
1.1 Computer System Security and Network Security /Assignment
Standard
1.1.1 ISO/IEC 8473-2:1996 Information Technology
1.2 Company’s policy/SOP on computer network security
1.2.1 User’s security requirement
1.2.2 Internet and Intranet security policy
1.3 Non Disclosure Agreement (NDA)
1.4 Computer network security tools
1.4.1 Antivirus Software Packages
1.4.2 Intrusion Detection System
1.4.3 Virtual Private Networks (VPN)
1.4.4 Encryption
1.4.5 Identity Services
1.4.5.1 Passwords
1.4.5.2 Digital Certificates
1.4.5.3 Digital Authentication Keys
1.5 Computer system security threats and network security
threats
1.5.1 Viruses
1.5.1.1 Symptom of a Virus Infection
1.5.1.2 Illegal entry to e-mail, databases, or
the corporate network
1.5.1.3 Denial-Of-Service Attacks (DoS)
1.5.2 Trojan horse programs
1.5.3 Hackers
1.5.4 Spammers
1.5.5 Vandalism
1.5.6 Data interception
1.5.6.1 Communication eavesdropping
1.5.6.2 Altering transmitted data packets
being transmitted
1.5.7 Legal and regulatory or compliance
1.6 Risk and business impact related to computer network
security
1.6.1 Loss of access to premises
1.6.2 Loss of data
1.6.3 Loss of IT function
1.6.4 Loss of skills
1.7 Data protection (TAIB)
1.7.1 Data access control
1.8 Physical security location
1.9 Computer system security parameters and network
security zone
1.9.1 Types of network zone:
1.9.1.1 Demilitarize zone (DMZ)
1.9.1.2 Public zone
1.9.1.3 Intranet (GURU)
1.9.2 Network security zone requirements:
1.9.2.1 Server and clients
1.9.2.2 LAN
1.9.2.3 Firewall
1.9.2.4 VPN
1.9.2.5 Internet and intranet security policy
(DHIA)
4-6 2.0 PLAN COMPUTER NETWORK SECURITY DEPLOYMENT • Test 1
(15 HOURS) • Practical test
2.1 Network diagram • Project
2.2 Network main distribution frame and equipment /Assignment
2.2.1 Switches
2.2.2 Routers
2.2.3 Firewalls
2.2.4 Server
2.2.5 Cables
2.2.6 LAN
2.3 Business resumption plan
2.3.1 Network Infrastructure
2.3.2 System Backups
2.3.3 Off-Site Data Backup Storage
(ALEEYA)
2.3.4 Emergency Notification
2.3.5 Office Resources
2.3.6 Facilities
2.3.7 Recovery procedures (WAN)
2.4 Remote access control
2.5 Network protocol
2.5.1 Internet Protocol
2.5.2 Transmission Control Protocol (TCP)
2.5.3 Internet Control Message Protocol (ICMP)
2.5.4 IP address (NAUFAL)
2.6 Company resources
2.6.1 Budget.
2.6.2 Staff - Knowledge and skills
2.6.3 Hardware and software
2.6.4 Equipment and facilities (ZAHIN)
2.7 Computer network security deployment plan
2.7.1 Work breakdown structure
2.7.2 Work Schedule
2.7.3 Computer network security checklist
(SHAHIRA)
2.7.4 Security risks
2.7.5 Security strategies
2.7.6 Network logon and authentication (AFIQ)
2.7.7 Information security
2.7.8 Administrative policies
2.7.9 Work Instruction (IQBAL)
7-11 3.0 EXECUTE COMPUTER NETWORK SECURITY • Test 2
DEPLOYMENT (25 HOURS) • Practical test
• Project
3.1 Firewall configuration tasks /Assignment
3.1.1 NAT (Network Address Translation) and SAT
Secure Ada Target) identification
3.1.2 Create table routing (AIREL)
3.1.3 Ports configuration
3.1.3.1 Web port
3.1.3.2 FTP port
3.1.3.3 SSL port (ENGKU)
3.1.4 Packet filtering
3.1.5 Application gateway according to port
configuration (JEFFREY)
3.2 Virtual Private Network (VPN) configuration
3.2.1 Add user
3.2.2 Remove user (IFFAH)
3.3 Internet security control
3.3.1 Firewall
3.3.2 Antivirus
3.3.3 Software patches (KUNTUM)
3.4 Password policy setting
3.4.1 Expiry (6 months, 12 months, 18 months)
3.4.2 Encryption scheme
3.4.3 Reset password (DANIEL LAY)
3.5 Penetration test (AIN)
3.6 Network security irregularities
3.6.1 Suspicious flows
3.6.2 Malformed packets
3.6.3 Violations
3.6.4 Excess request and response
3.6.5 Protocol unreachable (AIN)
3.7 Network security remedies process
3.7.1 On-site and off-site
3.7.2 Reroute connections
3.7.3 Recode network segments
3.7.4 Network equipment replacement
3.7.5 System upgrade or overhaul (JAJA)
3.8 Security Administration
3.8.1 Connection types
3.8.1.1 Cellular
3.8.1.2 Bluetooth
3.8.1.3 Wi – Fi
3.8.1.4 Infrared
3.8.1.5 SATCOM (SHAFIQA)
3.8.2 Mobile Devices
3.8.2.1 BTOD Devices
3.8.2.2 Enforcement (JEFFREY)
3.8.3 Account Management Concepts
3.8.3.1 Account Types
3.8.3.2 General Concepts (GURU)
3.9 Managerial skill
3.9.1 Delegation
3.9.2 Monitoring
3.9.3 Supervision
3.9.4 Coordinating (NAUFAL,JAJA)
12-14 4.0 COMPUTER NETWORK SECURITY DEPLOYMENT • Test 2
REPORT (15 HOURS) • Practical test
• Project
4.1 Document management system /Assignment
4.1.1 Coding: naming convention
4.1.2 Recording
4.1.3 Filing
4.1.4 Document safety
4.1.5 Confidentiality (TAIB,ALEEYA)
4.2 Computer network security deployment manual
4.2.1 Network security encryption script
4.2.2 Firewall configuration documentation
4.2.3 Password setting details
4.2.4 User authentication configuration information
4.2.5 Network patches checklist
(SHAHIRA,AIREL)
4.3 Network troubleshoot report
4.3.1 List of network risk
4.3.2 Root cause
4.3.3 Action taken
4.3.4 Suggestion for improvement (WAN, ZAHIN)
4.4 Network security deployment report
4.4.1 Work breakdown structure
4.4.2 Work Schedule
4.4.3 Computer network security checklist
4.4.4 List of network security risks
4.4.5 Security strategies
4.4.6 Network security team members
4.4.7 Job execution details:
4.4.8 Date & time
4.4.9 Team member involved
4.4.10 Other matters / issues related to network
security deployment
(DHIA,ENGKU,IFFAH)
4.5 Compilation of network security deployment related
documents (GURU)
15 PREPARATION WEEK

16 PRACTICAL / FINAL EXAMINATION

17 PRACTICAL / FINAL EXAMINATION


AMALI (PRACTICAL):

1. Data security protection requirements analyzed


2. Produce network security deployment plan
3. Execute computer network security deployment
4. Produce computer network security deployment report
PENILAIAN (ASSESSMENT):

CLO
Type of Sub
No CLO1:C3,PLO3 CLO2 :P4,PLO2 CLO3:A3,PLO6 Total
Assessment Total
(Cognitive) (Psychomotor) (Affective)
Continuous Assessment
Test 20% 20%
1 20% 60%
Practical Test 20%
Project 20% 20%

Final Examination
2 Theory 10% 10% 40%
Practical 30% 30%

Total Mark (CLO) 30% 50% 20% 100%

Assessment Specifications Table (AST):


ASSESSMENT
CLO METHODS FOR
COURSEWORK (CA)

/ASSIGNMENT
PRACTICAL

PROJECT
TEST

TEST
CONTEXT
CLO1

CLO2

CLO3 (2) (1) (1)

1.0 Computer Network Security Deployment Requirements √ √ √



2.0 Plan Computer Network Security Deployment √ √ √
√ √
3.0 Execute Computer Network Security Deployment √ √ √

4.0 Computer Network Security Deployment Report √ √ √

Remark:
1. Suggested time for
➢ Test : 60 minutes
➢ Practical Test : 120 minutes
➢ Project/Assignment : 120 minutes
RUJUKAN (REFERENCES):

1. Sybex, CompTIA Security+ Study Guide (2018), (7th Edition). ISBN: 978-1-119-41687-6
2. Mark (Mark Ciampa) Ciampa (2011). Security+ Guide to Network Security Fundamentals by
Mark (Mark Ciampa) Ciampa (2011, Mixed Media) (4th Edition) Course Technology . ISBN-13:
978-1-111-64012-5
3. Scott C.-H. Huang, David MacCallum, Ding-Zhu Du (2010) Network Security (1st Edition)
Springer ISBN-13: 978-0-387-73820-8
4. Eric Cole (2009). Network Security Bible (2nd Edition). Wiley. ISBN-13: 978-0-470-50249-5
5. Michael Whitman (2008). Guide to Firewalls and Network Security (2nd Edition). Course
Technology. ISBN-13: 978-1-4354-2016-8
KEHADIRAN/PERATURAN SEMASA KULIAH (LECTURE ATTENDANCE/REGULATION):
1. Pelajar mesti hadir tidak kurang dari 80% masa pertemuan yang ditentukan bagi sesuatu
kursus.
Students must attend lectures not less than 80% of the contact hours for every course.

2. Pelajar yang tidak memenuhi perkara (1) di atas tidak dibenarkan menghadiri kuliah dan
menduduki sebarang bentuk penilaian selanjutnya. Markah sifar (0) akan diberikan kepada
pelajar yang gagal memenuhi perkara (1).
Students who do not fulfill (1) will not be allowed to attend further lectures and sit for any
further examination. Zero mark (0) will be given to students who fail to comply with (1).

3. Pelajar perlu mengikut dan patuh kepada peraturan berpakaian yang berkuatkuasa dan
menjaga disiplin diri masing-masing untuk mengelakkan dari tindakan tatatertib diambil
terhadap pelajar.
Students must obey all rules and regulations of the university and must discipline themselves
in order to avoid any disciplinary actions against them.

4. Pelajar perlu mematuhi peraturan keselamatan semasa proses pembelajaran dan


pengajaran.
Student must obey safety regulations during learning and teaching process.

MATRIK HASIL PEMBELAJARAN KURSUS DAN HASIL PEMBELAJARAN PROGRAM


(MATRIX OF COURSE LEARNING OUTCOMES AND PROGRAMME LEARNING OUTCOMES)

Dilampirkan (As attached).


MATRIK HASIL PEMBELAJARAN KURSUS DAN HASIL PEMBELAJARAN PROGRAM
MATRIX OF COURSE LEARNING OUTCOMES AND PROGRAMME LEARNING OUTCOMES

Jabatan (Department) : TEKNOLOGI MAKLUMAT Matrik ini perlu digunakan bersama:


(This matrix is to be used with)
Program (Programme) : DIPLOMA TEKNOLOGI MAKLUMAT 1. Objektif Pendidikan Program (PEO)
(Programme Educational Objectives (PEO))
Kod Kursus (Course Code) : DKB 3323 2. Hasil Pembelajaran Program (PLO)
(Programme Learning Outcomes (PLO))
Nama Kursus (Course Title) : COMPUTER NETWORK SECURITY DEPLOYMENT

Pematuhan kepada PLO (Compliance to PLO) Kaedah


Kaedah Pentaksiran
Penyampaian
(Method of KPI
(Method of
Bil. Hasil Pembelajaran Kursus Assessment)
Delivery)
(No.) (Course Learning Outcomes)

PLO1

PLO2

PLO3

PLO4

PLO5

PLO6

PLO7

PLO8

PLO9
Explain computer network
security deployment according
1 C3 Group Work Written Test
to the current computer network
security technology. (C3, PLO3)
Execute computer network
100% Students
security deployment according Practical,
2 P4 Practical Test obtain 60%
to computer network security Demonstration
marks and above
deployment plan. (P4, PLO2)
Complete the network security
report according to the executed Discussion,
3 A3 Project/Assignment
computer network security Case Study
deployment. (A3, PLO6)
Jumlah (Total) 50% 30% 20%

Taksonomi Pembelajaran (Learning Taxonomy)


Kognitif (Cognitive) Psikomotor (Psychomotor) Afektif (Affective)
C1 Pengetahuan (Knowledge) P1 Persepsi (Perception) A1 Menerima (Receiving)
C2 Pemahaman (Comprehension) P2 Set (Set) A2 Memberikan Maklum Balas (Responding)
C3 Aplikasi (Application) P3 Respons Berpandu (Guided Response) A3 Menilai (Valuing)
C4 Analisis (Analysis) P4 Mekanisme (Mechanism) A4 Mengorganisasi (Organising)
C5 Sintesis (Synthesis) P5 Respons Ketara Kompleks (Complex Overt Response) A5 Menghayati Nilai (Internalising)
C6 Penilaian (Evaluation) P6 Adaptasi (Adaptation)
P7 Lakuan Tulen (Origination)

You might also like