0% found this document useful (0 votes)
76 views3 pages

Syllabus MSIT 1st Sem

Uploaded by

kenneth gutay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
76 views3 pages

Syllabus MSIT 1st Sem

Uploaded by

kenneth gutay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 3

Republic of the Philippines

SAMAR STATE UNIVERSITY


COLLEGE OF GRADUATE STUDIES
Catbalogan, City
Telephone Numbers: (055)-542-8394/ (055)-251-2139
Website: www.ssu.edu.ph

UNIFIED AND UPDATED SYLLABUS


Academic Year: 1st Semester S.Y. 2015 – 2016

I. Course Number :
II. Course Descriptive Title : Principles of Information System Security

III. Credit Units/Time Frame: 3 units/54 hours


IV. Course Pre-requisite/s : None
V. Professor/s : Maryjes G. Calades
VI. Academic Term
and School Year : Frist Semester; SY 2015-2016
VII. Time Allotment : 90 hours
VIII. Vision and Mission of SSU :

SSU VISION

The University commits itself to the development of human potentials and the fortification of human
conditions as subsumed in the fundamental matrix of the life of the indigenous society and in the realities of
global community.
SSU MISSION

The University shall primarily provide advanced instruction and professional training in the arts,
philosophy, social sciences, agriculture and fishery, forestry, science and technology, engineering,
education, law and other related fields. It shall also undertake research and extension services, and provide
progressive leadership in its areas of specialization.
Sec.2. R.A. 9313

XI. COURSE DESCRIPTION:

This course introduces the students to the fields of computer network technology and data
communication. This course provides details on networking technology and standards underlying the
applications and the computer and network systems that support them. Topics covered include wireless
and wire line telecommunications systems, basic data communications network and systems, local area
networks, internetworks, and the Internet, including the TPC/IP protocol suite.

XII. GENERAL OBJECTIVES


At the completion of each topic and suggested activities, the students
are expected to:

1. Introduces the fundamental concepts of data communications and networking


2. Exposure to the vocabulary they need to understand about developments in Data
Communications and Networking.

SPECIFIC OBJECTIVES
Students are expected to:

1. Learned and understand the basic features, operations and limitations of different types of
computer network.
2. To provide an understanding on how to work effectively with network administrators, network
installers and network designers.
XIII. CORE VALUES

1. Analytical thinking
2. personal discipline
3. excellence
4. teamwork/cooperation
5. punctuality
6. Commitment
7. Honest

XIV. COURSE CONTENT:


Topics/Units of Work Time Frame/

Orientation of Vision, Mission & Objectives 2hrs


Orientation of Laboratory rules and safety precaution
Syllabus / Course Content

Chapter I Introduction to Information Security


http://www.cengage.com/resource_uploads/downloads/1111138214_259146.pdf

Chapter 2 The Need for Security Bordius ,Roma


http://www.cengage.com/resource_uploads/downloads/1111138214_259147.pdf

Chapter 3 Legal, Ethical, and Professional Issues in Information Security Mabulac, Uy


http://www.cengage.com/resource_uploads/downloads/1111138214_259148.pdf

Chapter 4, Risk Management Gadin, Lorente


http://stevevincent.info/CSS111_2014_2.htm

Chapter 5, Planning for Security Mendoza ,Bacoli


http://stevevincent.info/CSS111_2014_3.htm

Chapter 6, Security Technology: Firewalls and VPNs; Cabaljen

Chapter 7, Security Technology: Intrusion Detection and Prevention Systems, and other
Security Tools Babalcon
http://stevevincent.info/CSS111_2014_4.htm

Chapter 8, Cryptography Bathan


http://stevevincent.info/CSS111_2014_5.htm

Chapter 9, Physical Security Escareal


http://stevevincent.info/CSS111_2014_6.htm

Chapter 10, Implementing Information Security Tizon


http://stevevincent.info/CSS111_2014_7.htm

Chapter 11, Security and Personnel Candido


http://stevevincent.info/CSS111_2014_8.htm

Chapter 12, Information Security Maintenance Caro


http://stevevincent.info/CSS111_2014_9.htm

XV. Other/ Additional Topics as suggested by the students


________________________________________________
________________________________________________

XVI. METHODOLOGIES/STRATEGIES

1. Lecture-Discussion 4. Projects
2. Interactive Learning 5. Tandem Teaching
3. Brainstorming 6. Multimedia

XVII. EVALUATION PARAMETERS/MEASURES

Lecture Units
1. Homework/seatwork 10%
2. Quizzes 20%
3. Major Examinations (Midterm/Finals) 40%
4. Projects 10%
5. Classroom participation 10%
100%

XVIII. BIBLIOGRAPHY/REFERENCES
http://www.cengage.com/resource_uploads/downloads/1111138214_259146.pdf
http://stevevincent.info/CSS111_2014_2.htm
https://sovannarith.files.wordpress.com/2012/07/cryptology.pdf
http://support.gpgtools.org/kb/how-to/introduction-to-cryptography

Prepared by:

MARYJES G. CALADES
IT Instructor
APPROVED:

DR. MARILYN D. CARDOSO


Dean, College of Graduate Studies

You might also like