You are on page 1of 3

SOFTNET Information Technology Center FAB, Mariveles, Bataan

COURSE TITLE: Diploma in INFORMATION TECHNOLOGY


NAME of INSTITUTION: SOFTNET Information Technology Center

ANNEX B - Curriculum Map Matrix


COURSE DESCRIPTION TEACHING AND LEARNING
COURSE TOPICS (Modules) Course Outcome ASSESSMENT CRITERIA DURATION
(Content) EXPERIENCES
(Competency)
SOFTNET Information This
Cybersecurity Technology
course isCenter  Prominent internet At the end of the BLENDED  Written FAB, Mariveles,
80 Bataan
designed to provide able antivirus TEACHINGONLINE
course, the students LEARNING: ASSESSMENT
& LEARNING (LMS)
CREDITS
COURSE DESCRIPTION COURSE OUTCOME
an overview and software for should be able to:  CBLM
EXPERIENCES CRITEIA  Portfolio
(# OF UNITS)
Cybersecurity
understanding of businesses;
At the end of the course, the BLENDED  E-media/Video  Writt Evaluation
established cyber students
Why should
shouldworld
be able to: ONLINE LEARNING: Presentation en  Project or
This course is designed
security strategytoas organizations invest  Evaluate the  CBLM  Interactive Lecture / (LM Work Sample
providewell
an overview and in strong computer E-media/VideoDiscussion (LMS) S)  Demonstration
as provide
understanding of established
students with the
antimalware?
 Evaluate the computer network and Presentation  Demonstration  Portf with Oral
 An analysis of the
cyber security strategy
opportunity to as network and informationinformation  InteractiveLecture
Group/ Discussion olio Questioning
history, impacts, Evalu (Task/Job
well as provide
engage in students
strategicwith  remedies
and security needs
of of an  security needsDiscussion (LMS)LEARNING
DISTANCE
ation Sheet)
decision making
the opportunity to engage in in organization.  Demonstration
 CBLM(Cybersecurity
ransomware; of an  Proje  Direct
strategicthe contextmaking
decision of cyberin  Mechanisms  Group Discussion
)
 Assess cybersecurity risk organization. Downloadable Resources
ct or observation
security. The course
the context of cyber security. through which DISTANCE LEARNING Work
management policies in Assess
will will
The course assess current
assess antimalware  CBLM(Cybersecurity) Samp
order to adequately cybersecurity
software senses and Downloadable Resources
current threats
threats in
in varying
varying protect an organization'srisk
le
contexts including
contexts including
prevents attacks;
critical information and management  Dem
conducting a threat  The functionality of onstr
conducting a threat or assets.viruses;
encrypting policies in order ation
or vulnerability
vulnerability assessment for  A comparison of the to adequately with
assessment for a
a non-profit or government security measures protect an Oral
non-profit or  Measure
service government
organization,service
as well used by top the performance organization's Quest
of security
operating systems;systems withincritical ionin
as evaluate current as well
organization, g
an
 Security of enterprise-level information and
methodology and current
as evaluate (Task 3
information
computer hardware system. assets.
approaches to pave the
methodology andway /Job
from attacks; Sheet
approaches toand
for the development pave  The relationship )
the way for
implementation the
of cyber  Troubleshoot,
between cookies maintain
 and
development and update an enterprise-level
Measure the  Direc
security strategy at the and cybersecurity; performance of t
implementation
organization or corporate of  How information
does firewall security security systems obser
level. cyber security help system.
in the within an vatio
strategy at the prevention of
enterprise-level n
organization or network crimes?
information
corporate level.  The  connection
Implement continuous
system.
network
between file monitoring and
downloads
provide andreal-time security
cybersolutions.
security;
 Troubleshoot,
 How can phishing
 criminals
by be update and maintain and
Formulate,
communicate
stopped? short- and update an
long-term
 An analysis of theorganizationalenterprise-level
cybersecurity
usefulness of strategies information
and policies.
encryption security system.
algorithms;
SOFTNET Information Technology Center FAB, Mariveles, Bataan

Annex C. CURRICULUM MAP ALIGNING COURSE OUTCOME and PROGRAM LEARNING OUTCOME

You might also like