You are on page 1of 12

SAINT FELICITY COLLEGE

M. Almeda St., San Roque, Pateros, MM

COLLEGE VISION COLLEGE MISSION


The College of Information Technology Education The College of Information Technology Education is
(CITE) envisions itself to become a center committed to produce globally competitive graduates
of development that produces globally competitive, that are responsive to the industry needs locally
self- righteous, expert and innovative, ITE and internationally, God-fearing, and can deliver and
professionals. do research which are original, innovative and relevant.

COLLEGE OBJECTIVES
After Five Years, CITE ensures that:
 80% has worked as an IT-related post such as network management, animation, programming,
information system and business analytics
 50% still active in the fie of IT
 10% being recognized for an outstanding work with respect to an IT solution

PROGRAM OUTCOMES

ITO1. Apply knowledge of business processes, computing, mathematics and social


sciences appropriate to information systems
ITO2. Analyze a problem, identify and define the computing requirements with respect
to organizational factors appropriate to its solution and plan strategies for their solution.
ITO3. Evaluate information systems in terms of general quality attributes and possible trade-
offs presented within the given requirement.
ITO4. Design, implement, and evaluate information systems, processes, components, or programs
and to source cost-benefit efficient alternatives to meet desired needs, goals and constraints.
IT05. Use knowledge and understanding of enterprises in modelling and design of information
systems

IT06. Deploy and use effectively skills, tools and techniques necessary for information systems
practice

IT07. Function effectively on teams (recognizing the different roles within a team and different
ways of organizing teams) to accomplish a common goal.
IT08. Communicate effectively with a range of audiences. Communication skills includes
technical writing, presentation and negotiation, and numeracy.
IT09. Recognize the legal, social, ethical and professional issues involved in the exploitation
of computer technology and be guided by the adoption of appropriate professional, ethical and
legal practices both in the local and global community.
IT10. Recognize the need for and engage in an independent and life-long learning, planning
self- learning and improving performance as the foundation for on-going professional development.

SAINT FELICITY COLLEGE OBE SYLLABUS / College of Information Technology Education/ CS 401 Page 1 of 11
COURSE SYLLABUS
PROGRAM: BACHELOR OF SCIENCE IN INFORMATION SYSTEM/COMPUTER SCIENCE
COURSE CODE: CS 303
COURSE TITLE: Algorithms and Complexity
PRE-REQUESITE/S 3rd Year Standing 3rd Year; 1st Semester
Lecture - 3 units;
NO. OF UNITS: COURSE DESCRIPTION:

The course focuses in the


implementation of the
proposed IT solution
during the Capstone
Project 1. It aims to
evaluate and interpret
Lecture – 3 hours/week; the performance
CONTACT HOURS: results of the IS solution
based on identified
evaluation metrics.

ALIGNMENT OF PROGRAM OUTCOMES, COURSE OUTCOMES AND LEARNING OUTCOMES


PROGRAM OUTCOMES COURSE OUTCOMES:
Program: BSIS Course: IT 402 LEARNING OUTCOMES
1. Apply knowledge of On the completion of this
At the end of this course, the
computing fundamentals, course, the students are students are able to:
expected to:  Explain the
knowledge of a computing  Explain security domains
importance of
specialization, and mathematics, impact information information security,
assurance and computer landscape and well-
science and domain knowledge
security. known cyber attacks
appropriate for the computing  Distinguish the information  Evaluate threats,
security management, vulnerabilities,
models from defined problems
information system security security policies,
and requirements. assessment, and evaluation general password
and evaluation and rules and potential
2. Identify, analyses, formulate,
risks.
application of security
research literature and solve  Different internet,
methodologies.
DMZ, extranet and
complex computing problems  Demonstrate proper intranet.
ethical consideration.
and requirements reaching  Illustrate firewalls, proxy
substa and requirements servers, intrusion detection
reaching substantial conclusions and prevention systems.
using fundamental principles of  Explain virtual private
mathematics, computing networks.
sciences and relevante domain  Differentiate Linux OS
disciplines  Familiarize Linux command
3. An ability to apply line interface.
mathematical fundamentals,  Determine user accounts
algorithmic principles and and permissions.
computer science theory in the  Differentiate botnets,
modeling and design of Trojans, worms, virus,
computer based systems in a ransom ware, adware and
way that demonstrates spyware.
comprehension of the tradeoffs  Identify the steps to prevent
involved in design choices. malware attack.
4. Knowledge and  Classify phishing campaign
understanding of information and social engineering
security issues in relation to attacks.
design, development and use of
 Compare host with
information technology.
hardware security.
5. Design and evaluate solutions
 Explain virtualization,
for complex computing
VMware and virtual box.
problems and design and
 Identify access controls and
evaluate systems, components,
authentication factors.
or processes that meet specified
 explain
needs with appropriate
 Identify access controls and
consideration for public health
authentication factors.
and safety, cultural, societal and
 Explain best practices for
environment considerations.
account management.
6. Create, select, adapt and  Analyze block and
apply appropriate techniques, stream cyphers, symmetric
resources and modern encryption.
computing tools to complex  Familiarize with hashing
computing activities, with an algorithms, and learn
understanding of the limitations event handling
to accomplish a common goal.  Identify the types of hash,
7. Function effectively as an MD5, SHA, and AES.
individual and as a member or  Demonstrate public key
leader in diverse teams and in infrastructure.
multidisciplinary settngs.  Differentiate denial of
8. Communicate effectively service attack (DOS) with
with the computing community distributed denial of
and with the society at large service attack (DDOS).
about complex computing  Construct SQL injection
activities by being able to and cross site scripting.
comprehend and write effective  Explain brute force, key
reports, design documentation, logger and dictionary
make effective presentations, attack.
and give and understand clear
instructions.
9. An ability to recognize the
legal, social, ethical and
professional issues involved in
the utilization in the utilization
of computer technology and be
guided by adoption of
appropriate professional, ethical
and legal practices.
10. recognize the need and have
The ability to engage in
independent learning for
continual development as a
computing professional.
SAINT FELICITY COLLEGE
M. Almeda St., San Roque, Pateros, MM

LEARNING PLATEACHING LEARNING


TEACHING LEARNING ACTIVITIES ASSESSMENT TASK RESOURCES
WEEK LEARNING OUTCOMES TOPIC/CONTENT CLASSROOM TIME LABORATORY TIME ASSESSMENT TOOL

Identify the topics to be Course Plan, Course Selected Response - Student Handbook
Covered for the rest of the Guidelines and Rules (MCQ) Answer key - Textbook
1 Semester. Didactic 2 hours Lecture 3 hours - Course Syllabus
Recite the vision and
Mission of SFC

Explain the importance of Information Security Multiple Choice,


2 information security Internet of Things Matching type, - Textbook
Landscape and well- (IoT) Machine Problem Answer key - Online Materials
Known cyber-attacks Didactic 2 hours Demonstration 3 hours Rubrics - Course Syllabus

3 Evaluate threats, vulnerabili CIA Triad (Confiden Didactic 2 hours Demonstration 3 hours Multiple Choice,
Ties, security policies, gene tiality. And Availability) Matching type,
ral password rules and Machine Problem
Potential risks.

Differentiate internet, DMZ Basic Networks Zone Didactic 2 hours Demonstration 3 hours Matching type, Fill Answer key - Textbook
4-5 extract and entranet and in the blanks Rubrics - Online Materials
Intranet Machine Problem - Course Syllabus

Illustrate firewalls, proxy Secure Network Design


Servers, intrusion detection
And prevention system.

Explain virtual private net-


Works.

6 PRELIMINARY EXAM
SAINT FELICITY COLLEGE
M. Almeda St., San Roque, Pateros, MM
SAINT FELICITY COLLEGE
M. Almeda St., San Roque, Pateros, MM

7 Differentiate internet, Linux Linux Foundation Didactic 2 hours Demonstration 3 hours Matching type, Answer key - Textbook
command line interface. Fill in the blanks Rubrics - Online Materials
Determine user accounts Linux VS Unix Machine Problem - Course Syllabus
and permissions.

Differentiate bonnets,
8 Trojans, worms, virus, Type of Malwares Didactic 2 hours Demonstration 3 hours Matching type, Answer key - Textbook
ransom ware, adware and Fill in the blanks Rubrics - Online Materials
spyware. Machine Problem - Course Syllabus

Identify the steps to


prevent malware attack.

Classify phishing campaign


9 and social engineering
attacks. Digital Forensic Didactic 2 hours Demonstrate 3 hours Matching type, Answer key - Textbook
Fill in the blanks Rubrics - Online Materials
Compare host with Machine Problem - Course Syllabus
hardware security. Applications, Security
10
controls and
Explain best practices for Techniques
account management.

Identify access controls and


authentication factors Authentication Didactic 2 hours Demonstrate 3 hours Matching type, Answer key - Textbook
11 services Fill in the blanks Rubrics - Online Materials
Explain best practices for Machine Problem - Course Syllabus
account management

12 MIDTERM
EXAMINATION

Analyze block and stream


13-14 cyphers, symmetric and Cryptography Didactic 2 hours Demonstrate 3 hours Matching type, Answer key - Textbook
asymmetric encryption Fill in the blanks Rubrics - Online Materials
Machine Problem - Course Syllabus

Didactic 2 hours Demonstrate 3 hours


SAINT FELICITY COLLEGE
M. Almeda St., San Roque, Pateros, MM
Familiarize with hashing
algorithms, and learn event
handling

Identify the types of hash,


14 MD5, SHA and AES. WEP, WPA and Didactic 2 hours Demonstrate 3 hours Matching type, Answer key - Textbook
WPA2 Fill in the blanks Rubrics - Online Materials
Demonstrate public key Machine Problem - Course Syllabus
infrastructure.

Differentiate denial of
15 service attacks (DOS) with Cyber Attacks Didactic 2 hours Demonstrate 3 hours Matching type, Answer key - Textbook
distributed denial of Fill in the blanks Rubrics - Online Materials
service attack (DDOS) Machine Problem - Course Syllabus

Construct SQL injection and


16 cross site scripting. Web Application Didactic 2 hours Demonstrate 3 hours Matching type, Answer key - Textbook
Hacking Fill in the blanks Rubrics - Online Materials
Machine Problem - Course Syllabus

Explain brute force, key


17 logger and dictionary Basic Password Didactic 2 hours Demonstrate 3hours Matching type, Answer key - Textbook
attack. Cracking Fill in the blanks Rubrics - Online Materials
Machine Problem - Course Syllabus

FINAL
18
EXAMINATION
SAINT FELICITY COLLEGE
M. Almeda St., San Roque, Pateros, MM

s
COURSE POLICIES

1. ATTENDANCE: A student is required to attend his classes regularly. Punctuality is an essential part of class attendance. When a student accumulates absences that are
equivalent to 20% or more of the required number of hours in this subject, he/she automatically obtains a grade of 5.0.
2. CLASS PARTICIPATION: All students are strongly encouraged to ask questions during class sessions. Students can also present their ideas on topic regardless of whether they
are consistent with those of the instructor or author of the textbook they are using. Students are not free to talk or whisper with individual during class session.
3. MISSED EXAMS AND ASSIGNMENT: Students who will miss any major examination will be given a chance to take the said examination after a week of the scheduled major
examination and will be required to present a special permit from the cashier’s office. No make up for any missed quizzes nor assignment
4. ACADEMIC HONESTY: All students are to adhere to high standards of integrity in their academic work. Plagiarism and cheating are not acceptable and will not be condoned
by the college. Students involved in such activities are subject to serious disciplinary action. For further explanation on this topic, please refer to the SFC Student Handbook.

GRADING SYSTEM

Average of quizzes (3 quizzes) + Class standing ( Recitation, Term paper, Seatwork, Oral Report, Assignment) +Prelim Exam
PRELIM GRADE 3
Average of quizzes (3 quizzes) + Class standing ( Recitation, Term paper, Seatwork, Oral Report, Assignment) + Midterm Exam
MIDTERM GRADE 3
Average of quizzes (3 quizzes) + Class standing ( Recitation, Term paper, Seatwork, Oral Report, Assignment) + Pre Final Exam
PRE-FINAL GRADE 3
Prelim Grade + Midterm Grade + Pre Final Grade
FINAL GRADE 3

REFERENCES

Maria Behan, 2016, Beginner’s Guide t Information Security: Kick start your security career with insight InfoSec experts.
TEXTBOOKS
JOURNALS Richard E. Smith, 2015, Elementary Information Security. Barrett Tagliarino, 2015, Information Assurance Handbook: Effective Computer
Security and Risk Management Strategies
WEBSITE

SAINT FELICITY COLLEGE OBE SYLLABUS / College of Information Technology Education/CS 401 Page 10 of
11
OTHER REFERENCES
PREPARED BY: REVIEWED BY: APPROVED BY:

JULIUS C. CODILAN
HYDIE DC. CRUZ MARMELO V. ABANTE, DIT
DEAN BE College Committee Representative OBE Core Committee Representative

You might also like