You are on page 1of 5

CITY COLLEGE OF CALAMBA

Program: Bachelor of Science in Information Technology

Outcomes – Based Teaching and Learning Plan in INFORMATION ASSURANCE & SECURITY 2

Course Title Information Assurance & Security 2 Course Code IAS 301

Credit Units 3 Course Pre-/Co-requisites IAS 202

Course Description This course will discuss and define what is meant by IAS, understand its concept and views of IAS, Explain the 4 security domains, Learn on how to
(Based on CMO No. 25 Series of have a good IA outcome. It will also discuss what information security, its principles and policies is. This module will also discuss the path of Information
2015)
Security and what would it take to be a good practitioner on this field.
At the end of this program, students will have the ability to:

1. Apply knowledge of computing, science, and mathematics appropriate to the discipline.


Program Intended Learning 2. Understand best practices and standards and their applications
Outcomes (PILO)
3. Identify and analyze user needs and take them into account in the selection, creation, evaluation and administration of computer-based systems.
4. Design, implement, and evaluate computer-based systems, processes, components, or programs to meet desired needs and requirements under various constraints.
5. Apply knowledge through the use of current techniques, skills, tools and practices necessary for the IT profession.
6. Communicate effectively with the computing community and with society at large about complex computing activities through logical writing, presentations, and
clear instructions.
7. Understand professional, ethical, legal, security and social issues and responsibilities in the utilization of information technology.

At the end of this course, the students should be able to:

1. Learn on how to perform Information Security and Assurance


Course Intended Learning 2. Learn the principles and policies of IAS
Outcomes (CILO)
3. Describe the cyber security principles
4. Use Firewalls, endpoint security, network security
5. Distinguish the resources to implement a process

PRELIMINARY Essential Learning Suggested


Intended Teaching/Learning Assessment
Declarative Learning Tasks (ATs)
Week Content Standards Functional Knowledge Activities (TLAs)
Knowledge Outcomes (ILO)
1. Demonstrate understanding on 1. Importance of data 1. The learner independently 1. Explain understanding of the Reading/lecture followed by Class Discussion
the identify the and information demonstrates difference activities and efforts that need presentation Oral Recitation
difference of information between data, information and to be undertaken to implement Reflective Journal Assignment.
2. Differentiate information knowledge IAS policies and procedures Finding a suitable client and
with data vs knowledge identifying the problem.
2. Learners identify clearly what is the 2. Follow metrics and in Infosec Research and presentation
2. Describes, identify and source of information. and Assurance to the class on companies
differentiate identify 3. Clear understanding on
with IAS job function
what is information and its
difference of 3. Create new Information
source 3. Learners will identify the IAS
information with Security Policies
domains and its impact to
knowledge organization
4. Determine the IAS domains,
3. Describe the type and how it will impact the 4. The learner will independently 4. Explain the IAS domains and
of information organization as a whole address several components its relevance to the
and levels of IA organization
4. Demonstrate the domains 5. Determine the components
of IAS and levels for IA.

5. Understand the 6. Get the full grasp of InfoSec


components and levels of and assurance.
1–6 IA

6. Understand and
identify Information
Security

7. Understand and identify


information security
and assurance
MIDTERMS
1. Demonstrates understand 1. Impact of privacy 1. The learner independently define 1. Privacy issues in social media Reading/lecture followed Class Discussion
Privacy-preserving preserving in social what is privacy in social by presentation Oral Recitation
Services: Social Networking networking networking 2. Identify system flaws, errors and Documentation of SQA Assignment
bugs on this social media process
2. Demonstrates 2. Criteria for 2. The learner appreciate the value of platform Presentation of recent
understanding determining Internet having internet privacy cybersecurity attacks
about Privacy Issues
3. Issues in cybersecurity and how
Internet Privacy Issues to resolve these issues
3. The learner independently can
3. Demonstrates identify resolution for privacy
3. How to resolve
7 – 12 understanding on privacy issues
issues
Privacy
issues and how to resolve 4. The learner can identify the
these issues. 4. Defining the IA and
difference between IA and
cybersecurity
cybersecurity
4. Demonstrate
understanding on the
difference between IA and
cyber security

FINALS
1. Demonstrates 1. Understand the role 1. The learner independently Final Project Presentation. Reading/lecture Oral Recitation
understanding of of firewall and its what and why firewall is Firewall brand and models, followed by Project
what firewall is importance important features and functionalities. presentation
Trends and technologies
2. Identifying the types of 2. What firewall to 2. The learner independently involve.
firewall implement exhibits the values of
3. implementing firewall
Understand what 3. The learner can grasp
3. How does
cloud security is the cloud security
cloud security
4.
Benefits of cloud works principle
5. 4. The learner will be able to
4. Defining the
security Threats in importance of putting understand the behavior of
13 – 18 6.
security in the cloud machine learning to security
cloud security
5. Machine
7. learning
Understanding
behaviour to
machine
security
learning
8.
security

How does machine


learning security work

Benefits of machine
learning security

Basic Readings ● Internet governance, Griffin, 2019


● Cloud Computing: Security and Management, Suarez, 2016

Extended Readings ● CCC student handbook Syllabus


● https://securitytoday.com/Articles/2019/09/03/3-Major-Internet-Privacy-Issues-and-How-to-Avoid-Them.aspx?Page=2
https://onlinedegrees.sandiego.edu/information-assurance-vs-cybersecurity/
https://www.cisco.com/c/en/us/products/security/cloud-security/what-is-cloud-security.html#~types-of-threats
https://secureswissdata.com/internet-privacy-issues/
● https://www.isaca.org/resources/isaca-journal/past-issues/2012/fundamental-concepts-of-it-security-assurance
https://www.techopedia.com/definition/5/information-assurance-ia
https://www.researchgate.net/publication/220349069_Information_Assurance_and_Security/link/0deec52a0a73ee8159000000/download
https://www.bestcollegereviews.org/faq/what-is-information-assurance-and-security/
● https://www.youtube.com/watch?v=euRX6o9ALXk
● https://www.youtube.com/watch?v=RtmuuWg_dkQ
● https://www.youtube.com/watch?v=eUxUUarTRW4
● https://www.youtube.com/watch?v=U_P23SqJaDc
● https://www.youtube.com/watch?v=iFGve5MUUnE
Course Policies Attendance
▪ As identified in the student handbook

Grading System
Input - 30%
Process - 30%
Outcomes - 40%
100%

Classroom Rules and Regulations


1. 15 minutes late is considered absent.
2. Class participation is highly encouraged.
3. Collaboration is promoted in special requirements.
Committee Members
Committee Leader:
Committee member:

Consultation Faculty Member : Dr. Freedom John Ferrera


Schedule Contact Number : 0917-538-1342
E-mail address : freedom.ferrera@gmail.com
Consultation Hours :
Time and Venue :

Course Title A.Y. Term of Affectivity Prepared by Checked by Approved by Page/s


5
Information Security and Assurance 2 2019 – 2020 Freedom John Ferrera, Ph.D.

Prof Arwie Fernando Dr. Ronald A. Gonzales

You might also like