Professional Documents
Culture Documents
Note: This Course Syllabus may be revised and adjusted as the course progresses.
Desired Learning Outcomes Learning Content/ Subject Matter Teaching References and Assessment Time Table
Delivery Resource Materials (Achieved Learning)
PRELIM
At the end of the course the students
will be able to:
Orientation
Lecture College Students Oral recitation 3 hours
Collaborative Handbook Written Quiz
Discussion Activity
MIDTERM
Desired Learning Outcomes Learning Content/ Subject Matter Teaching References and Assessment Time Table
Delivery Resource Materials (Achieved Learning)
Page 2 of 5
Understand the computer and Why Computer Incidents Are So
internet crime and the Prevalent Lecture
components of an effective Collaborative Oral recitation 7 hours
security policy. Types of Exploits
Discussion Written Quiz
Types of Perpetrators
Ethics in Information Activity
Describes the types of ethical - Hackers
decisions that IT professionals Technology,
- Crackers
must make, as well as the 5th edition,
- Malicious Insider
business needs they must By (author) George
- Industrial Spy
balance when dealing with Reynolds
- Cybercriminal
security issues. Lecture
- Hacktivist Collaborative Oral recitation
- Cybeterrorist Discussion Written Quiz
Federal Laws for Prosecuting Activity
Computer Attacks
FINALS
Desired Learning Outcomes Learning Content/ Subject Matter Teaching References and Assessment Time Table
Delivery Resource Materials (Achieved Learning)
Page 4 of 5
Page 5 of 5