IAS101 OBE Syllabus

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Institutional A premier academic institution responsible for quality instruction and training for sustainable socio-economic, environmental and

and cultural
Vision, advancement of Bucas Grande and the global Philippines.
Mission, and
Goals : BUCAS GRANDE FOUNDATION COLLEGE
Institutional Socorro, Surigao delNorte
Excellence-driven , dynamic and globally competitive IT professionals
Intended
Learning COLLEGE OF INFORMATION TECHNOLOGY
Outcomes
Program The graduates have the ability to
Intended a. Articulate and discuss the latest developments COURSE SYLLABUS
in the specific field of practice. (Philippine Qualifications Framework (PQF) level 6 descriptor)
Learning (Graduate Outcomes: CS10, IS10, IT13) First Semester 2015-2016
Outcomes: b. Effectively communicate orally and in writing using both English and Filipino (Graduate Outcomes: CS08, IS08, IT10)
c. Work effectively and independently in multi-disciplinary and multi-cultural teams. (PQF level 6 level descriptor) (Graduate Outcomes: CS07, IS07,
IT08)
d. Act in recognition of professional, social and ethical responsibility (Graduate Outcomes: CS09, IS09, IT12)
e. Preserve and promote “Filipino Historical and cultural heritage” based on R.A. 7722)
The graduates of BS Information Technology must have the ability to
a. Analyse complex problems, and identify and define the computing requirements needed to design an appropriate solution (Graduate Outcomes:
CS02, IS02-03, IT03)
b. Apply computing and other knowledge domains to address real-world problems (Graduate Outcomes: CS01, IS01, IT01)
c. Design and develop computing solutions using a system-level perspective (Graduate Outcomes: CS03-05, IS04-05, IT05)
d. Utilize modern computing tools (Graduate Outcomes: CS06, IS06, IT07)

Course Code: IAS 1


Course Information Assurance and Security 1
Name:
Course This is a three (3) unit lecture course that provides basic principles of information assurance and security which covers the topics on
Description: vulnerabilities, threats, countermeasures, attacks, compromises and remediation throughout the entire system life cycle. It describes the legal and
ethical considerations related to the handling and management of enterprise information assets and verifies the key factors involved in authentication
and its uses in verifying identity and granting access to the system.

Course Unit: 3 units


Course Prerequisite: Programming Fundamentals 2 Course Schedule: MW 7:30-9:00
Course Towards the end of the semester, a student should have:
Intended
Learning LO1: described the major developments in the field of IAS and analyze the reasons for those developments.
Outcomes: LO2: prepared a threat analysis and recommend appropriate countermeasures.
LO3: developed a contingency plan on natural and man-made disasters that affect information assets.
LO4: created a set of policies that defend against information and software vulnerabilities.

Time Intended Learning Contents Teaching and Learning Resources Assessment References
Allotment Outcomes (ILO) Activities (TLA) Tasks (AT)
10 hours  LO1: Describe the  Fundamental Aspects of  Lecture on system  Books on  Formative  Ali Ismail
major Information Assurance and security life information and tests Awad, Aboul
developments in and Security cycle, design computer  Case studies Ella Hassanien,
the field of IAS and  History and principles and security  Prelim Exam Kensuke Baba.
BUCAS GRANDE FOUNDATION COLLEGE
Socorro, Surigao delNorte

COLLEGE OF INFORMATION TECHNOLOGY

COURSE SYLLABUS
First Semester 2015-2016

Course Policies:
1. Grading System
Summative Assessment 60%
Pre-Midterm, Midterm, Pre-FinalAnd Final Examinations
Formative Assessment 20%
Quizzes, Assignments, Seatwork
And Hands- on Exercises
Creative Assessments 20%
Projects/Transforms
TOTAL 100%

MidtermGrade+2 ( FinalGrade )
Final Grade =
3

Prepared by: Reviewed by: Approved:

JESSEVIM R. GALEON, MIT N/A DR. JERRY D. MADERA


Dean VP for Academics

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy