ITP 9 Syllabus
ITP 9 Syllabus
COURSE EVALUATION Class Standing, Quizzes, Unit Test, Reports, Researches, Involvement/ - 60
Recitation/Oral Exam/Discussion, Application, Performance,
Manipulation of Equipment, Exercises and other forms of
Practical texting peculiar to the course
Total 100
MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP9
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 9
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 1 ITP 7
MU-ACA-041/18May2018
REFERENCES
Printed:
Module 1:
Module 2:
“Windows 8: Explore New and Improved Security Features.” Windows 8. Accessed December 14, 2015. https://www.microsoft.com/security/pc-
security/windows8.aspx.
“What You Should Know about Windows 8 Security Features- TechRepublic.” TechRepublic. Accessed December 14, 2015. http://www.techrepublic.com/blog/it-
security/what-you-should-know-about-windows-8-security-features/.
“How to Secure Windows 10.” ZDNET. Accessed December 14, 2015. http://www.zdnet.com/article/how-to-secure-windows-10-the-paranoids-guide/.
“Turn User Account Control on or off- Windows Help.” Windows. Microsoft.com. Accessed December 16, 2015. http://windows.microsoft.com/en-
in/windows/turn-user-account-control-on-off#1TC=windows-7.
“Change or Reset a User Account Password on Your Mac.” Apple. Accessed December 16, 2015. https://support.apple.com/en-us/HT202860.
“OS X El Capitan: Set up Parental Controls.” OS X El Capitan: Set up Parental Controls. Accessed December 17, 2015. https://support.apple.com/kb/PH21683?
locale=en_US.
“Apple.” Use File Vault to Encrypt the Startup Disk on Your Mac. Accessed December 17, 2015. https://support.apple.com/en-us/HT204837.
Module 3:
“Common Malware Types: Cybersecurity 101.” Veracode. 2012. Accessed December 17, 2015. https://www.veracode.com/blog/2012/10/common-malware-
types-cybersecurity-101.
“10 Warning Signs That Your Computer Is Malware Infected – Heimdal Security Blog.” Heimdal Security Blog. 2014. Accessed December 17, 2015.
https://heimdalsecurity.com/blog/warning-signs-operating-system-infected-malware/.
“How Antivirus Software Works: Virus Detection Techniques.” SearchSecurity. Accessed December 15, 2015. http://searchsecurity.techtarget.com/tip/How-
antivirus-software-works-Virus-detection-techniques.
Landesman, Mary. “Clean, Quarantine, or Delete?” About.com Tech. Accessed December 18, 2015. http://antivirus.about.com/b/2007/03/11/clean-quarantine-
or-delete.htm.
“How to Choose the Right Antivirus Software.” COMBOFIX. Accessed December 18, 2015. http://www.combofix.org/how-to-choose-the-right-anti-virus-
software.php.
MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP9
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 9
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 1 ITP 7
MU-ACA-041/18May2018
Module 4:
“What Is Internet Security? – Definition from Technopedia.” Technopedia.com. Accessed December 03, 2015.
https://www.technopedia.com/definition/23538/internet-security.
Neagu, Aurelian. “The Ultimate Guide to Secure Your Online Browsing: Chrome, Firefox and Internet Explorer – Heimdal Security Blog.” Heimdal Security Blog,
2014. Accessed December 03, 2015. https://heimdalsecurity.com/blog/ultimate-guide-secure-online-browsing/.
“Better Web Browsing.” Better Web Browsing. Accessed December 03, 2015. https://help.riseup.net/en/security/network-security/better-web-browsing.
Saluste, Margus. “Securing Internet Explorer.” Home of Windows. Accessed December 03, 2015. https://www.winhelp.us/securing-internet-explorer.html.
“Change Edge Browser Settings in Windows 10.” The Windows Club. Accessed December 03, 2015. http://www.thewindowsclub.com/change-edge-browser-
settings-windows-10.
“What Is the Safest Web Browser? Chrome, Firefox, IE, Opera, and Safari Comparison Chart.” TiptopSecurity. Accessed December 04, 2015.
http://tiptopsecurity.com/safest-web-browser-chrome-firefox-ie-opera-safari-comparison-chart/.
“Google Chrome: Best Security Tips for Safer Browsing.” PCWorld. Accessed December 04, 2015. http://www.pcworld.com/article/2030873/google-chrome-
best-security-tips-for-safer-browsing.html.
“Whitepapers.” www.technicalinfo.net. Accessed December 04, 2015. http://www.technicalinfo.net/papers/IMSecurity.html.
McDowell, Mindi, and Allen Householder. “Keeping Children Safe Online.” US-CERT. Accessed December 04, 2015. https://www.us-cert.gov/ncas/tips/ST05-002.
Module 5
MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP9
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 9
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 1 ITP 7
MU-ACA-041/18May2018
“Social Networking Risks and Challenges.” – Information Security Awareness. Accessed December 07, 2015. http://infosecawareness.in/students/social-
networking-risks-and-challenges.
“Photo Geotagging- How It Works & How to Disable It.” Yoursphere for Parents. Accessed December 07, 2015. http://internet-
safety.yoursphere.com/2011/03/location-based-services-and-geotagging-how-they-work/.
“Geotagging Explained.” Geotagging Explained. Accessed December 07, 2015. http://everything.explained.today/Geotagging/.
Schiffner, Bill. “Could You Fall Victim to Crime Simply by Geotagging Location Info to Your Photos?” Digital Trends. July 22, 2013. Accessed December 07, 2015.
http://www.digitaltrends.com/photography/could-you-fall-victim-to-crime-simply-by-geotagging-location-info-to-your-photos/.
“Facebook.” Security Tips. Accessed December 07, 2015. https://www.facebook.com/help/379220725465972.
“How to Control Your Data on Twitter | Me and My Shadow.” | Me and My Shadow. Accessed December 07, 2015. https://myshadow.org/how-to-increase-
your-privacy-on-twitter.
Lock a windows system when not in use Securing Operating Systems 4 Class discussions Present the guidelines to R3 Module
Create a user account password for a Group discussions secure Windows 10 and 3
Windows system Guidelines to Secure Windows 10 4 MAC OS X
Change a user account password for a Laboratory work Present the 3 steps to lock a
Windows system Guidelines for MAC OS X Security 4 personal computer or laptop
Disable the guest account of a Windows when not in use
system Present to prevent
Lock out unwanted guests from a Windows automatic login of the user
system Present the methods to
Rename the administrator account of a create password in
Windows system Windows 10
Disable jump lists of a Windows system Present the methods to
Enable software updates in a Windows disable the guest account
system Present the method to lock
Enable the firewall in a Windows system out unwanted guest
Add new apps in the firewall of a Windows Present the method to
system rename the administrator
Create a new firewall rule in a Windows account
system Present the method to
Turn on Windows Defender disable jump lists
Enable BitLocker in a Windows system Present the steps to enable
Understand Windows Encrypting File System the software and Windows
Decrypt a file using EFS in a Windows system update
Disable unnecessary services in a Windows Present the steps to enable
system windows firewall
Kill unwanted processes in a Windows system Present the steps to add
Hide files and folders in a Windows system new apps in windows
Disable simple file sharing in a Windows firewall
MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP9
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 9
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 1 ITP 7
MU-ACA-041/18May2018