ITP 12 Syllabus
ITP 12 Syllabus
COURSE EVALUATION Class Standing, Quizzes, Unit Test, Reports, Researches, Involvement/ - 60
Recitation/Oral Exam/Discussion, Application, Performance,
Manipulation of Equipment, Exercises and other forms of
Practical texting peculiar to the course
Total 100
MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP12
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 12
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 2 ITP 9
MU-ACA-041/18May2018
REFERENCES
Printed:
Module 6:
Harrison, John. “The Top Four Email Security Threats – And How To Avoid Them.” The Top Four Email Security Threats – And How to Avoid Them. Accessed
December 28, 2015. http://www.business-software.com/blog/the-top-four-email-security-threats-and-how-to-avoid-them/.
“Nigerian Scams.” Australian Competition and Consumer Commission. Accessed December 28, 2015. https://www.scamwatch.gov.au/types-of-scams/unexpected-
money/nigerian-scams.
“Using Filters.”- Gmail Help. Accessed December 28, 2015. https://support.google.com/mail/answer/6579?hl=en.
“Secure Messages with a Digital Signature.” – Outlook. Accessed December 28, 2015. https://support.office.com/en-US/article/Secure-messages-with-a-digital-
signature-549ca2f1-a68f-4366-85fa-b3f4b5856fc6.
Behrens, Matt. “Understanding Encryption- Symmetric, Asymmetric, and Hashing.” Atomic Spin. November 02, 2014. Accessed December 28, 2015.
http://spin.atomicobject.com/2014/11/20/encryption-symmetric-asymmetric-hashing/.
MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP12
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 12
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 2 ITP 9
MU-ACA-041/18May2018
Module 7
Leggett, Jonathan.”Mobile Operating Systems – What Are They and Which Is Best?” USwitch Mobile Phone Deals. November 03, 2015. Accessed January 05, 2016.
http://www.uswitch.com/mobiles/guides/mobile-operating-systems/.
Cooney, Michael. “10 Common Mobile Security Problems to Attack.” PCWorld. Accessed January 05, 2016. http://www.pcworld.com/article/2010278/10-common-
mobile-security-problems-to-attack.html.
Minar, Nateq Be Nazir lbn. “Bluetooth Security Threats and Solutions: A Survey.” International Journal of Distributed and Parallel Systems IJDS 3, no. 1 (2012): 127-
48. Accessed January 05, 2016. http://www.airccse.org/journal/ijds/papers/0112ijdps10.pdf
“IOS Security.” Apple. Accessed January 06, 2016. https://www.apple.com/business/docs/iOS_Security_Guide.pdf.
Hildenbrand, Jerry. “Keeping Your Android, and Your Data, Safe and Secure.” Android Central. October 10, 2015. Accessed January 06, 2016.
http://www.androidcentral.com/keeping-your-android-secure.
“Getting Started.” Tips to Help Your Phone Secure. Accessed January 06, 2016. https://www.windowsphone.com/en-in/how-to/wp8/basics/tips-to-help-keep-my-
phone-secure.
Module 8
“Private, Public, Hybrid Clouds.” Types of Cloud Computing. Accessed January 07, 2015. http://thecloudtutorial.com/cloudtypes.html.
Vernier, Dominique. “How Does Cloud Computing Work?” Thoughts On Cloud. February 07, 2014. Accessed January 07, 2016.
http://www.thoughtsoncloud.com/2014/02/how-does-cloud-computing-work/.
“Why Move To The Cloud? 10 Benefits of Cloud Computing.” Salesforce UK Blog. Accessed January 07, 2016. https://www.salesforce.com/uk/blog/2015/11/why-
move-to-the-cloud-10-benefits-of-cloud-computing.html.
“9 Worst Cloud Security Threats.” Information Week. Accessed January 08, 2016. http://www.informationweek.com/cloud/infrastructure-as-a-service/9-worst-
cloud-security-threats/d/d-id/1114085.
“Cloud Computing: Privacy, Confidentiality and the Cloud.” Cloud Computing: Privacy, Confidentiality and the Cloud. Accessed January 08, 2016.
https://technet.microsoft.com/en-us/magazine/dn235775.aspx.
MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP12
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 12
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 2 ITP 9
MU-ACA-041/18May2018
Module 9
Mitchell, Bradley. “An Introduction to LANs, WANs, and Other Area Networks.” About.com Tech. March 29, 2015. Accessed January 11, 2016.
http://compnetworking.about.com/od/basicnetworkingconcepts/a/network_types.htm.
“Wi-Fi vs. Ethernet: How Much Better Is a Wired Connection?” How To Geek RSS. Accessed January 11, 2016. http://www.howtogeek.com/217463/wi-fi-vs.-
ethernet-how-much-better-is-a-wired-connection/.
“Wireless Networks – Types of Wireless Networks.” WiFi Notes. Accessed January 11, 2016. http://www.wifinotes.com/wireless-networks.html.
“Set Up Windows 8 to Connect to a Network.”- For Dummies. Accessed January 12, 2016. http://www.dummies.com/how-to/content/set-up-windows-8-to-
connect-to-a-network.html.
“How to Manage Wireless Network Connections in Windows 10.” Windows Central. Accessed January 12, 2016. http://www,windowscentral.com/how-manage-
wireless-network-connections-windows-10.
“A List of Wireless Network Attacks.” SearchSecurity. Accessed January 12, 2016. http://searchsecurity.techtarget.com/feature/A-list-of-wireless-network-attacks.
Module 10
“Data Backup and Recovery.” Data Backup and Recovery. Accessed January 14, 2016. https://msdn.microsoft.com/en-us/library/bb727010.aspx.
“7 Greatest Causes of Data Loss.” Data Safety Tips. Accessed January 14, 2016. http://www.databackuponlinestorage.com/7_Causes_of_Data_Loss.
“What Are Online Backup Advantages.” SafeBACKUP Advice. Accessed January 14, 2016. http://www.databackuponlinestorage.com/Online_Backup_Advantages.
“How to Back Up Windows.” How to Backup Windows: Your Complete Guide to PC Backup. Accessed January 14, 2016. https://www.backblaze.com/data-back-
up/pc-backup.html.
“Use Time Machine to Back up or Restore Your Mac.” Apple. Accessed January 14, 2016. https://support.apple.com/en-in/HT201250.
MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP12
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 12
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 2 ITP 9
MU-ACA-041/18May2018
R4: Michael E. Whitman & Herbert J. Mattord, “Principles of Information Security”, 6 th Edition ©2018, Cengage Learning
Online:
MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP12
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 12
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 2 ITP 9
MU-ACA-041/18May2018
enabling
Passcode
Protection
enabling Touch
ID, enabling
auto-lock
enabling limit
ad tracking
enabling data
backup
enabling Find
my phone app
Setting SIM
Lock
Encrypting
Android Phone
Enabling
Android Device
Manager
Networks
Present steps in
securing network
connections
FINAL EXAMINATION
Approved by: