100% found this document useful (1 vote)
256 views15 pages

ITP 12 Syllabus

Uploaded by

Gretel T Ricalde
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
256 views15 pages

ITP 12 Syllabus

Uploaded by

Gretel T Ricalde
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

MISAMIS UNIVERSITY Prepared by: Gretel T.

Ricalde Document Code: Page 1 of 13


Oroquieta City Instructor MU-DIT-SYL-IG-ITP12
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 12
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 2 ITP 9
MU-ACA-041/18May2018

A. COURSE SYLLABUS DETAILS

COURSE TITLE INFORMATION ASSURANCE AND SECURITY 2


COURSE DESCRIPTION This course focuses on policies and practices to systems integration and architecture in ensuring secure system operation and information
assurance; vulnerability analysis of a system; and the strategies on how to counter-attack threats.
CONTACT HOURS 2 hours lecture/ 3 hours laboratory
PRE-REQUISITE ITP 9
CO-REQUISITE None
CREDIT UNITS 3.0
Percentage

Periodical Examinations (Prelim, Midterm, Semifinals and Finals) - 40

COURSE EVALUATION Class Standing, Quizzes, Unit Test, Reports, Researches, Involvement/ - 60
Recitation/Oral Exam/Discussion, Application, Performance,
Manipulation of Equipment, Exercises and other forms of
Practical texting peculiar to the course

Total 100
MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP12
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 12
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 2 ITP 9
MU-ACA-041/18May2018

REFERENCES
Printed:

R1: Misamis University Student Handbook

R2: Course Syllabus/Instructor Guide

R3: CSCU Downloaded Courseware

Module 6:

 Harrison, John. “The Top Four Email Security Threats – And How To Avoid Them.” The Top Four Email Security Threats – And How to Avoid Them. Accessed
December 28, 2015. http://www.business-software.com/blog/the-top-four-email-security-threats-and-how-to-avoid-them/.
 “Nigerian Scams.” Australian Competition and Consumer Commission. Accessed December 28, 2015. https://www.scamwatch.gov.au/types-of-scams/unexpected-
money/nigerian-scams.
 “Using Filters.”- Gmail Help. Accessed December 28, 2015. https://support.google.com/mail/answer/6579?hl=en.
 “Secure Messages with a Digital Signature.” – Outlook. Accessed December 28, 2015. https://support.office.com/en-US/article/Secure-messages-with-a-digital-
signature-549ca2f1-a68f-4366-85fa-b3f4b5856fc6.
 Behrens, Matt. “Understanding Encryption- Symmetric, Asymmetric, and Hashing.” Atomic Spin. November 02, 2014. Accessed December 28, 2015.
http://spin.atomicobject.com/2014/11/20/encryption-symmetric-asymmetric-hashing/.
MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP12
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 12
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 2 ITP 9
MU-ACA-041/18May2018

Module 7

 Leggett, Jonathan.”Mobile Operating Systems – What Are They and Which Is Best?” USwitch Mobile Phone Deals. November 03, 2015. Accessed January 05, 2016.
http://www.uswitch.com/mobiles/guides/mobile-operating-systems/.
 Cooney, Michael. “10 Common Mobile Security Problems to Attack.” PCWorld. Accessed January 05, 2016. http://www.pcworld.com/article/2010278/10-common-
mobile-security-problems-to-attack.html.
 Minar, Nateq Be Nazir lbn. “Bluetooth Security Threats and Solutions: A Survey.” International Journal of Distributed and Parallel Systems IJDS 3, no. 1 (2012): 127-
48. Accessed January 05, 2016. http://www.airccse.org/journal/ijds/papers/0112ijdps10.pdf
 “IOS Security.” Apple. Accessed January 06, 2016. https://www.apple.com/business/docs/iOS_Security_Guide.pdf.
 Hildenbrand, Jerry. “Keeping Your Android, and Your Data, Safe and Secure.” Android Central. October 10, 2015. Accessed January 06, 2016.
http://www.androidcentral.com/keeping-your-android-secure.
 “Getting Started.” Tips to Help Your Phone Secure. Accessed January 06, 2016. https://www.windowsphone.com/en-in/how-to/wp8/basics/tips-to-help-keep-my-
phone-secure.

Module 8

 “Private, Public, Hybrid Clouds.” Types of Cloud Computing. Accessed January 07, 2015. http://thecloudtutorial.com/cloudtypes.html.
 Vernier, Dominique. “How Does Cloud Computing Work?” Thoughts On Cloud. February 07, 2014. Accessed January 07, 2016.
http://www.thoughtsoncloud.com/2014/02/how-does-cloud-computing-work/.
 “Why Move To The Cloud? 10 Benefits of Cloud Computing.” Salesforce UK Blog. Accessed January 07, 2016. https://www.salesforce.com/uk/blog/2015/11/why-
move-to-the-cloud-10-benefits-of-cloud-computing.html.
 “9 Worst Cloud Security Threats.” Information Week. Accessed January 08, 2016. http://www.informationweek.com/cloud/infrastructure-as-a-service/9-worst-
cloud-security-threats/d/d-id/1114085.
 “Cloud Computing: Privacy, Confidentiality and the Cloud.” Cloud Computing: Privacy, Confidentiality and the Cloud. Accessed January 08, 2016.
https://technet.microsoft.com/en-us/magazine/dn235775.aspx.
MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP12
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 12
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 2 ITP 9
MU-ACA-041/18May2018

Module 9

 Mitchell, Bradley. “An Introduction to LANs, WANs, and Other Area Networks.” About.com Tech. March 29, 2015. Accessed January 11, 2016.
http://compnetworking.about.com/od/basicnetworkingconcepts/a/network_types.htm.
 “Wi-Fi vs. Ethernet: How Much Better Is a Wired Connection?” How To Geek RSS. Accessed January 11, 2016. http://www.howtogeek.com/217463/wi-fi-vs.-
ethernet-how-much-better-is-a-wired-connection/.
 “Wireless Networks – Types of Wireless Networks.” WiFi Notes. Accessed January 11, 2016. http://www.wifinotes.com/wireless-networks.html.
 “Set Up Windows 8 to Connect to a Network.”- For Dummies. Accessed January 12, 2016. http://www.dummies.com/how-to/content/set-up-windows-8-to-
connect-to-a-network.html.
 “How to Manage Wireless Network Connections in Windows 10.” Windows Central. Accessed January 12, 2016. http://www,windowscentral.com/how-manage-
wireless-network-connections-windows-10.
 “A List of Wireless Network Attacks.” SearchSecurity. Accessed January 12, 2016. http://searchsecurity.techtarget.com/feature/A-list-of-wireless-network-attacks.

Module 10

 “Data Backup and Recovery.” Data Backup and Recovery. Accessed January 14, 2016. https://msdn.microsoft.com/en-us/library/bb727010.aspx.
 “7 Greatest Causes of Data Loss.” Data Safety Tips. Accessed January 14, 2016. http://www.databackuponlinestorage.com/7_Causes_of_Data_Loss.
 “What Are Online Backup Advantages.” SafeBACKUP Advice. Accessed January 14, 2016. http://www.databackuponlinestorage.com/Online_Backup_Advantages.
 “How to Back Up Windows.” How to Backup Windows: Your Complete Guide to PC Backup. Accessed January 14, 2016. https://www.backblaze.com/data-back-
up/pc-backup.html.
 “Use Time Machine to Back up or Restore Your Mac.” Apple. Accessed January 14, 2016. https://support.apple.com/en-in/HT201250.
MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP12
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 12
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 2 ITP 9
MU-ACA-041/18May2018

R4: Michael E. Whitman & Herbert J. Mattord, “Principles of Information Security”, 6 th Edition ©2018, Cengage Learning

Online:
MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP12
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 12
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 2 ITP 9
MU-ACA-041/18May2018

COURSE ALIGNMENT MATRIX


Program Outcomes Course Outcomes Learning Outcomes
PO2: Use best practices and standards and  To master information security governance, and related  Understand the concept of an email
their applications. legal and regulatory issues  Identify the different email client products and service providers
 To be familiar with how threats to an organization are available
PO8: Function effectively as a member or discovered, analyzed, and dealt with  Understand why email security is important
leader of a development team recognizing the  To be familiar with network security threats and  Understand and identify the various threats associated with using
different roles within a team to accomplish a countermeasures email
common goal.  To be familiar with network security designs using  Understand the various email security procedures
available secure solutions  Understand the basics of mobile security and its importance
PO9: Assist in the creation of an effective IT  To be familiar with advanced security issues and  Understand the importance of an IMEI number of a mobile phone
project plan. technologies  Understand the risks that a mobile device is exposed to
 Understand what mobile malware is
PO12: Integrate professional, ethical, legal,  Understand the threats that Bluetooth poses to a mobile device
security, and social issues and responsibilities in  Understand the various security procedures of an Android device,
the utilization of information technology. an iOS device, and a Windows device
 Identify various mobile security tools
PO13: Determine the need for and engage in  Understand the various types of clouds available and the different
planning and self-learning and improving services they offer
performance as a foundation for continuing  Understand the advantages of a cloud service
professional development.  Understand the different threats posed to a cloud account and
their countermeasures
 Understand the different privacy issues related to a cloud account
and how to address them
MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP12
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 12
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 2 ITP 9
MU-ACA-041/18May2018

Program Outcomes Course Outcomes Learning Outcomes


 Understand how to choose the correct cloud advisor as per your
needs
 Understand the different types of networks
 Understand how to set up your home network
 Understand how to set up Wireless networks in Windows and MAC
 Understand the various threats to a wireless network and their
countermeasures
 Understand how to use a firewall, antivirus, and encryption to
secure a wireless network
 Understand the importance and need for data backups
 Understand the reasons behind data loss incidents
 Understand what files to back up and when
 Understand the different types of data back-ups
 Understand how to create backups and restore data from them in
Windows and MAC
 Understand the difference between data deletion and data
destruction and the importance of the latter
MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP12
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 12
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 2 ITP 9
MU-ACA-041/18May2018

(PRELIM: 13.5 Hours)

Teaching Learning Resources/R


Learning Objectives Content TA Activities Assessment eferences
Classroom
 Orientation to the Course, VMO 30 mins Class discussion Recite VMO, Core R1
 Levelling of expectations and discussion of the values, and PLO R2
intended learning outcomes and OBE approach for 30 mins
the course/subject LCD Projector
Laptop

 Introduction to Email 1 Class discussions Short quiz R3 Module 6


 Understand the concept of an email Group discussions Case study about R4 pp 42-74
 Identify the different email client products  Email Security 2 email security
and service providers available Laboratory work threats: phishing
 Understand why email security is important  Email Security Procedures 3
 Understand and identify the various threats Hands on to create
associated with using email  Encryption 2 and use a strong
 Understand the various email security password
procedures  Email Security Tools 3
Check for the last
account activity in
Gmail
1 hour and
Prelim Assessment/Exam 30 mins
PRELIM EXAMINATION
MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP12
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 12
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 2 ITP 9
MU-ACA-041/18May2018

(MIDTERM: 13.5 Hours)

Teaching Learning Resources/


Learning Objectives Content TA Activities Assessment References
Classroom
 Understand the basics of mobile security and  Securing Mobile Devices 1 Class discussions Short quiz R3 Module
its importance Group discussions Case study about email 7
 Understand the importance of an IMEI  Mobile Device Threats 2 security threats:
number of a mobile phone Laboratory work phishing
 Understand the risks that a mobile device is  Mobile Security Procedures 3
exposed to Demonstration on how
 Understand what mobile malware is  How to Secure iPhone and iPad Devices, Android 2 to locate the IMEI
 Understand the threats that Bluetooth poses Devices and Windows Phone Device number on mobile
to a mobile device phone
 Understand the various security procedures  Mobile Security Tools 3
of an Android device, an iOS device, and a Presentation of
Windows device  Mobile Phone and Bluetooth Security Checklist 1 simulations of the
 Identify various mobile security tools following:
 updating
mobile
operating
system
 updating
applications on
devices
 enabling SIM
PIN Protection
MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP12
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 12
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 2 ITP 9
MU-ACA-041/18May2018

 enabling
Passcode
Protection
 enabling Touch
ID, enabling
auto-lock
 enabling limit
ad tracking
 enabling data
backup
 enabling Find
my phone app
 Setting SIM
Lock
 Encrypting
Android Phone
 Enabling
Android Device
Manager

Midterm Assessment/Exam 1 hour and


30 mins
MIDTERM EXAMINATION
MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP12
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 12
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 2 ITP 9
MU-ACA-041/18May2018

(SEMI-FINALS: 13.5 Hours)

Teaching Learning Resources/


Learning Objectives Content TA Activities Assessment References
Classroom
 Understand the various types of clouds  The Concept of Cloud 1 hr Class Discussions Present the steps on R3 Module
available and the different services they offer how to choose the 8 and 9
 Understand the advantages of a cloud service  Threats to Cloud Security 2 hrs Demonstration cloud service provider
 Understand the different threats posed to a Group discussions
cloud account and their countermeasures  Cloud Privacy Issues 2 hrs and presentation Draw the different
 Understand the different privacy issues of outputs network topology and
related to a cloud account and how to  Choosing a Cloud Service Provider 2 hrs provide its description
address them
 Understand how to choose the correct cloud  Various Networking Concepts 3 hrs Present the steps on
advisor as per your needs how to set up a
 Understand the different types of networks  Threats to Wireless Network Security and 1 hr wireless network in
 Understand how to set up your home Countermeasures Windows 10 and MAC
network OS X
 Understand how to set up wireless networks  Home Network Safety Checklist 1 hr
in Windows and Mac Identifying the
 Understand the various threats to a wireless different threats to
network and their countermeasures wireless network
 Understand how to use a firewall, and security and giving its
encryption to secure a wireless network. countermeasures

Present the steps to


secure Wireless
MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP12
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 12
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 2 ITP 9
MU-ACA-041/18May2018

Networks
Present steps in
securing network
connections

Semi-Final Assessment/Exam 1 hour and


30 mins
SEMI-FINAL EXAMINATION
MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP12
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 12
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 2 ITP 9
MU-ACA-041/18May2018

(FINAL: 13.5 Hours)

Teaching Learning Resources/


Learning Objectives Content TA Activities Assessment References
Classroom
 Understand the importance and need for  Data Backup Concepts 4 hrs Class Discussions Identifying the R3 Module
data backups different reasons for 10
 Understand the reasons behind data loss  Types of Data Backup 4 hrs Demonstration data loss
incidents Group discussions
 Understand what files to back up and when  Windows 10 and MAC OS X Backup and Restore 4 hrs and presentation Present the types of
 Understand the different types of data Procedures of outputs data backup
backups
 Understand how to create backups and  Safe Data Destruction Present the online
restore data from them in Windows and Mac backup service
 Understand the difference between data providers and its
deletion and data destruction and the functions
importance of the latter
Present the steps to
backup and restore
procedures in Windows
10 and MAC OS X

1 hour and Present the ways to


Final Assessment/Exam 30 mins permanently destroy
data
MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP12
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 12
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 2 ITP 9
MU-ACA-041/18May2018

FINAL EXAMINATION

Prepared by: Checked by:

GRETEL T. RICALDE MARKDY Y. ORONG, MSIT


Faculty Department Head

Verified by: Reviewed by:

FLORO A. SARTE, MLIS ROJAIDA S. TABANAO


University Librarian OIC, Curriculum Design & Development

Approved by:

MERCY O. CABA-ONG, PhD


Academic Officer
MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP12
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 12
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 2 ITP 9
MU-ACA-041/18May2018

You might also like