0% found this document useful (0 votes)
87 views3 pages

Dit-Curriculum-Map Cybersecurity

This document provides a curriculum map matrix for a Diploma in Information Technology program offered by SOFTNET Information Technology Center. The matrix outlines a Cybersecurity course that aims to provide an overview of established cyber security strategies and allow students to engage in strategic decision making related to cyber security. The course addresses topics like prominent antivirus software, why organizations invest in strong antimalware, analyzing the history and impacts of ransomware, and assessing cybersecurity risk management policies. It is designed to help students evaluate network and information security needs, and measure the performance of security systems within an enterprise-level information system.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
87 views3 pages

Dit-Curriculum-Map Cybersecurity

This document provides a curriculum map matrix for a Diploma in Information Technology program offered by SOFTNET Information Technology Center. The matrix outlines a Cybersecurity course that aims to provide an overview of established cyber security strategies and allow students to engage in strategic decision making related to cyber security. The course addresses topics like prominent antivirus software, why organizations invest in strong antimalware, analyzing the history and impacts of ransomware, and assessing cybersecurity risk management policies. It is designed to help students evaluate network and information security needs, and measure the performance of security systems within an enterprise-level information system.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

SOFTNET Information Technology Center FAB, Mariveles, Bataan

COURSE TITLE: Diploma in INFORMATION TECHNOLOGY


NAME of INSTITUTION: SOFTNET Information Technology Center

ANNEX B - Curriculum Map Matrix


COURSE DESCRIPTION TEACHING AND LEARNING
COURSE TOPICS (Modules) Course Outcome ASSESSMENT CRITERIA DURATION
(Content) EXPERIENCES
(Competency)
SOFTNET Information This
Cybersecurity Technology
course isCenter  Prominent internet At the end of the BLENDED  Written FAB, Mariveles,
80 Bataan
designed to provide able antivirus TEACHINGONLINE
course, the students LEARNING: ASSESSMENT
& LEARNING (LMS)
CREDITS
COURSE DESCRIPTION COURSE OUTCOME
an overview and software for should be able to:  CBLM
EXPERIENCES CRITEIA  Portfolio
(# OF UNITS)
Cybersecurity
understanding of businesses;
At the end of the course, the BLENDED  E-media/Video  Writt Evaluation
established cyber students
Why should
shouldworld
be able to: ONLINE LEARNING: Presentation en  Project or
This course is designed
security strategytoas organizations invest  Evaluate the  CBLM  Interactive Lecture / (LM Work Sample
providewell
an overview and in strong computer E-media/VideoDiscussion (LMS) S)  Demonstration
as provide
understanding of established
students with the
antimalware?
 Evaluate the computer network and Presentation  Demonstration  Portf with Oral
 An analysis of the
cyber security strategy
opportunity to as network and informationinformation  InteractiveLecture
Group/ Discussion olio Questioning
history, impacts, Evalu (Task/Job
well as provide
engage in students
strategicwith  remedies
and security needs
of of an  security needsDiscussion (LMS)LEARNING
DISTANCE
ation Sheet)
decision making
the opportunity to engage in in organization.  Demonstration
 CBLM(Cybersecurity
ransomware; of an  Proje  Direct
strategicthe contextmaking
decision of cyberin  Mechanisms  Group Discussion
)
 Assess cybersecurity risk organization. Downloadable Resources
ct or observation
security. The course
the context of cyber security. through which DISTANCE LEARNING Work
management policies in Assess
will will
The course assess current
assess antimalware  CBLM(Cybersecurity) Samp
order to adequately cybersecurity
software senses and Downloadable Resources
current threats
threats in
in varying
varying protect an organization'srisk
le
contexts including
contexts including
prevents attacks;
critical information and management  Dem
conducting a threat  The functionality of onstr
conducting a threat or assets.viruses;
encrypting policies in order ation
or vulnerability
vulnerability assessment for  A comparison of the to adequately with
assessment for a
a non-profit or government security measures protect an Oral
non-profit or  Measure
service government
organization,service
as well used by top the performance organization's Quest
of security
operating systems;systems withincritical ionin
as evaluate current as well
organization, g
an
 Security of enterprise-level information and
methodology and current
as evaluate (Task 3
information
computer hardware system. assets.
approaches to pave the
methodology andway /Job
from attacks; Sheet
approaches toand
for the development pave  The relationship )
the way for
implementation the
of cyber  Troubleshoot,
between cookies maintain
 and
development and update an enterprise-level
Measure the  Direc
security strategy at the and cybersecurity; performance of t
implementation
organization or corporate of  How information
does firewall security security systems obser
level. cyber security help system.
in the within an vatio
strategy at the prevention of
enterprise-level n
organization or network crimes?
information
corporate level.  The  connection
Implement continuous
system.
network
between file monitoring and
downloads
provide andreal-time security
cybersolutions.
security;
 Troubleshoot,
 How can phishing
 criminals
by be update and maintain and
Formulate,
communicate
stopped? short- and update an
long-term
 An analysis of theorganizationalenterprise-level
cybersecurity
usefulness of strategies information
and policies.
encryption security system.
algorithms;
SOFTNET Information Technology Center FAB, Mariveles, Bataan

Annex C. CURRICULUM MAP ALIGNING COURSE OUTCOME and PROGRAM LEARNING OUTCOME

You might also like