TECHNOLOGICAL INSTITUTE OF THE PHILIPPINES COURSE SYLLABUS CS305 INFORMATION SECURITY (2014 curriculum) 3 units 8am to 12nn (Nov 23, Dec 21, Jan 18, Feb 8, Mar 1, Mar 15) Alexis V. Pantola EC-Council (2010) Ethical Hacking and Countermeasures, NY, USA: EC-Council McClure, S. (2012) Hacking Exposed 7: Network Security Secrets & Solution, Seventh Edition USA : McGraw-Hill. Other Supplemental OWASP, the free and open software security community. Materials https://www.owasp.org SPECIFIC COURSE INFORMATION a. Course Description This course provides an introduction to information security. It discusses information security in the perspective of ethical hacking and countermeasures. It covers casing the environment such as footprinting, scanning, and enumeration. It also covers network security and threats (i.e., session hijacking, sniffing, denial of service, wireless network hacking) and software security and threats (i.e., web application hacking, password cracking, buffer overflow, cryptography). In addition, an introduction to digital forensics is also covered. COURSE CODE COURSE NAME CREDITS CONTACT HOURS INSTRUCTOR TEXTBOOK
2nd Year Standing b. Prerequisites None Co-requisites c.Course Required Classification (Required/elective / selected elective) SPECIFIC GOALS FOR THE COURSE a. Course Objective The course aims to provide knowledge and skills in: 1. Security, ethical hacking, and digital forensics; 2. Identifying network security threats and their countermeasures; 3. Identifying software security threats and their countermeasures;
b. Course Outcomes By the end of the course, the students will be able to: 1. Apply the security principles and manifest themselves in any given Information Technology system; 2. Integrate the different processes of security in network infrastructure and software development; 3. Reflect on personal transformation along the TIP graduate attributes. c. Student Outcomes Addressed by the Course Students will be able to: 1. Analyze the local and global impact of computing on individuals, organizations, and society; and 2. Understand professional, ethical, legal, security, and social issues and responsibilities relevant to professional computing practice. COURSE TOPICS Nov 23 I. Introduction to Information Security II. Review of Computer Networks Dec 21 and Jan 18 III. Casing the Environment (footprinting, scanning, enumeration) IV. Network Security and Threats (i.e., Session Hijacking, Sniffing, Denial of Service, Wireless Network Hacking) Feb 8 and Mar 1 V. Introduction to Web Development VI. Software Security and Threats (i.e., web application hacking, password cracking, buffer overflow, cryptography) Mar 15 VII. Introduction to Digital Forensics GRADING SCHEME Item Attendance Midterm Exam Final Exam Seatwork/Assignment/Teacher’s Eval TOTAL Passing Grade
Percentage 20% 30% 30% 20% 100% 60%