Vous êtes sur la page 1sur 5

KOLEJ VOKASIONAL

JABATAN TEKNOLOGI MAKLUMAT & KOMUNIKASI

PERANCANG`AN KURSUS
COURSE OUTLINE

MAKLUMAT KURSUS (COURSE INFORMATION)

SEMESTER/SESI (SEMESTER/SESSION) : SEMESTER 3

KOD KURSUS (COURSE CODE) : KSK7023

NAMA KURSUS (NAME OF COURSE) : COMPUTER NETWORK SECURITY


DEPLOYMENT

BEBAN AKADEMIK PELAJAR (STUDENT ACADEMIC LOAD) :

Kategori Aktiviti Aktiviti Pembelajaran Jumlah Jam/Semester


(Category of Activities) (Learning Activity) (Total Hours/Semester)
Kuliah (Lecture) 25
Pembelajaran berbantu Tutorial/Amali (Tutorial/Practical) 42
(Guided learning) Aktiviti pembelajaran bertumpukan pelajar
3
(Student centered learning activities)
Persediaan untuk tugasan/projek
54
(Preparation for assignments/projects)
Pembelajaran kendiri Pembelajaran kendiri/ulangkaji
25
(Self learning) (Independent study/revision)
Persediaan bagi penilaian
5.5
(Preparation for assessment)
Penilaian berterusan
6
Penilaian rasmi (Continuous assessments)
(Formal assessments) Menduduki peperiksaan akhir
4
(Final examination sitting)
JUMLAH JAM BELAJAR (JJB)
160
TOTAL STUDENT LEARNING TIME (SLT)

Kursus Pra-syarat (Pre-requisite Course) : None


Nama Pensyarah (Name of Lecturer) : EN. MOHD RIZAL BIN AHMAD
CIK NUR HIDAYAH

Disediakan oleh (Prepared by): Disahkan oleh (Approved by):

Tandatangan (Signature): Tandatangan (Signature):

Nama (Name): Nama (Name):

Tarikh (Date): 2 JANUARI 2018 Tarikh (Date): 2 JANUARI 2018


MATLAMAT (GOALS):

This course will examines the need for security to secure the computing environment as is increasingly more
difficult as networks become increasingly interconnected and data flows ever more freely.

SINOPSIS (SYNOPSIS):

This course is designed to introduce students to produce a reliable and secure computer network system, as
well as confidentiality, integrity and availability of company’s data and record according to the company’s
requirement.

HASIL PEMBELAJARAN (LEARNING OUTCOMES):

Upon completion of the course, students will be able to:


1. Analyze computer network security requirements to plan for network security environment
deployment (C4, PLO1)
2. Perform the network security deployment in group to ensure the security in network environment
(P2, PLO2)
3. Write report of network security deployment based on user requirements (A2, PLO3)
ISI KANDUNGAN (CONTENT):

MINGGU KANDUNGAN PENTAKSIRAN


(WEEK) (CONTENT) (ASSESSMENT)
1–3 1.0 COMPUTER NETWORK SECURITY DEPLOYMENT  Assignment
REQUIREMENTS (18 HOURS)  Quiz
1.1 Computer System Security and Network Security
Standard
1.2 Computer network security tools
1.3 Computer system security threats and network security
threats
1.4 Risk and business impact related to computer network
security
1.5 Computer system security parameters and network
security zone
4-6 2.0 PLAN COMPUTER NETWORK SECURITY  Assignment
DEPLOYMENT (18 HOURS)
2.1 Network diagram
2.2 Network main distribution frame and equipment
2.3 Business resumption plan
2.4 Remote access control
2.5 Company resources
2.6 Computer network security deployment plan
7-11 3.0 EXECUTE COMPUTER NETWORK SECURITY  Practical Work
DEPLOYMENT (32 HOURS)  Assignment
3.1 Firewall configuration tasks
3.2 Virtual Private Network (VPN) configuration
3.3 Internet security control
3.4 Password policy setting
3.5 Penetration test
3.6 Network security irregularities
3.7 Network security remedies process
3.8 Managerial skill
12-14 4.0 COMPUTER NETWORK SECURITY DEPLOYMENT  Assignment
REPORT (18 HOURS)  Test
4.1 Document management system
4.2 Computer network security deployment manual
4.3 Network troubleshoot report
4.4 Network security deployment report
15 PREPARATION WEEK

16 PRACTICAL / FINAL EXAMINATION

17 PRACTICAL / FINAL EXAMINATION

AMALI (PRACTICAL):

1. Execute the system network security deployment


PENILAIAN (ASSESSMENT):

1. Penilaian Berterusan (Continuous Assessment) : 60 %


2. Peperiksaan Akhir Amali (Practical Examination) : 30 %
3. Peperiksaan Akhir (Final Examination) : 10 %
Jumlah (Total) : 100 %

Assessment Specifications Table (AST):

ASSESSMENT METHODS FOR


CLO
COURSEWORK (CA)

ASSIGNMENT
PRACTICAL
WORK
TEST
QUIZ
CONTEXT

CLO1

CLO2

CLO3
*(1) *(1) *(4)
*(1) 5%
10% 25% 20%
1.0 Computer Network Security
Deployment Requirements
√ √ √
2.0 Plan Computer Network Security
√ √
Deployment √
3.0 Execute Computer Network Security
Deployment
√ √ √
4.0 Computer Network Security
Deployment Report
√ √

Remark:
1. Suggested time for
 Quiz : 10 – 15 minutes
 Test (Theory) : 30 – 50 minutes
 Test (Practical) : 60 – 90 minutes
2. 40 Notional hours is equivalent to 1 credit.
3. Suggested assignment
 Folio
 Report

RUJUKAN (REFERENCES):

1. Eric Cole (2009). Network Security Bible (2nd Edition). Wiley. ISBN-13: 978-0-470-50249-5
2. Jan L. Harrington (2005). Network Security: A Practical Approach. Morgan Kaufmann Pub. ISBN-13:
978-0-12-311633-8
3. Mark (Mark Ciampa) Ciampa (2011). Security+ Guide to Network Security Fundamentals by Mark (Mark
Ciampa) Ciampa (2011, Mixed Media) (4th Edition) Course Technology . ISBN-13: 978-1-111-64012-5
4. Michael Whitman (2008). Guide to Firewalls and Network Security (2nd Edition). Course Technology.
ISBN-13: 978-1-4354-2016-8
5. Scott C.-H. Huang, David MacCallum, Ding-Zhu Du (2010) Network Security (1st Edition) Springer
ISBN-13: 978-0-387-73820-8
KEHADIRAN/PERATURAN SEMASA KULIAH (LECTURE ATTENDANCE/REGULATION):
1. Pelajar mesti hadir tidak kurang dari 90% masa pertemuan yang ditentukan bagi sesuatu kursus.
Students must attend lectures not less than 90% of the contact hours for every course.

2. Pelajar yang tidak memenuhi perkara (1) di atas tidak dibenarkan menghadiri kuliah dan menduduki
sebarang bentuk penilaian selanjutnya. Markah sifar (0) akan diberikan kepada pelajar yang gagal
memenuhi perkara (1).
Students who do not fulfill (1) will not be allowed to attend further lectures and sit for any further
examination. Zero mark (0) will be given to students who fail to comply with (1).

3. Pelajar perlu mengikut dan patuh kepada peraturan berpakaian yang berkuatkuasa dan menjaga disiplin
diri masing-masing untuk mengelakkan dari tindakan tatatertib diambil terhadap pelajar.
Students must obey all rules and regulations of the university and must discipline themselves in order
to avoid any disciplinary actions against them.

4. Pelajar perlu mematuhi peraturan keselamatan semasa proses pembelajaran dan pengajaran.
Student must obey safety regulations during learning and teaching process.

MATRIK HASIL PEMBELAJARAN KURSUS DAN HASIL PEMBELAJARAN PROGRAM


(MATRIX OF COURSE LEARNING OUTCOMES AND PROGRAMME LEARNING OUTCOMES)

Dilampirkan (As attached).

Vous aimerez peut-être aussi