• Tidak ada hasil yang ditemukan

Course Plan

N/A
N/A
Protected

Academic year: 2024

Membagikan "Course Plan"

Copied!
4
0
0

Teks penuh

(1)

Issue Date:11/7/2021 issue:02

ZU/QP10F004

Faculty: Information Technology

Program: Bachelor's Department: Cyber Security

Semester:

Academic year:

Course Plan

First: Course Information

Credit Hours: 3 Course Title: Programming for Cybersecurity

Course No.

1506342

Lecture Time:

Section No.:

Prerequisite:

1501112

Obligatory Faculty Requirement Elective University Requirement Obligatory University Requirement FacultyRequirement

Course Elective Specialty Requirement Obligatory Specialization requirement

Type Of Course:

Face-to-Face Learning

Blended Learning(2 Face-to-Face + 1Asynchronous) Online Learning (2 Synchronous+1 Asynchronous) Type of

Learning:

Second: Instructor’s Information

Academic Rank:

Name:

E-mail:

Ext. Number:

Office Number:

Sunday Monday Tuesday Wednesday Thursday Office Hours:

Third: Course Description

This course teaches the fundamental concepts of programming for cybersecurity. Teaching students the use of programming tools to enhance system and network security. The use of PowerShell, scripting, and selected programming languages to implement system security will be covered in this course. Teaching the different types of tools and programming languages along with their respective use cases for cybersecurity related functions.

(2)

Issue Date:11/7/2021 issue:02

ZU/QP10F004

Fourth: Learning Source

" Computer Programming and Cyber Security for Beginners "

Main Reference:

Publication Year: 2019 Publisher: Zach Codings

Author: Zach Codings

Moodle Additional

Sources&Websites:

Classroom Laboratory Workshop MS Teams Moodle Teaching Type:

Fifth: Learning Outcomes

Connection To Program ILOs

Code Course IntendedLearning Outcomes (CILOs)

Course Code

Knowledge

*PK1 Having the basics of machine learning for cyber security.

**K1

Demonstrate proficiency in the use of a programming language to PK2 conduct basic cybersecurity functions

K2

Describe the use of programming tools to enhance system and PK3 network security

K3

PK3 Differentiate the different types of tools and programming

languages along with their respective use cases for cybersecurity related functions

K4

To explore quantitative concepts needed for cryptography PK4 K5

Skills

The use of PowerShell, scripting, and python to implement system PS1 security

***S1

The use the Python libraries for network scripting and develop basic PS2 scripts with network functionality

S2

Competencies Communication and collaboration PC1

****C1

Teamwork PC2 C2

Creativity PC3 C3

Leadership PC4 C4

Critical thinking PC5 C5

* P: Program, **K: knowledge, ***S: skills, ****C: competencies.

(3)

Issue Date:11/7/2021 issue:02

ZU/QP10F004

Sixth: Course Structure

Lecture Date

Intended Teaching Outcomes(

ILOs)

Topics Teaching

Procedures*

TeachingMethods

*** References***

W1 K1,

K5,K4,S1

Introduction to course Introduction to Python

Face-To-Face

Lecturing , quizzes

and assignments Textbook

W2

K1,K2,S2

Fundamentals of Python

Face-To-Face Lecturing , quizzes

and assignments Textbook

W3

K1,K2,K3, S1,S2

Python structures And controls

Face-To-Face

Lecturing , quizzes

and assignments Textbook

W4 K1,K2,K3,

S1,S2

Python Modules Face-To-Face Lecturing , quizzes

and assignments Textbook

W5 K1,K2,K3,

S1,S2

Python Security Libraries Scapy Library

Face-To-Face Lecturing , quizzes

and assignments Textbook W6

K1,K2,K3,

S1,S2 Requests Library Face-To-Face Lecturing , quizzes

and assignments Textbook

W7

K1,K2,K3, K4,K5,S1, S2

Nmap Library Face-To-Face

Lecturing , quizzes

and assignments Textbook

W8 K1,K2,K3,

S1,S2

pwntools Face-To-Face Lecturing , quizzes

and assignments Textbook W9

K1,K2,K3, S1,S2

Cryptography Face-To-Face

Lecturing , quizzes

and assignments Textbook

W10

K1,K2,K3, S1,S2

Getting To Grips With Kali

Linux

Face-To-Face

Lecturing , quizzes

and assignments Textbook

W11

K1,K2,K3, K4,K5,S1, S2

Penetration Tests Face-To-Face

Lecturing , quizzes

and assignments Textbook W12 K1,K2,K3,

S1,S2

How Malware & Cyber Attacks Operate

Face-To-Face Lecturing , quizzes

and assignments Textbook W13 K1,K2,K3,

S1,S2 How to Scan Networks Face-To-Face Lecturing , quizzes

and assignments Textbook W14

K1,K2,K3, K4,K5,S1, S2

Applications on Networks’

scanning

Face-To-Face

Lecturing , quizzes

and assignments Textbook

(4)

Issue Date:11/7/2021 issue:02

ZU/QP10F004 W15 K1,K2,K3,

K4,K5,K6

An Introduction To Cryptography & Digital

Signatures

Face-To-Face

Lecturing , quizzes

and assignments Textbook

W16 K1,K2,K3, K4,K5,K6

Presentations &

Discussions

Face-To-Face

Lecturing , quizzes

and assignments Textbook

* Learning procedures: (Face-to-Face, synchronous, asynchronous). * * Teaching methods: (Lecture, video…..). ** * Reference: (Pages of the book, recorded lecture, video….).

Seventh: Assessment methods

Methods Face-To-Face

Learning

Measurable Course (ILOs)

Mid-term Exam 35

K1,K2,K3,S1,S2

Participation & Course Project 15

K1,K2,K3,K4,K5,S1,S2

Final Exam 50

K1,K2,K3,K4,K5,S1,S2

Eighth: Course Policies

 All course policies are applied on all teaching patterns (online, blended, and face- to-face Learning) as follows:

a. Punctuality.

b. Participation and interaction.

c. Attendance and exams.

 Academic integrity: (cheating and plagiarism are prohibited).

Referensi

Dokumen terkait