Professional Documents
Culture Documents
A Feasibility Study On Offering PDF
A Feasibility Study On Offering PDF
Page 1 of 17
TABLE OF CONTENTS
Cover Page 1
Table of Contents 2
Executive Summary 3
Market Demand 9
Program Sustainability 12
Industry Partners 14
Physical Resources 15
Financial Plan 15
References 16
Appendices
CHED CMO
MOA
Page 2 of 17
EXECUTIVE SUMMARY
In the 3rd quarter of 2015, meanwhile, Kaspersky Lab reported that the
Philippines took the 33rd spot out of 233 countries prone to cybersecurity
threats – a huge jump from the previous quarter’s 43rd rank. The security firm
warned that the rise indicates that “cyber-attacks against the Philippines are
accelerating at full speed.” It may not show now, but “there is no doubt that
cybercriminals are now noticing the country”, with 17% of Filipino users’
systems infected with malicious programs or malware used by cybercriminals.
Symantec’s latest Internet Security Threat Report (ISTR) said the Philippines
placed 20th globally and 3rd in the Asia Pacific region for social media scams. It
added that in 2015, the country was hit by an average of 17 ransomware
attacks a day – a type of virus that prevents a user from accessing his system.
Page 4 of 17
RATIONALE FOR THE PROPOSED PROGRAM
General Objective
The general objective of the study is focused on gathering and analyzing
data to prepare a feasibility of offering a four-year program in Bachelor of
Science in Information Technology major in Information and Network
Security at the University of Makati, Makati City, Philippines.
Specific Objectives
It specifically aimed to:
To identify the strengths and weaknesses in terms of external and
internal factors
To determine whether the proposed curricular program is feasible; and
To identify the preparedness of the college in housing the BS in
Information Technology major in Information and Network Security in
the areas of infrastructure and equipment.
Page 5 of 17
Strategic Alignment
The College will design its curricular offering by 1) implementing the New
General Education Curriculum (CMO No. 25, s. 2015) which will remove the
redundancy to courses rendered by the Grade 11 and Grade 12 (HSU)
curriculum; 2) realigning professional courses to industry needs and standards
with strong industry partnership and involvement; and 3) harmonizing the
college’s Brand of Graduate Attributes (BGA) to international standards set by
the Seoul Accord, the Information Security Officers Group, Inc. (ISOG) and the
Philippine Computer Society (PCS) following the Outcomes-Based Education
(OBE) framework.
Strengths
In the recent years, the University of Makati and the College of Computer
Science has overcome several weaknesses during the decade of operation.
Based on the assessments made, the following are strengths: First, the
University itself, with the support from the local government is stable with 46
years of existence and continuously providing quality education to the
studentry. Second, the classrooms are conducive for learning, the Laboratory
Facilities and equipment are state-of the art with latest software and hardware
technology. The University is equipped with internet facilities. Third, the
Faculty members of the College are almost all master’s degree holders and the
administrative personnel are educationally prepared with appropriate
experience. Fourth, transaction in the University is highly systematized with
the aid of various Information Systems. The Bachelor of Science in Information
Technology major in Information and Network Security is in demand in the
nation due to global competitiveness and scarcity of professionals by
Page 6 of 17
educational background. Almost all of the advanced countries in the world are
now particular in keeping their network, infrastructure and all organizational
data and information safe. In Makati City and neighboring cities, there are
numerous giant businesses, companies and organizations that need network
security engineers to address and keep their data and network safe. Lastly, in
the Philippines, from the report from industries, information and network
security is starting to dominate the cyber world.
Weaknesses
By the end of next year, it is predicted that one to two million cyber
security jobs will remain unfilled. About six million cyber security analysts will
be needed, with only between four and five million available to fill the positions.
Cybersecurity is an emerging field. Though businesses and industries are
leveraging on this field of study, the discipline has not yet totally embraced by
educational institutions, thus, Senior High School graduates are unaware of
these programs. Currently, marketing the program is a work in progress for the
university and the College of Computer Science. However, revising the existing
programs and offering this new program will help in introducing this field to
incoming students and prospected enrollees.
Opportunities
The university has established its name for offering ITE courses. The
physical location of the University serves as an opportunity both for prospected
enrollees as well as industry partners. Another opportunity that the students,
faculty and staff of the College of Computer Science availed is exposures to the
latest developments in the field of information and network security.
Threats
Big number of students relies on scholarship given by the local
government and other non-government organizations. The sustainability of
their support may help or may risk deserving students to finish the program.
Page 7 of 17
MARKET DEMAND
Student Demand
With so many jobs available, and the need to fill them so dire, more
colleges are offering degrees in cybersecurity, though it has yet to become a
staple in undergraduate coursework for students majoring in related fields.
For many professionals currently in the cybersecurity field, they learned
the necessary skills through certificate programs and in-the-field training
versus degree programs.
Career Opportunities
Chief Information Security Officer
Data Security Analyst
Forensic Computer Analyst
Information Security Analyst
Penetration Tester
Security Architect
IT Security Engineer
Information System Security Manager
Security Systems Administrator
Network Security Administrator
Network Security Engineer
IT Security Consultant
Page 8 of 17
Labor market information (projections, job posting analyses, and wages)
The demand for skilled cyber security professionals who can handle
advanced network security design and disaster recovery is on the rise, as the
incidents of corporate computer and network breaches increase. Job openings
for network security experts are expected to grow beyond 10 percent through
2020, according to the Bureau of Labor Statistics. The Bachelor of Science in
Information Technology major in Information and Network Security (BSIT-INS)
is an in-depth education program with a broad-based curriculum to place
graduates in successful cyber career positions.
Page 9 of 17
In addition, the research carried out by Indeed.com in 2017 confirmed
that although organizations are advertising cyber security analyst job postings,
there are simply not enough candidates to fill those posts. In the U.S. there are
only two candidates for every three job vacancies advertised, while in other
parts of the world the situation is even direr. In the UK and Ireland there is
only about one candidate for every three vacancies and the situation is
deteriorating.
All in all, it is pretty clear evidence that IT security jobs are going to be in
plentiful supply, and those with the right skills will be able to take their pick.
Page 10 of 17
PROGRAM SUSTAINABILITY
There are strong and qualified thirty one (31) CCS faculty members; fifteen
(15) of whom are full time tenured faculty members and are already graduates
of Master in Information Technology and other IT Allied programs. There are
also twelve (13) full-time casual faculty members and three (3) part-time faculty
members all have IT industry backgrounds. There are also positions which are
vacant for CCS faculty applicants.
Page 11 of 17
Table 2. Faculty Roster for the BS Information Technology Major in
Information and Network Security
Program of the University of Makati
No. NAME ACAD. RANK HIGHEST DEGREE PROFESSIONAL LENGTH OF
EARNED AFFILIATIONS TEACHING
OR FIELD OF EXPERIENCE
SPECIALIZATION
1. FULL-TIME (REGULAR)
1 Asejo, Nelson R. Associate MIT IT/CS 7 years
Professor IV Doctor of
Technology(ac)
2 David, Rowena S. Instructor I BSCS – MIT units IT/CS 14 years
Page 12 of 17
8 Plan, Jomariss B. Assistant MSIT IT/CS 9 mos.
Professor III
9 Olivo, Michael C. Assistant MIT IT
Professor IV
10 Sabado, Wilber B. Assistant MM IT
Professor II
11 Delpomo, Bhai Assistant MSICT IT
Nhuraisha I. Professor I
12 Cruz, Edgardo T. Assistant MIT IT
Professor IV
13 Gabriel, Jarby DC. Assistant GC – IMD IT
Professor IV
3. PART-TIME
1 Alar, Hernan S. Assistant MIS-ITEM IT/CS 2 years
Professor III
2 Pepito, Corpernicus P. Assistant MSCS, MBA IT/CS 2 years
Professor II
3 Cortez, Rex Jayson T. Assistant MIS-ITEM IT/CS 2 years
Professor III
Industry Partners
Since traditional content area instruction does not necessarily produce
graduates who are well- prepared to become employees, it is vital that, on an
ongoing basis, institutions identify the skills and knowledge that learners need
to acquire. Employers can offer valuable advice on training content. They know
specifically which work readiness and technical skills are required and the
gaps they most often see in new graduates. In order to ensure that the
curriculum addresses industry needs, it is imperative that educational
institutions have an active relationship with potential employers.
The industry partners should also be the source of information on the
relevance of the curriculum. They may be encouraged to share the current
trends and issues in the industry, their required competencies for personnel,
the reality in the workplace, and other noteworthy information that will benefit
the curricular review process.
Currently, the University of Makati, College of Computer Science
considered the following industries in the curriculum development of the
Bachelor of Science in Information Technology major in Information and
Network Security:
Page 13 of 17
DELL EMC SCHNEIDER ELECTRIC
DATABLINK ITG VENTURE AHEAD
BEYONDTRUST AUGMENTBPOPH
WESTCON SOLUTION RED FLAG GROUP
SECURE METRIC ACCENTURE
SOMANSA NETWORLD CAPITAL
TREND MICRO VENTURES CORP.
DIMENSION DATA P.J. LHUILLIER GROUP OF
MSI-ECS COMPANIES
DMAIPH
Page 14 of 17
Physical Resources
There are enough facilities and equipment available in the college. These
facilities and equipment are the existing facilities and equipment used by the
existing programs namely, Information Technology Service Management,
Computer Network Administration and Computer Science. On classroom, the
College of Computer Science is utilizing the Computer Laboratories in
Academic Buildings 2 and 3 together with the Computer Laboratories at the
HPSB. Lecture rooms are also available on the aforementioned infrastructures.
An existing Hardware Laboratory will be converted to a network and security
laboratory as part of the AIP for 2018-2019.
The college has also acquired at least forty (40) Information and Network
Security Books as stated in the AIP for 2018-2019. In addition, IT and
Computing Journals and E-Journal subscriptions will also be acquired, giving
enough references and basis as the program offering progresses.
Financial Feasibility
On Financial Requirements for the Five -year period, based on the conducted
research, the University, supported by the local government of Makati City is
financially stable and can sustain and maintain the operation of this proposed
BS in Information Technology major in Information and Network Security
program.
Page 15 of 17
REFERENCES
Closing The IT Network Skills Gap, How managers can understand and prepare
fornew networking skill requirements. Cambridge : Forrester Research Inc.,
June, 2008.https://learningnetwork.cisco.com/servlet/JiveServlet/
previewBody/2300-102-2-6266/Forrester/- /Cisco/TLP/Fina/0060208.pdf
https://www.computerworld.com/article/2495985/it-careers/demand-for-it-
security-experts-outstrips-supply.html
Page 16 of 17
http://www.philstar.com/banking/2016/04/12/1571843/lack-it-security-
professionals-makes-philippines-prone-cyber-crime
https://www.computerworld.com/article/2495985/it-careers/demand-for-it-
security-experts-outstrips-supply.html
http://www.philstar.com/banking/2016/04/12/1571843/lack-it-security-
professionals-makes-philippines-prone-cyber-crime
Authors:
Page 17 of 17