Professional Documents
Culture Documents
Bachelor of Science in Cyber Security (Bs Cybs)
Bachelor of Science in Cyber Security (Bs Cybs)
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
AMA Education System shall provide a holistic, relevant, quality and globally recognized IT-based education in all levels and disciplines with the
objective of producing professional and leaders responsive to the needs of Science and the International Community cognizant of the welfare and
benefits of its men and women thereby realizing their potential as productive members of the society for the honor and glory of God almighty.
Vision:
AMAES will be the leader and dominant provider of relevant globally recognized information technology-based education and related services in the
global market, helping the graduates to live happily, fulfilled, professional and personal lives.
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 1 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
Upon successful completion of any academic degree program at AMAES, graduates must be able to:
AMAES-ILO 1.0 Apply skills in critical thinking, logic, problem solving and decision-making in their respective disciplines;
AMAES-ILO 2.0 Communicate and collaborate effectively to varied audiences;
AMAES-ILO 3.0 Demonstrate an understanding of professional and ethical responsibility;
AMAES-ILO 4.0 Manifest the AMAES core values: integrity, competence, courtesy, team work and professionalism; and
AMAES-ILO 5.0 Recognize the need for, and an ability to engage in life-long learning.
AMAES-ILO 6.0 Generally demonstrate the 21st Century skills and transversal competencies at a higher-order-ability in every life and professional
situations for the advancement of mankind and society.
Program Description
The Bachelor of Science in Cyber Security (BS CybS) degree is equivalent to Level 6 of the Philippine Qualifications Framework. The program
focuses on real-life account of online and cybersecurity measures which centers on the concepts of the standard and best practices of the
cybersecurity field. It will equip students with quality skills in problem solving and design in order to come up with appropriate solutions in
cybersecurity concerns. The program also gives perspectives in the applicable control principles in the construction of cybersecurity solutions and
recommendations notwithstanding the acquisition of knowledge and expertise in the fundamental concepts of operating systems, software and
hardware, networks and cloud computing; in relation to the administration of security operations in Windows and Linux System.
The graduates may pursue careers in any of the following career options:
• IT professional
• Cybersecurity Expert
• Data Analyst
• Computer Network Defense Expert
• Digital Forensics Expert
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 2 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
Specifically, in three to five years after graduation, the BS Cybersecurity alumni shall:
Program Outcomes/Student Outcomes for the Bachelor of Cyber Security (BA CybS)
For the Bachelor of Science in Cybersecurity (BS CybS), adopted the following program outcomes:
Program Outcomes
Express expertise in the knowledge of fundamental concepts in operating systems, software, data management, networks and cloud
PO1
computing
PO2 Apply skills in the ability to administered secured operations of different Operating systems utilizing security automation techniques
PO3 Design and execute research inquiries using appropriate quantitative and qualitative ,methods guided by theories or conceptual
frameworks
PO4 Demonstrate written, visual and oral presentation skills to produce and present analytical reports
PO5 Demonstrate the ethical standards and challenges in the cybersecurity and Information Technology field
PO6 Apply best practices in cybersecurity management in addressing concerns and solutions to the professional process
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 3 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
Graduate attributes can be assessed through program outcomes/student outcomes using performance indicators.
Compare, contrast and classify the major • Articulate and deploy major concepts in the discipline
concepts in the discipline • Create a comparative diagram of the existing knowledge in the discipline
Recognize and define the distinctiveness of • Compare new knowledge with prior knowledge to determine the distinctiveness of the discipline, its
the discipline, its subfields, theories and subfields, theories and methods
methods • Summarize the ideas that make the discipline, its subfields, theories and methods unique.
Design and execute research inquiries using
• Constructs and implements effectively-designed research strategies.
appropriate quantitative and qualitative
,methods guided by theories or conceptual • Retrieve information online or in person using a variety of methods guided by theories or
conceptual frameworks
frameworks
Demonstrate written, visual and oral
• Follow standards in presenting analytical reports.
presentation skills to produce and present
• Use appropriate and effective medium in presenting analytical reports.
analytical reports
Critique, judge and respond to current issues • Express an intelligent argument on a current issue or problem based on a substantive
and problems based on a substantive understanding of the historical and contemporary developments in the national and global contexts.
understanding of the historical and • Participate in class debate to express a logical reasoning to a current issues and problems based
contemporary developments in the national on a substantive understanding of the historical and contemporary developments in the national
and global contexts and global contexts
• Synthesizes existing ideas to construct own predisposition towards ethical political involvement and
Develop a predisposition towards ethical
practice in various forms and on different levels of engagement
political involvement and practice in various
• Recommend policy that reflects a predisposition towards ethical political involvement and practice
forms and on different levels of engagement
in various forms and on different levels of engagement
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 4 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
COURSE
PROGRAM OUTCOMES
Code Title PO1 PO2 PO3 PO4 PO5 PO6
Introduction to Cyber Security (Certified Secured
CYBS 6268 Computer User) L L O P O L
CYBS 6269 Software and System Security L O O P L L
Data and Communication Security (Attack Vectors
CYBS 6270 and Countermeasures) L L O P L L
Information and Assurance Security 3 (International
CYBS 6273 Cybersecurity Operations, Policies, and Standards) L L O P L O
Information Assurance and Security 4
(Cybersecurity Management in the National
CYBS 6374 Context) L L O P O L
Component Security (Security Controls and
CYBS 6271 Assessment) L L O P L O
CYBS 6398 Cyber Security Capstone Project 1 L L O P L O
Information Assurance and Security 5 (Cyber
CYBS 6375 Forensics. Security Audit and Assessment) L L L P O O
CYBS 6272 Human and Societal Security L L L L P O
CYBS 6300 Cyber Security In-House Internship L O P P P P
CYBS 6400 Cyber Security Capstone Project 2 L O P P P P
CYBS 6397 Cyber Security Practicum (386 Hours) L O P P P P
CYBS 6401 Review for Cybersecurity Exam L O O O P P
Legend:
L – Facilitate LEARNING of the competencies
P – Allow the students to PRACTICE competencies
O – Provide OPPORTUNITY for development
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 5 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
CURRICULUM STRUCTURE
FIRST YEAR ATTENDANCE
First Trimester
SUBJECT CAT. LEC LAB
COURSE TITLE UNIT(S) PRE-REQUISITES
AREA NO. UNIT(S) UNIT(S)
GE 6100 Understanding the Self 3 0 3
GE 6103 Living in the IT Era 3 0 3
GE 6106 Purposive Communication 1 3 0 3
GE 6114 Mathematics in the Modern World 3 0 3
GE 6107 Ethics 3 0 3
PHYED 6101 Physical Fitness 2 0 (2)
15 (2)
Second Trimester
SUBJECT CAT. LEC LAB
COURSE TITLE UNIT(S) PRE-REQUISITES
AREA NO. UNIT(S) UNIT(S)
GE 6102 The Contemporary World 3 0 3
GE 6115 Art Appreciation 3 0 3
GE 6116 Science, Technology & Society 3 0 3
GE 6104 Gender and Society 3 0 3
GE 6101 Readings in Philippine History 3 0 3
PHYED 6102 Rhytmic Activities 2 0 (2) PHYED 6101
15 (2)
Third Trimester
SUBJECT CAT. LEC LAB
COURSE TITLE UNIT(S) PRE-REQUISITES
AREA NO. UNIT(S) UNIT(S)
GE 6108 Philippine Popular Culture 3 0 3
GE 6300 Life and Work of Rizal 3 0 3
ENGL 6100 Purposive Communication 2 3 0 3 GE 6106
MATH 6100 Calculus 1 3 0 3
ITE 6301 Technopreneurship 3 0 3
PHYED 6103 Individual/Dual Sports 2 0 (2) PHYED 6102
15 (2)
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 6 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
First Trimester
SUBJECT CAT. LEC LAB
COURSE TITLE UNIT(S) PRE-REQUISITES
AREA NO. UNIT(S) UNIT(S)
ITE 6101 Computing Fundamentals 2 1 3
ITE 6102 Computer Programming 1 2 1 3
COMP 6101 Current Trends and Issues 2 1 3 MATH 6100
NSCI 6100 Calculus-Based Physics 1 3 1 4
CS 6100 Discrete Mathematics 3 0 3
ITE 6202 Social and Professional Issues 3 0 3
NSTP 6101 National Service Training Program 1 3 0 (3)
PHYED 6200 Team Sports 2 0 (2) PHYED 6103
19 (5)
Second Trimester
SUBJECT CAT. LEC LAB
COURSE TITLE UNIT(S) PRE-REQUISITES
AREA NO. UNIT(S) UNIT(S)
IT 6201 Data Communications and Networking 1 2 1 3 ITE 6101
Introduction to Cyber Security
CYBS 6268 3 0 3 ITE 6101
(Certified Secure Computer User)
ITE 6104 Computer Programming 2 2 1 3 ITE 6102
CYBS 6267 Emerging Threats in Cyber Security 3 0 3 ITE 6101`
NSCI 6101 Calculus-based Physics 2 3 1 4 NSCI 6100
MATH 3200 Data Analysis 3 0 3
NSTP 6102 National Service Training Program 2 3 0 (3) NSTP 6101
19 (3)
Third Trimester
SUBJECT CAT. LEC LAB
COURSE TITLE UNIT(S) PRE-REQUISITES
AREA NO. UNIT(S) UNIT(S)
IT 6200 Introduction to Human Computer Interaction 2 1 3 ITE 6104
IT 6223 Data Communications and Networking 2 2 1 3 IT 6201
ITE 6201 Data Structures and Algorithms 2 1 3 ITE 6104
Information Assurance and Security 1 (Ethical Hacking
IT 6205 3 1 4 IT 6201
Concepts and Methodology)
CYBS 6269 Software and System Security 3 1 4 IT 6201
17
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 7 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
First Trimester
SUBJECT CAT. LEC LAB
COURSE TITLE UNIT(S) PRE-REQUISITES
AREA NO. UNIT(S) UNIT(S)
CS 6203 Object-oriented Programming 2 1 3 ITE 6104
ITE 6200 Application Development and Emerging Technology 2 1 3 ITE 6104
ITE 6202 Introduction to Information Management 2 1 3 ITE 6104
IT 6282 Platform Technologies 1 2 1 3 ITE 6104
Information Assurance and Security 2
IT 6206 3 1 4 IT 6205
(Web Attacks and Defense)
16
Second Trimester
SUBJECT CAT. LEC LAB
COURSE TITLE UNIT(S) PRE-REQUISITES
AREA NO. UNIT(S) UNIT(S)
IT 6208 System Integration and Architecture 1 2 1 3 ITE 6202
IT 6283 Platform Technologies 2 2 1 3
Integrative Programming and Technologies 1
IT 6286 2 1 3
(Concepts and Implementation of N-Tier Architecture)
IT 6284 Cloud Computing and Security 2 1 3 ITE 6104
Data and Communication Security IT 6206
CYBS 6270 3 1 4
(Attack Vectors and Countermeasures)
Information Assurance and Security 3 IT 6206
CYBS 6273 (International Cybersecurity Operations, Policies, and 3 1 4
Standards)
20
Third Trimester
SUBJECT CAT. LEC LAB
COURSE TITLE UNIT(S) PRE-REQUISITES
AREA NO. UNIT(S) UNIT(S)
IT 6209 System Integration and Architecture 2 2 1 3 IT 6208
IT 6304 Integrative Programming and Techniques 2 2 1 3 ITE 6286
Information Assurance and Security 4 IT 6273
CYBS 6374 3 1 4
(Cyber Security Management in the National Context)
Component Security CYBS 6273
CYBS 6271 3 1 4
(Security Controls and Assessment)
ITE 6100
IT 6210 Quantitative Methods with Modeling and Simulation 3 1 4
CYBS 6398 Cyber Security Capstone Project 1 3 0 3 3rd Year Standing
21
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 8 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
First Trimester
SUBJECT CAT. LEC LAB
COURSE TITLE UNIT(S) PRE-REQUISITES
AREA NO. UNIT(S) UNIT(S)
Information Assurance and Security 5
CYBS 6375 3 1 4
(Cyber Forensic, Security Audit and Assessment)
CYBS 6272 Human and Societal Security 3 1 4 IT 6304
IT 6285 Advanced Information Management 2 1 3
Second Trimester
___6___
Third Trimester
CYBS 6397 Cyber Security Practicum (386 Hours) 9 0 9 4TH Year Standing
__10____
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 9 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 10 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
B. MAJOR COURSES 65
NO CMO as per date CYBS 6268 Introduction to Cyber Security 3
CYBS 6267 Emerging Threats in Cyber Security 3
IT 6205 Information Assurance and Security 4
CYBS 6269 Software and System Security 4
IT 6206 Information Assurance and Security 2 4
IT 6284 Cloud Computing and Security 3
CYBS 6270 Data and Communication Security 2 4
CYBS 6273 Information Assurance and Security 3 4
CYBS 6374 Information Assurance and Security 4 4
CYBS 6271 Component Security 4
CYBS 6398 Cyber Security Capstone Project 1 3
CYBS 6375 Information Assurance and Security 5 4
CYBS 6272 Human and Societal Security 5 4
CYBS 6300 Cyber Security In-House Internship 4
CYBS 6285 Cyber Security Capstone Project 2 3
CYBS 6401 Review for Cybersecurity Exam 1
CYBS 6397 Cyber Security Practicum 9
D. CORE SUBJECTS 75
NO CMO as per date ENGL 6100 Purposive Communication 2 3
MATH 6100 Calculus 1 3
ITE 6301 Technopreneurship 3
ITE 6102 Computer Programming 1 3
NSCI 6100 Calculus-Based Physics 1 4
CS 6100 Discrete Mathematics 3
ITE 6202 Social and Professional Issues 3
IT 6201 Data Communications and Networking 1 3
ITE 6104 Computer Programming 2 4
NSCI 6101 Calculus-based Physics 2 4
MATH 6200 Data Analysis 3
IT 6200 Introduction to Human Computer Interaction 3
IT 6223 Data Communications and Networking 2 3
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 11 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 12 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 13 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 14 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
argument or thesis, compare points of view, identify bias, and evaluate the author’s claims based on
the evidence presented or other available evidence at the time. The course will guide the student
through their reading and analysis of the texts and require them to write reaction essays of varied
length and present their ideas in other ways (debate format, powerpoint presentation, letter to the
author of the source, etc.). The instructor may arrange the readings chronologically or thematically,
and start with the present (more familiar) and go back to the earlier periods or vice-versa.
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 15 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
these topics students are encouraged to go beyond the typical understanding of mathematics as
merely a bunch of formulas, but as a source of aesthetics in patterns of nature, for example, and a rich
language in itself (and of science) governed by logic and reasoning.
The course then proceeds to survey ways in which mathematics provides a tool for understanding and
dealing with various aspects of present day living, such as managing personal finances, making social
choices, appreciating geometric designs, understanding codes used in data transmission and security,
and dividing limited resources fairly. These aspects will provide opportunities for actually doing
mathematics in a broad range of exercises that bring out the various dimensions of mathematics as a
way of knowing and test the students’ understanding and capacity.
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 16 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
course will thus build upon and hone the skill of understanding, critical appreciation, and expression of
one’s views.
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 17 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
sets of values that students’ ability to express their constructed ethical cases in the language and form
of particular ethical frameworks.
The last part guides students through the analysis and evaluation of the strengths and weaknesses of
the various ethical frameworks and their value to human life and society. The end goal is for students
to be able to make informed decisions on their constructed ethical cases.
The course will require considerable reading, discussion and writing, as students learn about ethical
frameworks, raise questions, reflect comment upon, and evaluate the frameworks and ethical cases
they construct in class.
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 18 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 19 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
Course Description
The course covers the varied empirical and theoretical perspectives in gender studies in relation to
how gender, ethnicity, class, religion, ability, and sexuality interplay with societal institutions and the
development of society, with a focus on how this interplay creates and shapes gender bodies,
subjects, identities, understanding, and appreciation.
B. MAJOR SUBJECTS
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 20 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
Course Description
The course exposes the students to the basic structure of cyberspace and to a risk-based
approach to cyber Security. The first phase explores the origins and general shape of
cyberspace and introduces the concept of cyber Security. The second phase addresses the
basics of information security risk analysis methodology and explores a threat-based
approach to assessment. The third phase explores the operation and architecture of the
global Internet and its governance. While phase four introduces network technology and
information technology standards in order to explore the basics of network design and
operations, the last phase introduces the basics of security architecture based on threat, risk
and vulnerability analysis. The course also introduces basic cyber risk analysis methodology
and management used to develop systems architecture and strategies aimed at mitigating
such risks.
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 21 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 22 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
Course Description
This course is the continuation of Information Assurance and Security 3. It covers an in-depth
discussion of computer network security and the application of skills to counter act threats and issues
in networks, computer systems, and social networks.
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 23 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
Course Description
This course is the continuation of Information and Security 4. It provides application of the skills and
learnings attained from the 4 Information and Security courses that covers professional cyber security
processes and countermeasures to cyber security threats.
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 24 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
C. CORE SUBJECTS
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 25 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
industry leaders, churches, and private individuals. The purpose of these combined activities is to
enable students to practice strategies of communication with a clear purpose and audience in
mind, guided by the criteria of effective communication and appropriate language.
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 26 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 27 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 28 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 29 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
Course Description
The course allows the development of applications using web, mobile, and emerging technologies with
emphasis on requirements management, interface design, usability, testing, and deployment-including
ethical and legal considerations.
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 30 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
or unified whole, thereby enabling two or more applications to interact and exchange data seamlessly.
The course will explore tools and techniques for systems integration as well as proven management
practices for integration projects.
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 31 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
or unified whole, thereby enabling two or more applications to interact and exchange data seamlessly.
The course will explore tools and techniques for systems integration as well as proven management
practices for integration projects.
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 32 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 33 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
E. MISCELLANY COURSES
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 34 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
Course Description
The course covers the area in skill development and leadership techniques in rhythmic activities where
emphasis is placed on social, folk and creative dance activities.
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 35 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.
BACHELOR OF SCIENCE IN CYBER SECURITY
(BS CybS)
Effectivity: Document Code: Date of Issue:
Revision No.: 07 Issue No.: 01
SY 2020-2021 QR-AAD-002 July, 2020
community.
This is a controlled document. Revision of this document should undergo the standard procedure. The original copy of this document is located at the 36 / 36
office of the Academic Affairs Department (AAD).The user should secure the latest revision of this document from the AAD office.