Ipt101 Syllabus
Ipt101 Syllabus
VISION
IBSMA envisioned to sustain her leadership in health science, business, computer education whose graduates are exposed to holistic
education, technology – bases instruction, and vigorously pursue through research the discovery of new knowledge to the needs of the
global community.
MISSION
IBSMA exists to develop well – rounded professionals with the desirable traits excelling in leadership in education, business, medical and
technical fields through competent and relevant instruction, research, and the creation of center of knowledge for their chosen fields.
COURSE SYLLABUS IN IPT 101 | INTEGRATED PROGAMMING AND TECHNOLOGY 1
GENERAL OBJECTIVES : After successfully completing this course, I should be able to:
1. Design and develop an integrative programming solution.
2. Distinguish the role of data exchange between dissimilar IT systems.
3. Compare programming design patterns and the IT services needed to integrate applications.
4. Recognize different types of architectures for integrating systems.
5. Have knowledge of data representation and exchange techniques and their appropriate use.
6. Understand the use of integrative coding techniques like interface, inheritance and design patterns.
COURSE REQUIREMENTS:
HANDS ON ACTIVITY
GRADED TEAMWORK
INDIVIDUAL OUTPUT PROJECT
TEXTBOOK : “Professional Java Programming” by Brett Spell, George Gongo, Wrox Publication, 2000, ISBN:
186100382X.
Johnson, Richard. (2007). an Introduction to Java Programming and Object-Oriented Application
Development, 1st Edition. Cengage Learning. (ISBN-13: 9780619217464, ISBN-10: 0619217464)
Other references : "The Complete Book of Middleware", 1st Edition by Judith M. Myerson, Auerbach Publications, 2002, ISBN-
13: 9780849312724 “Design patterns: elements of reusable object-oriented software” by Erich Gamma,
Ralph Johnson, Richard Helm, John Vlissides, Addison-Wesley, 1994, ISBN: 0201633612
COURSE OUTLINE
TOPICS AND READINGS STRATEGIES METHOD OF EVALUATION TIME ALLOTMENT
Intersystem Communications
Architectures for integrating systems
DCOM, CORBA, RMI
Web services and middleware
Network programming
Message and queuing services
Low level data communications
Data Mapping and Exchange
Metadata
Data representation and encoding
XML, DTD, XML schemas
Parsing XML documents XSL, XSLT
and XPath
Integrative Coding
Design patterns
Interfaces
Inheritance
Software Security Practices
Evidence-based security vs. code
access security
Best security coding practices
Authentication to system resources
and services
Encryption of data between
systems and services
Overview of Programming Languages
History of programming languages
Programming paradigms
Effects of scale
Virtual machines
Compiled vs. interpretative
languages
Application vs. scripting languages
PRELIM
Fundamental Aspects
History and terminology
Security mindset (reasoned
paranoia)
Design principles (defense in depth)
System/security life-cycle
Security Mechanisms (Countermeasures)
Cryptography
Cryptosystems
Keys: symmetric & asymmetric
Performance (software/hardware)
Implementation
Authentication
"Who you are, what you have, what
you know"
Bio-authentication (use of
biometrics)
Redundancy
Intrusion detection
Operational Issues
Trends
Auditing
Cost / benefit analysis
Asset management
Standards
Enforcement
Legal issues
Disaster recovery (natural and man-
made)
Policy
Creation of policies
Maintenance of policies
Prevention
Avoidance
Incident response (forensics)
Domain integration (physical,
network, internet, etc.)
Attacks
Social engineering
Denial of service
Protocol attacks
Active attacks
Passive attacks
Buffer overflow attacks
Malware (viruses, Trojan horses,
worms)
Security Domains
Security awareness
Possible Domains:
Human-Computer Interaction
Information Management
Integrative Programming
Networking
Program Fundamentals
Platform Technologies
System Administration
System Integration and
Architecture
Social and Professional Issues
Web Systems
Physical plant
Forensics
Legal systems
Digital forensics and its relationship
to other forensic disciplines
Rules of evidence
Search and seizure
Digital evidence
Media analysis
Information States
Transmission
Storage
Processing
Security Services
Availability
Integrity
Confidentiality
Authentication (source reliability)
Non-repudiation
Threat Analysis Model
Risk assessment
Cost benefit
Vulnerabilities
Perpetrators
Inside attacks
External attacks
Black hat
White hat
Ignorance
Carelessness
Network
Hardware (design, implementation,
installation, etc.)
Software (design, implementation,
installation, etc.)
Physical access