100% found this document useful (1 vote)
873 views8 pages

Ipt101 Syllabus

The document outlines the course syllabus for Integrated Programming and Technology 1 (IPT101) at the Institute of Business, Science and Medical Arts, Inc. The course is a 3-unit course that provides an overview of integrative programming as it relates to applications and systems. Topics covered include inter-system communication, data mapping, integrative coding techniques, programming languages, and a programming project.

Uploaded by

Rhezty Rhei-vaen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
873 views8 pages

Ipt101 Syllabus

The document outlines the course syllabus for Integrated Programming and Technology 1 (IPT101) at the Institute of Business, Science and Medical Arts, Inc. The course is a 3-unit course that provides an overview of integrative programming as it relates to applications and systems. Topics covered include inter-system communication, data mapping, integrative coding techniques, programming languages, and a programming project.

Uploaded by

Rhezty Rhei-vaen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Institute of Business, Science and Medical Arts, Inc.

Francisco St., Marfrancisco, Pinamalayan, Oriental Mindoro


Tel No. (043) 284 – 3056
www.ibsmainc.weebly.com

DEPARTMENT OF INFORMATION TECHNOLOGY

VISION

IBSMA envisioned to sustain her leadership in health science, business, computer education whose graduates are exposed to holistic
education, technology – bases instruction, and vigorously pursue through research the discovery of new knowledge to the needs of the
global community.

MISSION

IBSMA exists to develop well – rounded professionals with the desirable traits excelling in leadership in education, business, medical and
technical fields through competent and relevant instruction, research, and the creation of center of knowledge for their chosen fields.
COURSE SYLLABUS IN IPT 101 | INTEGRATED PROGAMMING AND TECHNOLOGY 1

COURSE TITLE : INTEGRATED PROGRAMMING AND TECHNOLOGY 1


COURSE CODE : IPT101
COURSE CREDIT : 3 UNITS
PRE – REQUISITE :
COURSE DESCRIPTION : An overview of integrative programming as related to applications and systems. Topics include inter-
systems communication, data mapping and exchange, integrative coding, scripting techniques,
software security, and an overview of programming languages.
RATIONALE :

SEMESTER : 2ND SEMESTER


SCHEDULE : MONDAY / WEDNESDAY | 9:30 AM – 12:00NN | ROOM 300

GENERAL OBJECTIVES : After successfully completing this course, I should be able to:
1. Design and develop an integrative programming solution.
2. Distinguish the role of data exchange between dissimilar IT systems.
3. Compare programming design patterns and the IT services needed to integrate applications.
4. Recognize different types of architectures for integrating systems.
5. Have knowledge of data representation and exchange techniques and their appropriate use.
6. Understand the use of integrative coding techniques like interface, inheritance and design patterns.
COURSE REQUIREMENTS:
HANDS ON ACTIVITY
GRADED TEAMWORK
INDIVIDUAL OUTPUT PROJECT

EVALUATION MEASURE / TERM GRADE : 1. Attendance & Department 5%


2. Recitation 10%
3. Assignment 5%
4. Quizzes 25%
5. Reporting 5%
6. Prelim Exam 10%
7. Midterm Exam 15%
8. Pre – Final Exam 10%
9. Final Exam 15%
Total 100%

TEXTBOOK : “Professional Java Programming” by Brett Spell, George Gongo, Wrox Publication, 2000, ISBN:
186100382X.
Johnson, Richard. (2007). an Introduction to Java Programming and Object-Oriented Application
Development, 1st Edition. Cengage Learning. (ISBN-13: 9780619217464, ISBN-10: 0619217464)

Other references : "The Complete Book of Middleware", 1st Edition by Judith M. Myerson, Auerbach Publications, 2002, ISBN-
13: 9780849312724 “Design patterns: elements of reusable object-oriented software” by Erich Gamma,
Ralph Johnson, Richard Helm, John Vlissides, Addison-Wesley, 1994, ISBN: 0201633612
COURSE OUTLINE
TOPICS AND READINGS STRATEGIES METHOD OF EVALUATION TIME ALLOTMENT
Intersystem Communications
 Architectures for integrating systems
 DCOM, CORBA, RMI
 Web services and middleware
 Network programming
 Message and queuing services
 Low level data communications
Data Mapping and Exchange
 Metadata
 Data representation and encoding
 XML, DTD, XML schemas
 Parsing XML documents XSL, XSLT
and XPath
Integrative Coding
 Design patterns
 Interfaces
 Inheritance
Software Security Practices
 Evidence-based security vs. code
access security
 Best security coding practices
 Authentication to system resources
and services
 Encryption of data between
systems and services
Overview of Programming Languages
 History of programming languages
 Programming paradigms
 Effects of scale
 Virtual machines
 Compiled vs. interpretative
languages
 Application vs. scripting languages
PRELIM
Fundamental Aspects
 History and terminology
 Security mindset (reasoned
paranoia)
 Design principles (defense in depth)
 System/security life-cycle
Security Mechanisms (Countermeasures)
 Cryptography
 Cryptosystems
 Keys: symmetric & asymmetric
 Performance (software/hardware)
 Implementation
 Authentication
 "Who you are, what you have, what
you know"
 Bio-authentication (use of
biometrics)
 Redundancy
 Intrusion detection
Operational Issues
 Trends
 Auditing
 Cost / benefit analysis
 Asset management
 Standards
 Enforcement
 Legal issues
 Disaster recovery (natural and man-
made)
Policy
 Creation of policies
 Maintenance of policies
 Prevention
 Avoidance
 Incident response (forensics)
 Domain integration (physical,
network, internet, etc.)
Attacks
 Social engineering
 Denial of service
 Protocol attacks
 Active attacks
 Passive attacks
 Buffer overflow attacks
 Malware (viruses, Trojan horses,
worms)
Security Domains
 Security awareness
Possible Domains:
 Human-Computer Interaction
 Information Management
 Integrative Programming
 Networking
 Program Fundamentals
 Platform Technologies
 System Administration
 System Integration and
Architecture
 Social and Professional Issues
 Web Systems
 Physical plant
Forensics
 Legal systems
 Digital forensics and its relationship
to other forensic disciplines
 Rules of evidence
 Search and seizure
 Digital evidence
 Media analysis
Information States
 Transmission
 Storage
 Processing
Security Services
 Availability
 Integrity
 Confidentiality
 Authentication (source reliability)
 Non-repudiation
Threat Analysis Model
 Risk assessment
 Cost benefit
Vulnerabilities
 Perpetrators
 Inside attacks
 External attacks
 Black hat
 White hat
 Ignorance
 Carelessness
 Network
 Hardware (design, implementation,
installation, etc.)
 Software (design, implementation,
installation, etc.)
 Physical access

You might also like