File - Mpumeskie cyber

advertisement
Lesson Plan
Subject: Web Development
Programme(s): DIE2/DGDW2
Date:
Week No: 1
No. of Sessions: 2
Sections Covered:
Introduction to Security – Learning Unit 1: Chapter 1
Outcomes Achieved:





Description of the challenges of securing information
Definition of information security and it importance
Listing of the basic steps of an attack
Describing the steps to defence
Explain the different types of information security careers
Materials/ Media used:
 Prescribed text book
 The internet
Activities/ Homework:
 Review questions
Lesson Plan
Subject: Internet Fundamentals B
Programme(s): DIE2
Date:
Week No: 2
No. of Sessions: 8
Sections Covered:
System Security – Learning Unit 2: Chapter 2 and Chapter 3
Outcomes Achieved:







Describing the different types of software-based attacks and hardware attacks
Defining virtualization and explain how attackers are targeting virtual systems
Explain how to harden operating systems
List ways to prevent attacks through a Web browser
Define SQL injection and explain how to protect against it
Explain how to protect systems from communication-based attacks
Describe various software security applications
Materials/ Media used:
 Prescribed text book
 The internet
Activities/ Homework:
 Review questions
Lesson Plan
Subject: Internet Fundamentals B
Programme(s): DIE2
Date:
Week No: 3
No. of Sessions: 8
Sections Covered:
System Security – Learning Unit 2: Chapter 2 and Chapter 3
Outcomes Achieved:







Describing the different types of software-based attacks and hardware attacks
Defining virtualization and explain how attackers are targeting virtual systems
Explain how to harden operating systems
List ways to prevent attacks through a Web browser
Define SQL injection and explain how to protect against it
Explain how to protect systems from communication-based attacks
Describe various software security applications
Materials/ Media used:
 Prescribed text book
 The internet
Activities/ Homework:
 Review questions
Lesson Plan
Subject: Internet Fundamentals B
Programme(s): DIE2
Date:
Week No: 4
No. of Sessions: 8
Sections Covered:
System Security – Learning Unit 2: Chapter 2 and Chapter 3
Outcomes Achieved:







Describing the different types of software-based attacks and hardware attacks
Defining virtualization and explain how attackers are targeting virtual systems
Explain how to harden operating systems
List ways to prevent attacks through a Web browser
Define SQL injection and explain how to protect against it
Explain how to protect systems from communication-based attacks
Describe various software security applications
Materials/ Media used:
 Prescribed text book
 The internet
Activities/ Homework:
 Review questions
Lesson Plan
Subject: Internet Fundamentals B
Programme(s): DIE2
Date:
Week No: 5
No. of Sessions: 8
Sections Covered:
System Security – Learning Unit 2: Chapter 2 and Chapter 3
Outcomes Achieved:







Describing the different types of software-based attacks and hardware attacks
Defining virtualization and explain how attackers are targeting virtual systems
Explain how to harden operating systems
List ways to prevent attacks through a Web browser
Define SQL injection and explain how to protect against it
Explain how to protect systems from communication-based attacks
Describe various software security applications
Materials/ Media used:
 Prescribed text book
 The internet
Activities/ Homework:
 Review questions
Lesson Plan
Subject: Internet Fundamentals B
Programme(s): DIE2
Date:
Week No: 6
No. of Sessions: 8
Sections Covered:
System Security – Learning Unit 2: Chapter 2 and Chapter 3
Outcomes Achieved:







Describing the different types of software-based attacks and hardware attacks
Defining virtualization and explain how attackers are targeting virtual systems
Explain how to harden operating systems
List ways to prevent attacks through a Web browser
Define SQL injection and explain how to protect against it
Explain how to protect systems from communication-based attacks
Describe various software security applications
Materials/ Media used:
 Prescribed text book
 The internet
Activities/ Homework:
 Review questions
Lesson Plan
Subject: Internet Fundamentals B
Programme(s): DIE2
Date:
Week No: 7
No. of Sessions: 8
Sections Covered:
System Security – Learning Unit 2: Chapter 2 and Chapter 3
Outcomes Achieved:







Describing the different types of software-based attacks and hardware attacks
Defining virtualization and explain how attackers are targeting virtual systems
Explain how to harden operating systems
List ways to prevent attacks through a Web browser
Define SQL injection and explain how to protect against it
Explain how to protect systems from communication-based attacks
Describe various software security applications
Materials/ Media used:
 Prescribed text book
 The internet
Activities/ Homework:
 Review questions
Lesson Plan
Subject: Internet Fundamentals B
Programme(s): DIE2
Date:
Week No: 8
No. of Sessions: 8
Sections Covered:
System Security – Learning Unit 2: Chapter 2 and Chapter 3
Outcomes Achieved:







Describing the different types of software-based attacks and hardware attacks
Defining virtualization and explain how attackers are targeting virtual systems
Explain how to harden operating systems
List ways to prevent attacks through a Web browser
Define SQL injection and explain how to protect against it
Explain how to protect systems from communication-based attacks
Describe various software security applications
Materials/ Media used:
 Prescribed text book
 The internet
Activities/ Homework:
 Review questions
Lesson Plan
Subject: Internet Fundamentals B
Programme(s): DIE2
Date:
Week No: 9
No. of Sessions: 8
Sections Covered:
System Security – Learning Unit 2: Chapter 2 and Chapter 3
Outcomes Achieved:







Describing the different types of software-based attacks and hardware attacks
Defining virtualization and explain how attackers are targeting virtual systems
Explain how to harden operating systems
List ways to prevent attacks through a Web browser
Define SQL injection and explain how to protect against it
Explain how to protect systems from communication-based attacks
Describe various software security applications
Materials/ Media used:
 Prescribed text book
 The internet
Activities/ Homework:
 Review questions
Lesson Plan
Subject: Internet Fundamentals B
Programme(s): DIE2
Date:
Week No: 10
No. of Sessions: 8
Sections Covered:
System Security – Learning Unit 2: Chapter 2 and Chapter 3
Outcomes Achieved:







Describing the different types of software-based attacks and hardware attacks
Defining virtualization and explain how attackers are targeting virtual systems
Explain how to harden operating systems
List ways to prevent attacks through a Web browser
Define SQL injection and explain how to protect against it
Explain how to protect systems from communication-based attacks
Describe various software security applications
Materials/ Media used:
 Prescribed text book
 The internet
Activities/ Homework:
 Review questions
Lesson Plan
Subject: Internet Fundamentals B
Programme(s): DIE2
Date:
Week No: 11
No. of Sessions: 8
Sections Covered:
System Security – Learning Unit 2: Chapter 2 and Chapter 3
Outcomes Achieved:







Describing the different types of software-based attacks and hardware attacks
Defining virtualization and explain how attackers are targeting virtual systems
Explain how to harden operating systems
List ways to prevent attacks through a Web browser
Define SQL injection and explain how to protect against it
Explain how to protect systems from communication-based attacks
Describe various software security applications
Materials/ Media used:
 Prescribed text book
 The internet
Activities/ Homework:
 Review questions
Lesson Plan
Subject: Internet Fundamentals B
Programme(s): DIE2
Date:
Week No: 12
No. of Sessions: 8
Sections Covered:
System Security – Learning Unit 2: Chapter 2 and Chapter 3
Outcomes Achieved:







Describing the different types of software-based attacks and hardware attacks
Defining virtualization and explain how attackers are targeting virtual systems
Explain how to harden operating systems
List ways to prevent attacks through a Web browser
Define SQL injection and explain how to protect against it
Explain how to protect systems from communication-based attacks
Describe various software security applications
Materials/ Media used:
 Prescribed text book
 The internet
Activities/ Homework:
 Review questions
Lesson Plan
Subject: Internet Fundamentals B
Programme(s): DIE2
Date:
Week No: 1
No. of Sessions: 8
Sections Covered:
System Security – Learning Unit 2: Chapter 2 and Chapter 3
Outcomes Achieved:







Describing the different types of software-based attacks and hardware attacks
Defining virtualization and explain how attackers are targeting virtual systems
Explain how to harden operating systems
List ways to prevent attacks through a Web browser
Define SQL injection and explain how to protect against it
Explain how to protect systems from communication-based attacks
Describe various software security applications
Materials/ Media used:
 Prescribed text book
 The internet
Activities/ Homework:
 Review questions
Download