Section outline

  • Course Description:

    This unit specifies competencies required to control ICT security threats. It involves identification of security threats, establishing and installing security measures, deployment of security measures, system vulnerability testing and monitoring.

     

    Learning Outcomes:

    1. Identify security threats
    2. Establish and install security measures.
    3. Deploy security measures.
    4. Test system vulnerabilities.
    5. Monitor security system.

    Assessment. 

    Students will be expected to do assessments in order to be considered competent for this course. Assessment administration will be as follows. 

    1. Two C.A.T(s) each 30 marks.
    2. Group assignments.
    3. One summative assessment 70 marks.

    Course requirements.

    Students are required to be having the following. 

    A functional digital device and with internet connection.

    Course facilitator.

    Clinton Kinyua.

    DICT, DTTE(Computer Studies).

    Help Desk.

    For technical help please contact the following or send an email via clintonkinyua1999@gmail.com

    0759580393