Research Article

Network Security and Digital Forensic Curricula Development for private Institute of Higher Learning (IHL) in Malaysia

by  Zuraidy Adnan, Mohd Fahmi Mohamad Amran, Norhayati Mohd Amin, Muhammad Fairuz Abd Rauf
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 180 - Issue 37
Published: Apr 2018
Authors: Zuraidy Adnan, Mohd Fahmi Mohamad Amran, Norhayati Mohd Amin, Muhammad Fairuz Abd Rauf
10.5120/ijca2018916154
PDF

Zuraidy Adnan, Mohd Fahmi Mohamad Amran, Norhayati Mohd Amin, Muhammad Fairuz Abd Rauf . Network Security and Digital Forensic Curricula Development for private Institute of Higher Learning (IHL) in Malaysia. International Journal of Computer Applications. 180, 37 (Apr 2018), 15-19. DOI=10.5120/ijca2018916154

                        @article{ 10.5120/ijca2018916154,
                        author  = { Zuraidy Adnan,Mohd Fahmi Mohamad Amran,Norhayati Mohd Amin,Muhammad Fairuz Abd Rauf },
                        title   = { Network Security and Digital Forensic Curricula Development for private Institute of Higher Learning (IHL) in Malaysia },
                        journal = { International Journal of Computer Applications },
                        year    = { 2018 },
                        volume  = { 180 },
                        number  = { 37 },
                        pages   = { 15-19 },
                        doi     = { 10.5120/ijca2018916154 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2018
                        %A Zuraidy Adnan
                        %A Mohd Fahmi Mohamad Amran
                        %A Norhayati Mohd Amin
                        %A Muhammad Fairuz Abd Rauf
                        %T Network Security and Digital Forensic Curricula Development for private Institute of Higher Learning (IHL) in Malaysia%T 
                        %J International Journal of Computer Applications
                        %V 180
                        %N 37
                        %P 15-19
                        %R 10.5120/ijca2018916154
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper we share our experience in developing hybrid majors’ undergraduate program which combines network security and digital forensic using Information Security and Critical Information and Communication Infrastructure Protection (ISCIP) common body of knowledge (CBK) as a reference. We also share the challenges and parallel effort, mostly from government, that help us in developing this program.

References
  • Brundiers, K., Wiek, A., & Redman, C. L. (2010). Real-world learning opportunities in sustainability : from classroom into the real world. https://doi.org/10.1108/14676371011077540
  • Bullough, R. V, Young, J., Birrell, J. R., Clark, D. C., Egan, M. W., Erickson, L., … Brunetti, J. (2003). Teaching with a peer : a comparison of two models of student teaching, 19, 57–73.
  • Cohen, F. (1999). Managing Network Security : Security Education in the Information Age, 7–10.
  • Fairuz, M., Othman, I., Bahaman, N., Muslim, Z., & Abdollah, F. (2008). New Curriculum Approach in Teaching Network Security Subjects for ICT Courses in, 637–641.
  • Industry 4.0: Building the digital enterprise. (2016). Retrieved October, 2017, from https://www.pwc.com/gx/en/industries/industries-4.0/landing-page/industry-4.0-building-your-digital-enterprise-april-2016.pdf
  • Krempl, S. (2005). Universities need lessons in IT.
  • Lin, C., & Chen, Y. (2005). Teacher-oriented adaptive Web-based environment for supporting practical teaching models : a case study of “‘ school for all ,’” 44, 155–172. https://doi.org/10.1016/j.compedu.2003.11.003
  • Lundin, R. W. (2008). Teaching with Wikis : Toward a Networked Pedagogy, 25, 432–448. https://doi.org/10.1016/j.compcom.2008.06.001
  • Mdec.my. (2017). Malaysia Digital Economy Corporation | MDEC. [online] Available at: https://www.mdec.my/?gclid=EAIaIQobChMI3dDar-Hy1wIVU4GzCh2FJQZyEAAYASAAEgKVZvD_BwE
  • www2.mqa.gov.my. (2017). :: Malaysian Qualifications Register ::. [online] Available at: http://www2.mqa.gov.my/mqr/ [Accessed 5 Dec. 2017].
  • Rutledge, S., & Hoffman, J. (1986). A Survey of Issues in Computer Network Security, 5, 296–308.
  • Sharma, S. K., & Sefchek, J. (2007). Teaching information systems security courses : A hands-on approach, 26, 290–299. https://doi.org/10.1016/j.cose.2006.11.005
  • Theoharidou, M., Xidara, D., & Gritzalis, D. (2008). A CBK for Information Security and Critical Information and Communication Infrastructure Protection, 1(C), 81–96. https://doi.org/10.1016/j.ijcip.2008.08.007
  • www2.mqa.gov.my. (2017). :: Malaysian Qualifications Register [online] Available at: http://www2.mqa.gov.my/mqr/ [Accessed 5 Dec. 2017].
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Network Security Digital Forensic Curricula Development Private IHL.

Powered by PhDFocusTM