0% found this document useful (0 votes)
33 views8 pages

Agramon, Chin Lee Joy - Is103

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views8 pages

Agramon, Chin Lee Joy - Is103

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

GOOD STUDENTS

SANTO NINO COLLEGE FOUNDATION, INC.


Brgy. San Vicente, Banga, South Cotabato
BETTER LIFE
BEST SERVICE

COURSE SYLLABUS
IS103: IT INFRASTRUCTURES AND NETWORK TECHNOLOGIES

VISION MISSION CORE VALUES

Santo Nino College Foundation, Inc. (SNCFI) is a globally


SNCFI is committed towards students’ holistic education and development through
recognized non-sectarian education institution producing quality Service, Nobility, Competence, Fortitude,
its exemplary academic programs, impactful research outputs, and responsive
graduates who are knowledgeable, value-laden, and civic- Innovation and Quality
community extension services attuned to the needs of the society.
minded.

INSTITUTIONAL GRADUATE ATTRIBUTES I. COURSE INFORMATION:


Course Code : IS103
Civic Responsibility
Course Title : IT INFRASTRUCTURES AND NETWORK TECHNOLOGIES
Common Good None
Lec Lab Credit Pre-requisite :
Course Units :
Continuous Learning 2 1 3 Co-requisite : None

Contact Hours : 54 hours/semester Program(s) : BSIS


Communication
Semester : First Level : Second Year
Collaboration
Course Description :
This course equips students with a comprehensive understanding of IT infrastructure and network systems by exploring the
foundational components, classifications, and configurations that support modern computing environments. Through class
discussions, hands-on labs, and performance-based assessments, students will analyze various types of computers, network
topologies, and cabling systems, while applying key concepts from the OSI and TCP/IP models. Emphasis is placed on
evaluating wireless standards, implementing network security protocols, and distinguishing between authentication and
access control mechanisms.
Students will also develop sustainable disaster recovery strategies by integrating Green IT principles, demonstrating their
ability to design resilient, secure, and contextually relevant digital solutions for real-world applications addressing SDG4
(Quality Education), SDG 9(Industry, Innovation, and Infrastructure) and SDG 13 (Climate Action).

SYLLABUS VERSION: 3 ACADEMIC YEAR: 2025 – 2026 Page 1 of 8


Faculty Information: Students Workload:
Name : Chin Lee Joy B. Agramon
Email : cljagramon@sncfi.edu.ph Students are expected to engage in approximately 10 to 13 hours of academic work per week. This
Contact Number : +639056682182 includes 2 hours of lecture sessions and 3 hours of hands-on laboratory work each week, where
students explore the application of programming constructs and practice solving computing problems
Consultation Schedule : MW 4:00 PM – 5:00 PM using a general-purpose programming language.
Office : Academic Office

II. PROGRAM OUTCOMES AND PERFORMANCE INDICATORS ALIGNMENT

PROGRAM OUTCOMES PERFORMANCE INDICATORS

PO 1. Knowledge for Solving Computing Problems 1. Apply knowledge of business processes, computing, mathematics and social sciences appropriate to information systems

2.1 Analyze a problem, identify and define the computing requirements with respect to organizational factors appropriate to its solution
PO 2. Problem Analysis and plan strategies for their solution
2.2 Evaluate information systems in terms of general quality attributes and possible trade-offs presented within the given requirement
3.1 Design, implement and evaluate information systems, processes, components, or programs and to source cost-benefit efficient
PO 3. Design/Development of Solutions alternatives to meet desired needs, goals and constraints.
3.2 Use knowledge and understanding of enterprises in modelling and design of information systems.

PO 4. Modern Tool Usage 4. Deploy and use effectively skills, tools and techniques necessary for information systems practice

5. Function effectively on teams (recognizing the different roles within a team and different ways of organizing teams) to accomplish a
PO 5. Individual and Team Work
common goal

6. Communicate effectively with a range of audiences. Communication skills include technical writing, presentation and negotiation and
PO 6. Communication
numeracy

7. Recognize the legal, social, ethical and professional issues involved in the exploitation of computer technology and be guided by the
PO 7. Computing Professionalism and Ethics in the Society
adoption of appropriate professional, ethical and legal practices both in the local and global community

8. Recognize the need for and engage in an independent and life-long learning, planning self-learning and improving performance as the
PO 8. Life-long Learning
foundation for on-going professional development.

III. COURSE OUTCOMES

SYLLABUS VERSION: 3 ACADEMIC YEAR: 2025 – 2026 Page 2 of 8


At the end of the course, students should be able to:

CO Code Outcomes PGO 1 PGO 2 PGO 3 PGO 4 PGO 5 PGO 6 PGO 7 PGO 8
CO 1 Explain the fundamental concepts and components of IT infrastructure and computer systems ✓ ✓ ✓ ✓
Analyze and apply networking models, topologies, and security protocols to ensure reliable and secure
CO 2 ✓ ✓ ✓ ✓ ✓
communication
Evaluate access control mechanisms, disaster recovery strategies, and sustainable IT practices within ethical
CO 3 ✓ ✓ ✓ ✓
and regulatory frameworks

III. ASSESSMENTS AND GRADING SYSTEM


All assessments will be evaluated on 40-based grading. The course grade will be determined through the following assessment tasks, weights and conversions:

Assessment Tasks Description Weights CO 1 CO 2 CO 3


Students will perform a mock audit of a small organization’s IT setup and create a labeled diagram of the
MA1 IT Infrastructure Diagram infrastructure, identify the types and components of the computer systems and networks in use, and 10% ✓ ✓ ✓
suggest upgrades for better performance and reliability.
Students will plan, assemble, and test a functional peer-to-peer or LAN connection using Cat5e/Cat6 UTP
Major Build & Validate a Wired Network cables and networking devices. This assessment emphasizes cable construction, device configuration, and
MA 2
Connection Using UTP Cables
15% ✓ ✓ ✓
Assessments connectivity troubleshooting.
Students will design and construct a functional or decorative product using recycled or repurposed
Eco-Tech Product Challenge:
computer components (e.g., motherboards, keyboards, hard drives). The goal is to demonstrate
MA 3: Innovate with Recycled Computer
sustainability in IT practices through creative reuse, while proposing its relevance to disaster recovery or
15% ✓ ✓ ✓
Parts
eco-conscious infrastructure strategies.
You will be given tasks that will measure their understanding and application of conceptual and
computational notions discussed in this course. These tasks include objective tests, reflection/critique
Written and Other Evidences (WOE)
writing and computational activities. Appropriate rubrics will be presented for non-objective tasks. For this
30% ✓ ✓ ✓
component, the final rating will be based on the accumulated scores from all written works.
Other You will answer a 60-point assessment, which cover all the concepts, guidelines, and theories discussed in
Assessments Midterm Examination (ME) this course for the midterm period. The assessment items will require the students to analyze situations and 15% ✓ ✓ ✓
apply their knowledge, understanding and skills to solve assessment problems.
You will answer a 60-point assessment, which cover all the concepts, guidelines, and theories discussed in
Final Examination (FE) this course for the final period. The assessment items will require the students to analyze situations and 15% ✓ ✓ ✓
apply their knowledge, understanding and skills to solve assessment problems.

Passing Grade: 3.00 (75%)

A. MA1: IT Infrastructure Diagram


SYLLABUS VERSION: 3 ACADEMIC YEAR: 2025 - 2026 Page 3 of 8
Rubrics:

Assessment Area Beyond Expectation Expected Fair Poor

25-23 22-18 17-10 9-5


Accuracy & Completeness Diagram is comprehensive, correctly
of Diagram Diagram includes most components with Diagram shows some key components Diagram is missing major elements or
labeled, and includes all key components
minor errors in labeling or structure. but lacks completeness or clarity. has significant inaccuracies.
of IT infrastructure and network setup.
25-23 22-18 17-10 9-5
Identification & Clearly classifies computer systems and
Classification Classification is mostly accurate; Basic identification present but lacks Little to no identification; classifications
identifies components with justified
explanations may lack clarity. detail or justification. are incorrect or missing.
explanations.
25-23 22-18 17-10 9-5
Recommendations & Suggestions for upgrades are insightful,
Analysis Recommendations are appropriate with Basic suggestions made without strong No clear recommendations or analysis
realistic, and backed by performance
some consideration of context justification. provided.
rationale.
25-23 22-18 17-10 9-5
Technical Justification & Output reflects real-world business Real-world relevance is present but may Some justification is attempted, but Design and recommendations appear
Real-World Relevance scenarios and operational constraints. lack depth or specificity. connections to practical needs are vague disconnected from real-world application
or underdeveloped. or operational logic.

B. MA 2: Build & Validate a Wired Network Connection Using UTP Cables

Rubrics:

Assessment Area Beyond Expectation Expected Fair Poor

25-23 22-18 17-10 9-5


Cable Construction & UTP cable is crimped with precision;
Compliance Minor imperfections; cable mostly Cable built with some errors; partial Incorrect standard used; cable fails test;
follows correct T568A/B standard;
conforms to standard; successful test. success in connectivity. unreliable connection.
passes continuity test.
25-23 22-18 17-10 9-5
Device Configuration & IP setup and device pairing work IP settings correct with minor
Network Setup Setup incomplete or unstable; devices Configuration incorrect; no connection
flawlessly; peer-to-peer communication troubleshooting required; functional
communicate intermittently. established.
validated. setup.
25-23 22-18 17-10 9-5
Troubleshooting & Student clearly documents steps taken,
Documentation Documentation includes basic setup and Documentation is minimal; lacks clarity or No documentation or troubleshooting
issues found, and fixes applied with
some problem-solving effort. troubleshooting steps. evidence provided.
screenshots or logs.
SYLLABUS VERSION: 3 ACADEMIC YEAR: 2025 – 2026 Page 4 of 8
25-23 22-18 17-10 9-5
Safety Practices & Follows basic safety guidelines and Safety protocols are ignored or
Demonstrates excellent tool handling, Safety practices are inconsistent.
Workspace Management maintains a generally organized mishandled. Workspace is unsafe or
cable management, and adherence to Workspace is cluttered or disorganized,
workspace. Minor lapses in tool handling chaotic, posing risks to equipment or
safety protocols. with some risk factors present.
or setup. peers..

C. MA 3: Green IT Disaster Recovery Strategy

Rubrics:

Assessment Area Beyond Expectation Expected Fair Poor

25-23 22-18 17-10 9-5


Innovation & Craftsmanship Product is highly creative, well-crafted,
Product shows creative use of Product shows basic repurposing but Product is incomplete, unsafe, or lacks
and demonstrates thoughtful reuse of
components with minor design flaws. lacks refinement or innovation. creative reuse.
parts.
25-23 22-18 17-10 9-5
Sustainability & Relevance Clearly explains environmental benefit;
Sustainability message is present but Product includes vague sustainability No clear link to sustainability or green IT
product aligns with green IT or recovery
somewhat underdeveloped. reference with little context. concepts.
goals.
25-23 22-18 17-10 9-5
Product operates reliably and safely
Functionality & User Safety Product functions as intended with minor Product has limited functionality or Product is non-functional, unsafe, or
under intended conditions. Design
usability or safety concerns. Basic user inconsistent performance. Safety or poses risks to users. No consideration of
considers user experience, ergonomics,
needs are considered. usability issues are present. usability or safety.
and risk mitigation.
Documentation & 25-23 22-18 17-10 9-5
Presentation Provides thorough build log, visual aids, Documentation is adequate with basic Limited documentation; missing key Poor or missing documentation; no
and reflective insights on process and visuals and explanation. steps or reflection. explanation of value.
impact.

IV. LEARNING PLAN

Time Aligned Recommended


Learning Outcomes Teaching – Learning Assessment
Frame Course Course Content Readings and
At the end of the lesson, students should be able to: Activities Tasks
Week(s) Outcomes References
Discuss how the SNCFII Vision, Mission and Core Values SNCFI Vision, Mission and Core Values SNCFI VM and
are attained through this course CV
1 Class Discussion WOE: Reflection
Describe the course, course content, assessments and
expectations Course Orientation Course Syllabus
2-4  Identify the key components and types of IT Infrastructure CO 1 I. FUNDAMENTALS OF IT 1,2 Class Discussion WOE:
in digital environments. INFRASTRUCTURE Group Problem QUIZ 1,
 Describe the role and importance of IT infrastructure in A. Importance of IT infrastructure Presentation LAB 1

SYLLABUS VERSION: 3 ACADEMIC YEAR: 2025 - 2026 Page 5 of 8


supporting organizational operations.
 Illustrate how different types of IT Infrastructure are used
in real-world scenarios.
 Compare and contrast various of IT Infrastructure based
on functionality and scalability. B. Components of IT infrastructure
 Assess the effectiveness of an organization’s IT C. Types of IT Infrastructure
Infrastructure in meeting performance, reliability and
sustainability goals.
 Design a basic IT Infrastructure plan tailored to the needs
of a specific organization or use case.
 Identify the major classifications of computers and basic
components of computer systems
 Describe the purpose and functions of common computer
II. CLASSIFICATION OF COMPUTERS AND
components (CPU, RAM, Storage)
ITS COMPONENTS
 Application of different types of computers in real-world WOE:
A. Classifications of Computers Class Discussion
5-6 organizations or user’s needs. CO 1 1,2 QUIZ 2
B. Components of a Computer System Reporting
 Compare hardware specifications across various MA1
computer classifications to determine performance C. Key Features of a Computer
capabilities.
 Asses the computer types suitable for specific task
applications based on its features and architecture.
 Identify common network components (e.g., switch, router,
NIC) and list different types of networks and topologies.
 Describe the functions of basic network components and
explain how various network topologies organize data
flow.
 Illustrate how different types of networks and topologies III. NETWORK TYPES AND TOPOLOGIES
are used in real-life organizational setups. A. Network and its Components WOE:
 Compare the advantages and disadvantages of network B. Types of Computer Networks Class Discussion QUIZ 3
7-8 CO 2 1,2,3
topologies (e.g., star vs. mesh) in terms of reliability, cost, C. Types of Network Topologies Concept Mapping QUIZ 4
and scalability. LAB 2, LAB 3
 Assess which network type and topology would best suit a
given scenario based on organizational needs and
limitations.
 Design a basic network layout with appropriate topology
and components for a specified use case, including
justification for choices.
9 Midterm Examination
10-11  Identify the components of a basic network (e.g., cables, CO 2 1,2,3 Class Discussion WOE:
routers, switches) Recall the functions of OSI and TCP/IP IV. CABLES, ROUTERS AND SWITCHES Individual Activity LAB 4
model layers. A. Composition of a Network MA2
 Explain the difference between wired and wireless network B. Network Cabling
setups. Describe how data flows through the OSI and C. Wire and Wireless Network Setup
TCP/IP models. D. OSI Data Flow and OSI Layers
 Demonstrate how to set up a simple wired or wireless E. TCP/IP Model Layers
SYLLABUS VERSION: 3 ACADEMIC YEAR: 2025 – 2026 Page 6 of 8
network using appropriate cabling and devices. Match
network scenarios to the correct OSI or TCP/IP layer
functions.
 Compare the OSI and TCP/IP models in terms of structure
F. Parameters of OSI and TCP/IP Models
and functionality. Distinguish between different types of
network cables and their use cases.
 Assess whether a wired or wireless setup is more suitable
for a rural school environment.
 Identify common wireless security protocols including
WEP, WPA, WPA2, and WPA3.
 Explain the purpose of each protocol and how it protects
wireless networks from unauthorized access
 Demonstrate basic steps to secure a Wi-Fi network using V. WIRELESS STANDARDS AND SECURITY
encryption and authentication methods A. Common Network Issues
 Compare wireless protocols based on security features, CO 2, B. Types of Wireless Network Security Class Discussion WOE:
12-13 3,4
vulnerabilities, and compatibility. CO 3 Protocols Problem Presentation LAB 5
 Assess the effectiveness of wireless security setups in C. Ways to Secure Wi-Fi Networks
different environments such as public hotspots or home D. WEP, WPA, WPA2 and WPA3
networks.
 Design a secure wireless network configuration that
incorporates appropriate protocols and best practices for
encryption, access control, and threat mitigation.
 Define authentication and authorization, and list the
components and classifications of access control.
 Explain the relationship between authentication and
authorization, and describe the significance of regulatory
compliance in access control systems.
 Illustrate how access control mechanisms are
VI. SECURITY FUNDAMENTALS AND
implemented in secure systems, including different
ACCESS CONTROL
classification methods. WOE:
A. Authentication vs Authorization Class Discussion
14-15  Differentiate between types of access control models (e.g., CO 3 3,4 QUIZ 5
B. Components of Access Control Policy Making
DAC, MAC, RBAC) and analyze their strengths and QUIZ 6
C. Importance of Regulatory Compliance
weaknesses.
D. Classifications of Access Control
 Assess the effectiveness of access control strategies in
meeting regulatory standards and organizational security
needs.
 Design a basic access control policy for a given
organization, incorporating authentication strategies and
compliance considerations.
 Identify the core principles and key components that VII. DISASTER RECOVERY AND GREEN IT
define Green IT practices in disaster recovery. A. Core Principles of Green It in Disaster
 Explain how Green IT contributes to energy efficiency, Class Discussion
Recovery
16-17 environmental protection, and resource optimization in CO 3 3,4 Group Project MA3
B. Key Components of Green IT in
disaster scenarios. Presentation
Disaster Recovery
 Illustrate how sustainable technologies (e.g., virtualization, C. Financial Benefits of Green IT
SYLLABUS VERSION: 3 ACADEMIC YEAR: 2025 - 2026 Page 7 of 8
cloud storage) are integrated into disaster recovery
planning.
 Examine the financial benefits of Green IT, including cost
savings in energy, maintenance, and infrastructure D. Common Barriers to Green IT in
management. Disaster Recovery
 Assess common barriers to implementing Green IT in
disaster recovery and propose solutions based on industry
best practices.
18 Final Examination

V. Recommended Readings and References

1. IT Infrastructure Architecture: Infrastructure Building Blocks and Concepts, Sjaak Laan 2017
2. Computer Networking: A Top-Down Approach (7th Edition), James F. Kurose & Keith W. Ross, 2017
3. Classification of Computers and Components, Introduction to Computer System, TMV University, 2020
4. Security in Wireless Networks and Mobile Platforms, IEEE Editors, 2020
VI. Classroom Policies

1. All students are expected to attend their classes regularly and punctually. Students who arrived 15 minutes after the start of class will be recorded as absent. A student who incurred a cumulative
absence of 20% of the course hours shall be dropped from the course. No special assessment tasks shall be given to any student for unexcused tardiness or absence.
2. Students have the utmost responsibility to comply with the requirements of the course on time. The course instructor, in consultation with the institution’s concerned academic supervisors, reserves the
right to decide on academic concerns of the course.
3. Any form of dishonesty (including, but not limited to, plagiarism and cheating in any form, and the like) is prohibited. AI-generated contents must not exceed 15% of the total output.

Prepared by: Reviewed by: Approved by:

CHIN LEE JOY B. AGRAMON SHERYL MAE B. RODA JUN Y. BADIE, LPT, PHD
Faculty BSIS Program Head Academic Director

SYLLABUS VERSION: 3 ACADEMIC YEAR: 2025 – 2026 Page 8 of 8

You might also like