Search results: 2233
This course is not yet visible to your students. Please don't forget to set the course visibility settings to "Show" when your course is ready. Refer to "4.1.1 HOW TO MANAGE COURSE SETTINGS" of the Teacher's Guide.
- Teacher: CC_Jhumel Ignas
Category: Carmona Campus
This course is not yet visible to your students. Please don't forget to set the course visibility settings to "Show" when your course is ready. Refer to "4.1.1 HOW TO MANAGE COURSE SETTINGS" of the Teacher's Guide.
- Teacher: CC_Jhumel Ignas
Category: Carmona Campus
This course is not yet visible to your students. Please don't forget to set the course visibility settings to "Show" when your course is ready. Refer to "4.1.1 HOW TO MANAGE COURSE SETTINGS" of the Teacher's Guide.
- Teacher: CC_Jhumel Ignas
Category: Carmona Campus
- Teacher: Myra Famini
Category: Carmona Campus
- Teacher: CEIT_Ma. Yvonne Czarina Angcaya
Category: Mid Year 2020-2021
The course analyzes the appropriateness of a decision to in-source or out-source IT services in a given situation. Creation of testing environments and designing stress test using appropriate tools ang techniques that impact system performance. Implementation of enterprise integration of middleware platforms are also discussed in this course
- Teacher: NC_Henry Balanza
Category: Naic Campus
The course analyzes the appropriateness of a decision to in-source or out-source IT services in a given situation. Creation of testing environments and designing stress test using appropriate tools ang techniques that impact system performance. Implementation of enterprise integration of middleware platforms are also discussed in this course
- Teacher: NC_Henry Balanza
Category: Naic Campus
This course is not yet visible to your students. Please don't forget to set the course visibility settings to "Show" when your course is ready. Refer to "4.1.1 HOW TO MANAGE COURSE SETTINGS" of the Teacher's Guide.
- Teacher: IC_DOMINIC ACE NAZARENO
Category: Imus Campus
The course focuses on the analysis of different user populations with regard to their abilities and characteristics for using both software and hardware products. Evaluation of the design of existing user interfaces based on the cognitive models of the target user is also covered in the course.
- Teacher: Joven Ramos
Category: Naic Campus
The course focuses on the analysis of different user populations with regard to their abilities and characteristics for using both software and hardware products. Evaluation of the design of existing user interfaces based on the cognitive models of the target user is also covered in the course.
- Teacher: Joven Ramos
Category: Naic Campus
The course focuses on the analysis of different user populations with regard to their abilities and characteristics for using both software and hardware products. Evaluation of the design of existing user interfaces based on the cognitive models of the target user is also covered in the course.
- Teacher: Joven Ramos
Category: Naic Campus
The course focuses on the analysis of different user populations with regard to their abilities and characteristics for using both software and hardware products. Evaluation of the design of existing user interfaces based on the cognitive models of target user is also covered in the course.
- Teacher: JEFFERSON RODRIGUEZ
Category: CEIT
- Teacher: CEIT_Joneil Baculod
Category: CEIT
This course is not yet visible to your students. Please don't forget to set the course visibility settings to "Show" when your course is ready. Refer to "4.1.1 HOW TO MANAGE COURSE SETTINGS" of the Teacher's Guide.
- Teacher: CEIT_Rachel Rodriguez
Category: CEIT
This course is not yet visible to your students. Please don't forget to set the course visibility settings to "Show" when your course is ready. Refer to "4.1.1 HOW TO MANAGE COURSE SETTINGS" of the Teacher's Guide.
- Teacher: CEIT_Aila Marie Buri
- Teacher: Stephen Andrei Rocillo
Category: CEIT
The course examines the relationship between threats, vulnerabilities, countermeasures, attacks, compromises and remediation throughout the entire system life cycle. This also explain the key factors involved in the authentication and how they are used to verify identity and grant access. Legal and ethical consderations related to the handling and management of enterprise information assets are also part of of the course.
- Teacher: CEIT_John Carlo De Leon
Category: CEIT
This course is not yet visible to your students. Please don't forget to set the course visibility settings to "Show" when your course is ready. Refer to "4.1.1 HOW TO MANAGE COURSE SETTINGS" of the Teacher's Guide.
- Teacher: CEIT_Mariz Aquino
Category: CEIT
This course is not yet visible to your students. Please don't forget to set the course visibility settings to "Show" when your course is ready. Refer to "4.1.1 HOW TO MANAGE COURSE SETTINGS" of the Teacher's Guide.
- Teacher: RUEL CARLITO
- Teacher: JEFFERSON RODRIGUEZ
Category: CEIT
This course is not yet visible to your students. Please don't forget to set the course visibility settings to "Show" when your course is ready. Refer to "4.1.1 HOW TO MANAGE COURSE SETTINGS" of the Teacher's Guide.
- Teacher: JEFFERSON RODRIGUEZ
Category: CEIT
This course is not yet visible to your students. Please don't forget to set the course visibility settings to "Show" when your course is ready. Refer to "4.1.1 HOW TO MANAGE COURSE SETTINGS" of the Teacher's Guide.
- Teacher: JEFFERSON RODRIGUEZ
Category: CEIT