Skip to main content

We Are Moving Towards The 'Blended Learning'

Salam to all,

This is to inform that from now on, we will utilize and practice our teaching methodology through the i-learn portal at http://i-learn.uitm.edu.my/.

All assignment, project, discussion, teaching and coaching will be conducted in the portal. Some of our class also will be conducted online, therefore, be sure to have the i-learn portal login and get familiar with the system. I will inform to you whenever we need to conduct our class via online or you can choose to have the class or tutorial via the online portal.


Comments

Popular posts from this blog

ITT 320 - Computer Security (June-Nov 2012)

Announcement 1) Please be informed that I will attend a conference in Thistle Hotel, Johor Bahru from 3rd - 6th July 2012. Therefore, we will postpone and replace the class (3/7/2012) to some other date later. However, you still need to come for lab session (5/7/2012) and complete below task  independently: Please download  Network Basic Lab Test 1 , complete the answer and send to me on the next lab session. Please download  Nmap 6  and install in your own machine. (Preparation for next lab session) If you still have extra time, please download VMWARE player and make it ready in your machine. 2) Assignment 1 is already published here. The due date is 19/7/2012. Please find it in Assignment section below. 3) Quiz 1 will be held on 18/7/2012 during replacement class at B1-02. 4) Please help yourself to install (VMWare) Windows XP SP 1 or Windows Server 2003/2000 without patches for our lab demo on   26/7/2012 . (Post Date:23/7/2012) 5) Please make your machine re

ITT320 - Intro to Computer Security June 2013 - October 2013

_____________________________________________________   Please find our Scheme of Work for Semester June-October 2013 > Scheme Of Work Announcement 1) There will be no class from 17 June - 21 June 2013 (Induksi UiTM, Kg. Gajah, Perak). 2) Lecture Class on 8 July 2013, will start at 11 am as I need to attend a meeting with KP. 3) 17/7/2013 - Nessus Vulnerability Scanner - Please explore the manual provided in I-Learn. Scan your local system to find any vulnerabilities by using Nessus. Generate the report and email to me by Friday 19 July, 2013. -------------------------------------------------------------------------------------------------------------------- Class Materials I appreciate your effort for early preparation. There will be lot of new security jargon and terms that you need to cover, therefore, I would like you to read our second textbook and eBook for your references. 1) The Wiley Hacker 2) Hack Proof -------------------------------------------------

CSC 134 COMPUTER APPLICATION JUNE - OCTOBER 2013

WELCOM TO CSC134 - SEMESTER JUNE-OCTOBER 2013 ------------------------------------------------------------------------------------------------------------ Scheme of Work for CSC 134 CLASS MATERIALS 1) Chapter 1 - Introduction to Computers  ||  Chapter 1 - Mind Map 2) Chapter 2 - The Internet and World Wide Web 3) Chapter 3 - Input and Output 4) Chapter 4 - Secondary Storage 5) Chapter 5 - System Software 6) Chapter 6 - Application Software 7) Chapter 7 - Internet and the Web 8) Chapter 8 - Communications and Networking 9) Chapter 9 - Privacy, Security, Ethics and Ergonomics Sample Exam Paper 1 Sample Exam Paper 2 ------------------------------------------------------------------------------------------------------------ LAB MATERIAL 1) Microsoft Word 2007 Tutorial  || Lab Exercise  ||  ------------------------------------------------------------------------------------------------------------ LAB ASSIGNMENT 1) MS WORD - Proposal -------------------------