Here is a collection of resources for students, like me, who are taking the MS IT degree program.
Click each topic below to see the learning objectives and its video lesson.
At the end of the lesson, students will be able to do the following:
Differentiate data, information, and knowledge;
Identify the process of transforming data into information and the characteristics of quality information;
Define the term Information System.
List down the uses and components of information systems.
Discuss the 3 types of information systems used in organizations, namely personal IS, group IS, and enterprise IS; and
Tackle the organizational complements to ensure successful implementation and use of IS.
Video Lesson: https://youtu.be/g8059-8QDNk
At the end of the lesson, students will be able to do the following:
Discuss the term organization;
List down examples of mission statements;
Discuss value chain model's primary and support activities;
Identify the theorist who developed the value chain model and five-forces model;
Explain the role of information systems in the organization's value chain;
Describe the term competitive advantage; and
List down the key factors of the five-forces model.
Video Lesson: https://youtu.be/A2dTPbLomTA
At the end of the lesson, students will be able to do the following:
Identify the information systems used in each level of management hierarchy in an organization;
Describe key characteristics and examples of TPS, MIS, and DSS;
Differentiate batch processing and real-time processing;
Discuss the term information silo; and
Compare TPS, MIS, and DSS.
Video Lesson: https://youtu.be/nQ4Q3iN7TMM
At the end of the lesson, students will be able to do the following:
Differentiate waterfall and agile software methodologies;
Identify when waterfall, scrum, and kanban models are useful to use;
Discuss the phases or steps of the waterfall, scrum, and kanban models;
Explain how the waterfall, scrum, and kanban models work.
Enumerate the advantages and disadvantages of the waterfall and agile methodologies; and
Describe the goal of the waterfall, scrum, and kanban models.
Video Lesson: https://youtu.be/glwadLsKjhQ
At the end of the lesson, students will be able to do the following:
Discuss the benefits and drawbacks of business information systems;
Explain why enterprise-wide systems are now commonly used instead of independent, legacy systems; and
Differentiate Customer Relationship Management, Enterprise Resource Planning, and Supply Chain Management systems.
Video Lesson: https://youtu.be/FZbG0EF0rW8
At the end of the lesson, students will be able to do the following:
Define project;
List down examples of projects;
Describe project management;
Identify when project management is used;
Outline the components, constraints, or building blocks of every project: time, scope, cost, and quality;
Define project manager;
Enumerate the skills of a project manager;
Discuss the project management approaches or methodologies;
Explain the phases of project management, namely: initiation, planning, execution and monitoring, and closing stages; and
Itemize the tasks in every project management stage or phase.
Video Lesson: https://youtu.be/bXgo8X_1Xpk
At the end of the lesson, students will be able to do the following:
Explain the four elements of knowledge management;
Differentiate explicit and tacit knowledge;
Describe the methods to encourage knowledge-sharing, such as communities of practice and incentive scheme;
Enumerate options for storing captured and shared information; and
List down the forms of dissemination of knowledge.
Video Lesson: https://youtu.be/oWZAJMxh298
At the end of the lesson, students will be able to do the following:
Define what is Cisco Meraki;
Explain the Cisco Meraki architecture;
Discuss Meraki products: MX64 security appliance, MS220-8P switch, MR18 access point, MC74 phone, and MV74 security camera; and
Use the Meraki Dashboard to monitor and configure Meraki devices and networks.
Video Lesson: https://youtu.be/TMunTYN3sjk
At the end of the lesson, students will be able to do the following:
Define cybercrime;
Discuss what is Cybercrime Prevention Act of 2012; and
List down what are the offenses included in the Republic Act 10175.
Video Lesson: https://youtu.be/pJMGKeoIfyw
At the end of the lesson, students will be able to do the following:
Create strong passwords;
Be able to lock personal device;
Identify how the browser works;
Explain threats in using public WiFi;
Discuss disadvantages of being too public on social media;
Perform check and clean up of email;
List down steps to avoid malware from adware;
Demonstrate backing up files; and
Explain the importance of securing a wireless network.
Video Lesson: https://youtu.be/Ka3v2f9B1Kk
At the end of the lesson, students will be able to do the following:
Define copyright;
List down what can be protected using the copyright;
Discuss what rights does copyright give;
Identify how long does copyright last;
Describe patent;
Explain what kind of protection does a patent offer;
Determine how long does a patent last;
Define trademark;
Explain what rights does trademark registration provides;
Identify how long does a trademark last;
Discuss Republic Act Number 8293 or the Intellectual Property Code of the Philippines;
List down the mandate of the Intellectual Property Office of the Philippines; and
Explain what the IPOPHL logo represents.
Video Lesson: https://youtu.be/YlQFRzW6USQ
At the end of the lesson, students will be able to do the following:
Define data privacy;
Discuss what is the Data Privacy Act of 2012 or Republic Act No. 10173; and
Identify the functions of the National Privacy Commission.
Video Lesson: https://youtu.be/immgbXJRwKo
In this video, I will talk about the data subject's data privacy rights under the Republic Act 10173 or the Data Privacy Act of 2012.
At the end of the lesson, students will be able to do the following:
Describe data subject, personal information, and personal information controller; and
Discuss the data privacy rights of a data subject.
Video Lesson: https://youtu.be/immgbXJRwKo
At the end of the lesson, students will be able to do the following:
Define personal data breach;
Classify data breaches;
Identify reasons why data breaches occur;
Discuss COMELEC data breach and Cebuana Lhuiller data breach; and
Explain the procedures of data breach notification of the National Privacy Commission.
Video Lesson: https://youtu.be/UXZZNvzr7qQ
The following topics will be included on this page soon:
Differences between OSI and TCP/IP
Differences between ISO 27001 and ISO 25010
Types of Databases
Knowledge Areas of Project Management
Stay tuned for updates.