User:Prakash Timilsina/Real Teaching Lesson Plan 5: Difference between revisions

From ICTED-WIKI
Jump to navigation Jump to search
 
 
Line 4: Line 4:
Subject: Network Security
Subject: Network Security


Topic: Security Policies and its policies
Topic: Security Policies and its nature


Period Duration: 50 min
Period Duration: 50 min


== Specific Objectives: ==
== Specific Objectives: ==
At the end of the class, students will be able to:
# Understand and explain the concept of policies.
# Students can make documents of rules for small organizations.


== Teaching Learning Materials: ==
== Teaching Learning Materials: ==
Daily usages materials, Laptop, PowerPoint Presentations slide, Multimedia


== Teaching Learning Activities: ==
== Teaching Learning Activities: ==
At the first phase, I will ask questions about previous topic, if they have doubt, I will clarify their doubts, then I will infer today's topic (Security policies).
At the second phase, I will make them to discuss about the topic in their peer for that I will make peer also, then after discussion there find a conclusion, then I will write the conclusion.
At the last phase, I will explain the topic (security policies are the documentation a rule for any organization to achieve their goals that are defined by related organization like business, financial institute, hospital etc.)  I will explain that different organization have their own policies.


== Evaluation: ==
== Evaluation: ==
# Suppose you have your own business or organization, then what are the rules that you can set for security?
# What is security policies?

Latest revision as of 13:14, 28 April 2024

Class: BEDICT 6th semester

Subject: Network Security

Topic: Security Policies and its nature

Period Duration: 50 min

Specific Objectives:[edit | edit source]

At the end of the class, students will be able to:

  1. Understand and explain the concept of policies.
  2. Students can make documents of rules for small organizations.

Teaching Learning Materials:[edit | edit source]

Daily usages materials, Laptop, PowerPoint Presentations slide, Multimedia

Teaching Learning Activities:[edit | edit source]

At the first phase, I will ask questions about previous topic, if they have doubt, I will clarify their doubts, then I will infer today's topic (Security policies).

At the second phase, I will make them to discuss about the topic in their peer for that I will make peer also, then after discussion there find a conclusion, then I will write the conclusion.

At the last phase, I will explain the topic (security policies are the documentation a rule for any organization to achieve their goals that are defined by related organization like business, financial institute, hospital etc.) I will explain that different organization have their own policies.

Evaluation:[edit | edit source]

  1. Suppose you have your own business or organization, then what are the rules that you can set for security?
  2. What is security policies?