This course exposes various facets of the process for implanting and maintaining practical cyber information security program designed to protect key information assets of an organization. Topics covered include using logical and physical controls to integrate information confidentiality, integrity, and availability (CIA) into an organizationís information security program, assessing and planning for business needs using various survey and risk assessment methodologies, and creating recommendations based upon analyses. The alignment of information security systems and organizational strategy will also be discussed.
MGT510 or concurrent
Upon completion of this course, students will be able to:
Specified on the course schedule/outline
|W||—||Withdrawal during weeks 1 - 7|
|WF||—||Withdrawal failing after week 7|
|NF||—||Failing – Not actively engaged|
For more details about the Grading System, please see the current catalog.
Students must be actively engaged in the course. For a definition of active engagement, please see the current catalog.
Cheating and plagiarism are serious offenses against the Universityís academic integrity and are consequently strictly prohibited. All students must familiarize themselves with the University policy on Academic Integrity.
Penalties for cheating and plagiarism are described in the University policy on Academic Integrity in the catalog. They include failure of the assignment, failure for the course, or dismissal from the University. For the complete Cheating/Plagiarism policy, please see the current catalog.
Students who have disabilities that may impact their performance in this course should follow the process described under the heading Accommodations for the Disabled in the current catalog.
Date of last review: Unknown