This class explores the overarching security architectures and vectors of information assurance from a management perspective to allow the learner to formulate the basis for sound business decisions. Students gain an appreciation for systems, networks, processes, methodologies, documentation requirements, recovery processes, certification and accreditation processes as well as "best practice" implementation, training and continuous improvement. Discussions in this course give the correct acumen of personnel security, physical security, and technical operational security as these principles relate and interface with information security principles. Defense-in-depth principles also are covered for designing proper physical security programs. At the completion of the course students should be able to manage an IA function and evaluate an organization’s Contingency Planning process for adequacy.
Describe the principal functions of an Information Systems Security Officer (ISSO).
Describe the principal Information Security functions of System Certifiers (AKA,
Understand the importance of general enterprise-wide security awareness in the day-today
protection of an enterprise.
Demonstrate a fundamental knowledge of the laws and regulations enacted to combat
Demonstrate a fundamental understanding of the impact of laws and regulations on both
policies and practices of organizations.
Establish fundamental information security policies and procedures.
Describe the threats and vulnerabilities facing an enterprise - both its physical and
technical infrastructure and its intellectual property
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.