• Classroom
  • Online, Instructor-Led
Course Description

This course provides a broad overview of information systems security in organizations. Topics include security concepts and mechanisms; mandatory and discretionary controls; basic cryptography and its applications; intrusion detection and prevention; information systems assurance; and anonymity and privacy. Various types of controls used in information systems, as well as security issues surrounding the computer and computer-generated data, are also addressed.

Learning Objectives

  1. Given an organization with a need for information security, describe the basic concepts and terms pertaining to the security of an organization.
  2. Given an organization with a need for information security, explain the three main components of security management: risk management, security policies and procedures, and security education.
  3. Given an organization with a need for information security, describe the security mechanisms and controls available to protect an organization’s informational assets from unauthorized modification or disclosure.
  4. Given an organization with a need for information security, explain and identify the appropriate cryptographic encryption algorithms necessary to protect the organization’s assets.
  5. Given an organization with a need for information security, describe the various telecommunication and networking standards available to protect the transfer of an organization’s data across local and wide-area networks.
  6. Given an organization with a need for information security, describe the various security concerns to consider before and during the development of an application or system.
  7. Given a security case, prepare a business continuity plan to identify the critical functions of an organization and explain the strategies to minimize the effects of an outage or loss of service provided by these functions.
  8. Given a security case, describe the law applicable to the case concerning the rights, duties, and penalties of individuals in their relationships with each other.
  9. Given a security case, describe the investigation process and evidence as it relates to a computer-related crime.

Framework Connections