In this course, students analyze an enterprise-wide view of information systems and the establishment of appropriate, cost-effective information protection programs. Within this context, students examine a set of standard policies, procedures, activities, and a management structure to certify and accredit information systems for the protection of the data as well as the systems.
By the end of this course, the student should know or be able to:
- To recommend and justify a certification and accreditation methodology appropriate to an organization's compliance requirements.
- To design the components necessary to perform a certification assessment.
- To develop a certification plan to meet an organization's compliance requirements.
- To assess residual risk and produce an accreditation recommendation.