In this course, students compare, contrast, and evaluate contemporary practices in the implementation of security solutions.
By the end of this course, the student will be able:
- To identify implementation strategies utilized in addressing Information Security problem solutions.
- To assess the requirements for each appropriate implementation strategy.
- To compare and contrast the benefits and risks associated with alternative implementation strategies in relation to schedule, resources, budget, culture and compliance requirements.
- To formulate a recommended implementation approach and develop the supporting implementation plan documentation.