cmgt400 | undergraduate

Intro To Information Assurance & Security

Explore by:

or call us at

About:

About:

This course is an introduction to information assurance and security in computing technology. Topics include risk management; protecting information in the enterprise; business continuity and disaster recovery planning; threats and remediation; legal, ethical, and professional issues; and considerations within systems development processes.

This undergraduate-level course is 5 weeks This course is available to take individually or To enroll, speak with an Enrollment Representative.

Course details:

Credits: 3
Duration: 5 weeks

topic title goes here

    Securing and Protecting Information Systems

    • Identify techniques and methods for securing information assets.
    • Explain countermeasures used to protect organizational information systems.
    • Describe how data can be protected in each information state.
    • Create the key elements of disaster recovery and business continuity plan.

    The Human Factor and Organizational Policy

    • Explain the key elements of an information security policy.
    • Explain effective ways to make users aware of information security risks.
    • Develop an organizational policy that contributes to information security.

    Secure Development, Acquisition, and Operations

    • Explain the concept of threat modeling.
    • Describe the role of auditing relative to information assurance and security.

    Fundamental Aspects

    • Describe the concept of information as an asset and management practices for protecting information.
    • Explain how the principles of confidentiality, integrity, and availability work together to protect information.
    • Identify the role and responsibilities of risk management in protecting organizational information.

    Constant Dangers

    • Analyze the legal, ethical, and regulatory considerations of protecting data.
    • Describe potential risks and threats to organizational information systems.
    • Explain the role of cost-benefit analysis in establishing effective information assurance and security.
    • Explain techniques and processes for identifying vulnerabilities and threats to information systems.
    • Describe the need for security measures in IT organizations and information systems.
    Tuition for individual courses varies. For more information, please call or chat live with an Enrollment Representative.

    Please ask about these special rates:

    Teacher Rate: For some courses, special tuition rates are available for current, certified P-12 teachers and administrators. Please speak with an Enrollment Representative today for more details.

    Military Rate: For some courses, special tuition rates are available for active duty military members and their spouses. Please speak with an Enrollment Representative today for more details.

    The University of Phoenix reserves the right to modify courses.

    While widely available, not all programs are available in all locations or in both online and on-campus formats. Please check with a University Enrollment Representative.

    Transferability of credit is at the discretion of the receiving institution. It is the student’s responsibility to confirm whether or not credits earned at University of Phoenix will be accepted by another institution of the student’s choice.