Intro To Information Assurance & Security –

cmgt400

(3 credits)

This course is an introduction to information assurance and security in computing technology. Topics include risk management; protecting information in the enterprise; business continuity and disaster recovery planning; threats and remediation; legal, ethical, and professional issues; and considerations within systems development processes.
This undergraduate-level course is 5 weeks. This course is available to take individually or as part of a degree or certificate program. To enroll, speak with an Enrollment Representative.

Fundamental Aspects

  • Describe the concept of information as an asset and management practices for protecting information.
  • Explain how the principles of confidentiality, integrity, and availability work together to protect information.
  • Identify the role and responsibilities of risk management in protecting organizational information.

Constant Dangers

  • Describe potential risks and threats to organizational information systems.
  • Explain the role of cost-benefit analysis in establishing effective information assurance and security.
  • Explain techniques and processes for identifying vulnerabilities and threats to information systems.
  • Analyze the legal, ethical, and regulatory considerations of protecting data.
  • Describe the need for security measures in IT organizations and information systems.

Securing and Protecting Information Systems

  • Explain countermeasures used to protect organizational information systems.
  • Describe how data can be protected in each information state.
  • Create the key elements of disaster recovery and business continuity plan.
  • Identify techniques and methods for securing information assets.

The Human Factor and Organizational Policy

  • Explain the key elements of an information security policy.
  • Explain effective ways to make users aware of information security risks.
  • Develop an organizational policy that contributes to information security.

Secure Development, Acquisition, and Operations

  • Explain the concept of threat modeling.
  • Describe the role of auditing relative to information assurance and security.

Start your journey now

Continue
or call us at866.766.0766

Contact us