IT 244 introduces general concepts of information systems security. Content includes governmental views, positions and processes of national security. Coursework explores other concepts, including contingency and business resumption planning, backup schemes and implementation strategies, as well as various types of invasive actions and prevention measures.
Describe the various parts of an effective Information Security Policy.
Security Architecture
Summarize the concept of a trusted computing base (TCB).
Explain the ring of trust model.
Describe the Trusted Computer Security Evaluation Criteria.
Business Continuity and Disaster Recovery Planning
Outline the steps involved in developing a Business Continuity Plan.
Describe the key elements of a Disaster Recovery Plan.
Cyber Crime
Describe the different types of cyber crime.
Identify the risks and impacts of cyber crime.
Physical Security Control and Operations Security
Distinguish between logical and physical security.
Identify the parts of a Physical Security Policy.
Outline the major categories of physical security threats.
Outline the types of controls needed for secure operations.
Physical Security Control and Operations Security (continued)
Differentiate between the principle of least privilege and the principle of separation of duties.
Access Control Systems, Cryptography, and Network Security
Describe how access control and authentication methodologies secure systems.
Explain the concept of cryptography.
Outline the roles of packet-filtering routers and firewalls and how they protect a network.
Intrusion Detection
Describe the two main classes of intrusion.
List the characteristics of a good intrusion detection system.
Application Development Security
Distinguish among several types of malicious software.
Create an Information Security Policy.
The University of Phoenix reserves the right to modify courses.
While widely available, not all programs are available in all locations or in both online and on-campus formats. Please check with a University Enrollment Advisor.
Transferability of credit is at the discretion of the receiving institution. It is the student’s responsibility to confirm whether or not credits earned at University of Phoenix will be accepted by another institution of the student’s choice.
You're using an older browser (a software program used to explore the web)
which is not optimal for viewing the University of Phoenix website. Consider
downloading a new browser to maximize your experience on this and other websites.
Your new browser should display web pages properly, increase your web surfing
speed and enhance your security.