sec401 | undergraduate

Threat And Vulnerability Management

Explore by:

or call us at

About:

About:

This course highlights a methodical approach to security management. Students will learn the steps necessary to carrying out a comprehensive security risk assessment with consideration for physical facilities, personnel, equipment, and operating systems. Students will evaluate techniques and current trends for identifying and managing security risks and vulnerabilities associated with potential threats.

This undergraduate-level course is 5 weeks To enroll, speak with an Enrollment Representative.

Course details:

Credits: 3
Continuing education units: XX
Professional development units: XX
Duration: 5 weeks

topic title goes here

    Managing Vulnerabilities and Applying Countermeasures

    • Create plans for countermeasures, recovery, and operational back-up.
    • Evaluate the pros and cons of working from a floor plan for security application.
    • Examine the application of countermeasures for physical, personal, and information security threats.
    • Recall testing and measurement methods, reliability, and validity for meeting security goals, objectives, and metrics.
    • Evaluate the effectiveness of physical, personal, and information security systems.
    • Assess overall strengths and weakness of a comprehensive security system.
    • Perform a cost-benefit analysis to include actual benefits as well as estimated benefits through deterrence.
    • Examine risk management options for security.

    Principles of Emergency Management

    • Identify the various elements required for an emergency management plan.
    • Examine the concept of preparedness and describe the symbiotic relationship this has with effective security management.
    • Evaluate potential risks and emergency management countermeasures for nature-made incidents.
    • Evaluate potential risks and emergency management countermeasures for human-made incidents.
    • Identify key personnel and describe the benefits of an emergency management team.
    • Determine what human and tangible resources are needed and available for emergency response contingencies.
    • Evaluate the issues and vulnerabilities associated with emergency response to include training, resource allocation, and supervision.
    • Assess the elements of a comprehensive evaluation process for an emergency management plan and describe how after-action reports can affect the security assessment process.

    Criminal Activity and Terrorism

    • Compare the benefits and limitations of prevention vs. enforcement.
    • Evaluate case studies involving crimes against persons.
    • Analyze incidents of terrorist activity and assess vulnerabilities associated with each target or asset.
    • Assess the deterrent effect on crime and terrorist activity associated with the application of a methodical and comprehensive security plan.
    • Analyze case studies involving crimes against property.

    Threat and Risk Assessment

    • Estimate the probability and criticality of threats to determine risk.
    • Evaluate the process and various steps of a security risk assessment.
    • Identify types of assets and loss implications.
    • Identify methods of collecting intelligence and identifying potential threats.
    • Determine general and specific types of threats to which businesses, facilities, organizations or individuals might be exposed.
    • Identify the value of prioritizing threats based on risk.

    Vulnerability Assessment

    • Evaluate internal security risks and vulnerabilities.
    • Identify vulnerabilities associated with information systems, technology, and cyber threats.
    • Research and determine vulnerabilities related to physical terrain or geographic location.
    • Assess security measures used by businesses, facilities, organizations, or individuals.
    • Determine risks and vulnerability associated with work behaviors.
    • Research and evaluate physical security measures in the greater area, surrounding area, on a facility premises and within an organization's area of responsibility.
    Tuition for individual courses varies. For more information, please call or chat live with an Enrollment Representative.

    Please ask about these special rates:

    Teacher Rate: For some courses, special tuition rates are available for current, certified P-12 teachers and administrators. Please speak with an Enrollment Representative today for more details.

    Military Rate: For some courses, special tuition rates are available for active duty military members and their spouses. Please speak with an Enrollment Representative today for more details.

    The University of Phoenix reserves the right to modify courses.

    While widely available, not all programs are available in all locations or in both online and on-campus formats. Please check with a University Enrollment Representative.

    Transferability of credit is at the discretion of the receiving institution. It is the student’s responsibility to confirm whether or not credits earned at University of Phoenix will be accepted by another institution of the student’s choice.