is Security Concepts
Start when you're ready
Choose an upcoming start date:
Please Note: Attendance and participation are mandatory in all University courses, and specific requirements may differ by course. If attendance requirements are not met, a student may be removed from the course. Please review the Course Attendance Policy in the Catalog for more information.
University of Phoenix reserves the right to modify courses. While widely available, not all programs are available to residents of all states. Please check with a University Enrollment Representative.
is Security Concepts
Course level: Undergraduate
This course introduces general concepts of information systems security. Content includes governmental views, positions, and risk assessment and management. Coursework explores other concepts, including contingency and business resumption planning, backup schemes, and implementation strategies, as well as various types of invasive actions and prevention measures.
What you'll learn
Course skills and outcomes
- Explain the role of IT infrastructure in the business environment.
- Explain the importance of information security.
- Describe potential threats, including environmental, external, and internal forces.
- Summarize the components of business risk assessment and mitigation.
- Select the appropriate mitigation technique for common scenarios.
- Illustrate risk management best practices.
- Discuss the importance of disaster preparation and planning.
- Describe potential solutions that support business recovery.
- Explain the key elements of recovering from lost assets.
- Identify techniques and methods for implementing and validating recovery plans.
- Define authentication, authorization, and access control and their implications.
- Explain general cryptography concepts, including why or why not it is used.
- Describe social engineering attacks and their impact/effectiveness.
- Define issues related to wireless security.
- Discuss pros and cons related to security using cloud technologies.
- Explain security controls as applied to outside service providers.