cyb415 | undergraduate

Project Cybersecurity Policy And Governance

Explore by:

or call us at

About:

About:

This project is designed to enhance the skills based competencies of the Chief Information Security Officer's role in today's environment. Students must conduct detailed analysis of case industry studies and perform practical application exercises involving executive level decisions that are highly critical to overall success.

This undergraduate-level course is 5 weeks To enroll, speak with an Enrollment Representative.

Course details:

Credits: 3
Continuing education units: XX
Professional development units: XX
Duration: 5 weeks

topic title goes here

    Security Management and Risk Management Program

    • Analyze choices for determining information security specifications and apply that gained knowledge to building a security management plan.
    • Evaluate legal and regulatory compliance requirements necessary in formulating a comprehensive information security governance program plan.
    • Develop a systematic process for evaluating risk and critical controls for informing a risk framework and management plan.
    • Create a security management program that aligns with organizational goals, objectives, and outcomes.

    Audit Management

    • Analyze an information system for determining and applying security control objectives and information security risk knowledge in order to build a security plan.
    • Assess information security controls for mitigating risks and securing operations for a specified industry organization.
    • Produce an appropriate information security policy.
    • Develop appropriate processes for continuous improvement using a Plan of Action and Milestones (POA&M) to assist in audit management.

    Security Information and Event Management (SIEM)

    • Analyze organizational structure, culture, and key vendors for aligning an information security portfolio with organizational goals, objectives, and outcomes.
    • Analyze the organizational structure, culture, and key objectives of a security operations center (SOC) in order to develop a SOC implementation plan.
    • Create a plan for Security Information and Event Management (SIEM).

    Penetration Testing

    • Appraise policies and procedures for network, device, and application security.
    • Generate a risk management and incident response plan.
    • Create an agreement for a penetration testing.

    Vendor Selection Policy

    • Evaluate a strategic plan for the information security program that supports the organization’s business objectives.
    • Develop a financial model for the investments needed that supports the information security program in alignment with the strategic plan.
    • Design a vendor selection policy and plan for an organization that relies on vendor IT products.
    Tuition for individual courses varies. For more information, please call or chat live with an Enrollment Representative.

    Please ask about these special rates:

    Teacher Rate: For some courses, special tuition rates are available for current, certified P-12 teachers and administrators. Please speak with an Enrollment Representative today for more details.

    Military Rate: For some courses, special tuition rates are available for active duty military members and their spouses. Please speak with an Enrollment Representative today for more details.

    The University of Phoenix reserves the right to modify courses.

    While widely available, not all programs are available in all locations or in both online and on-campus formats. Please check with a University Enrollment Representative.

    Transferability of credit is at the discretion of the receiving institution. It is the student’s responsibility to confirm whether or not credits earned at University of Phoenix will be accepted by another institution of the student’s choice.