Skip to Main Content Skip to bottom Skip to Chat, Email, Text

CYB/405

Information Technology

Information Systems Governance

Online

Format

$1,194

Estimated Tuition

credits

Total credits

weeks

Course length

Start when you're ready

Choose an upcoming start date:

Enroll by 1pm Central:

Take this course on its own, or as part of a degree or certificate program.

Please Note: Attendance and participation are mandatory in all University courses, and specific requirements may differ by course. If attendance requirements are not met, a student may be removed from the course. Please review the Course Attendance Policy in the Catalog for more information.

University of Phoenix reserves the right to modify courses. While widely available, not all programs are available to residents of all states. Please check with a University Enrollment Representative.

Course level: Undergraduate

This course focuses on the application of information security management principles from an executive management point of view. This course will cover Information Security Management Program, the IS Governance Program, Regulatory and Legal Compliance, and Risk Management.

Prerequisites

None

Required materials

The materials required for this course are covered in your resource fees.

Please Note: Attendance and participation are mandatory in all University courses, and specific requirements may differ by course. If attendance requirements are not met, a student may be removed from the course. Please review the Course Attendance Policy in the Catalog for more information.

University of Phoenix reserves the right to modify courses. While widely available, not all programs are available to residents of all states. Please check with a University Enrollment Representative.

What you'll learn

Course skills and outcomes

  • Outline the essential components of a viable information security governance program.
  • Illustrate the drivers that influence information security governance.
  • Establish the desired outcomes of information security governance.
  • Compare and contrast the differences between corporate, IT, and information security governance.

  • Differentiate the major components of an information security program.
  • Appraise the organizational challenges for implementing an information security program.
  • Deconstruct the roles and responsibilities of key stakeholders responsible for an information security program.
  • Compare and contrast the roles and focus of the Chief Information Officer (CIO) and Chief Information Security Officer (CISO).

  • Assess regulatory requirements and their influence on business from an information security governance perspective.
  • Examine the impact of the Payment Card Industry (PCI) Data Security Standard on organizations that handle branded credit cards.
  • Differentiate the mandated regulatory and compliance requirements for the healthcare industry.
  • Appraise the NIST provisions for meeting regulatory and compliance requirements.

  • Analyze the purpose of distinct information security policy components.
  • Illustrate how critical controls drive the creation of security policies.
  • Compare and contrast the information security strategic plan with an information security policy.

  • Compare and contrast risk assessment methods and practices.
  • Describe the major components of the NIST risk management framework.
  • Describe the interdependencies of the NIST security control families and how they apply to an organization.
  • Assess the purpose and challenges for an organization to maintain a plan of actions and milestones (POA&M).

Why UOPX

Why take courses at University of Phoenix

Accreditation that matters

We’ve been accredited by the Higher Learning Commission (hlcommission.org) for more than 40 years.

Real-world instructors

Learn from instructors who bring an average of 25 years of working experience to the classroom.

Affordable and potentially reimbursable

Our tuition and fees are competitive and fixed. Also, check to see if your employer will cover you for this course.

Next Steps

Smiling enrollment representative

Start a conversation about your future with an enrollment representative today.

Transfer Credits

Credit Transfer

Need to transfer credits to another college or university?

Before you enroll in a course, check with your school of choice to make sure they will accept our transfer credits and to understand any requirements or limitations. Then you can complete your course, and request your official transcript be sent to your school. That’s it!

Transferability of credit is at the discretion of the receiving institution. It is the student’s responsibility to confirm whether or not credits earned at University of Phoenix will be accepted by another institution of the student’s choice. If you have a question contact us at (866) 354-1800.

The University of Phoenix reserves the right to modify courses. Although our continuing teacher education courses are accepted by some state agencies in the United States toward teacher certifications and endorsements, this may not be the case in all states or foreign jurisdictions. If you plan to use courses for certification or endorsement, please check with your own state agency and your school district for applicability. Continuing teacher education courses are not eligible to apply to degree programs at University of Phoenix. These courses are not eligible for federal financial aid. Transferability of credit is at the discretion of the receiving institution. It is the student’s responsibility to confirm whether or not credits earned at University of Phoenix will be accepted by another institution of the student’s choice. While widely available, not all programs are available to residents of all states. Please check with a University Enrollment Representative. If you have a question contact us at (866) 354-1800.