Syllabus

Submitted by: Submitted by

Views: 289

Words: 2824

Pages: 12

Category: Science and Technology

Date Submitted: 12/09/2013 05:05 PM

Report This Essay

Course Design Guide CMGT/400 Version 2

1

Course Syllabus

College of Information Systems & Technology CMGT/400 Version 2 Intro to Information Assurance & Security

Copyright © 2012, 2010 by University of Phoenix. All rights reserved.

Course Description This course is an introduction to information assurance and security in computing technology. Topics include risk management; protecting information in the enterprise; business continuity and disaster recovery planning; threats and remediation; legal, ethical, and professional issues; and considerations within systems development processes. Policies Faculty and students will be held responsible for understanding and adhering to all policies contained within the following two documents:   University policies: You must be logged into the student website to view this document. Instructor policies: This document is posted in the Course Materials forum.

University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Conklin, W. A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of computer security: CompTIA Security+™ and beyond (3rd ed.). New York, NY: McGraw Hill. Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology. Whitman, M. E., & Mattord, H. J. (2011). Readings and cases in information security: Law and ethics. Boston, MA: Course Technology. All electronic materials are available on the student website.

Week One: Fundamental Aspects

Details

Objectives 1.1 Describe the concept of information as an asset and management practices for protecting information. 1.2 Explain how the principles of confidentiality, integrity, and availability work together to protect information. 1.3...