Submitted by: Submitted by joshua7
Views: 289
Words: 2824
Pages: 12
Category: Science and Technology
Date Submitted: 12/09/2013 05:05 PM
Course Design Guide CMGT/400 Version 2
1
Course Syllabus
College of Information Systems & Technology CMGT/400 Version 2 Intro to Information Assurance & Security
Copyright © 2012, 2010 by University of Phoenix. All rights reserved.
Course Description This course is an introduction to information assurance and security in computing technology. Topics include risk management; protecting information in the enterprise; business continuity and disaster recovery planning; threats and remediation; legal, ethical, and professional issues; and considerations within systems development processes. Policies Faculty and students will be held responsible for understanding and adhering to all policies contained within the following two documents: University policies: You must be logged into the student website to view this document. Instructor policies: This document is posted in the Course Materials forum.
University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Conklin, W. A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of computer security: CompTIA Security+™ and beyond (3rd ed.). New York, NY: McGraw Hill. Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology. Whitman, M. E., & Mattord, H. J. (2011). Readings and cases in information security: Law and ethics. Boston, MA: Course Technology. All electronic materials are available on the student website.
Week One: Fundamental Aspects
Details
Objectives 1.1 Describe the concept of information as an asset and management practices for protecting information. 1.2 Explain how the principles of confidentiality, integrity, and availability work together to protect information. 1.3...