IT 565 FUND OF CYBER SECURITY

An exploration of the components of a comprehensive information systems security plan including such critical areas as planning and administration of security, the security program, access control and network security measures, Internet and e-commerce security issues, physical protection of computing facilities, and the legal and regulatory aspects of information security. Students will learn how to protect an organization from computer crime and potentially malicious behavior, and to ensure confidentiality, availability and data integrity through several hands-on case studies. Students will review the ten domains ISC2.

Credits

3

Prerequisite

None

Distribution

INFORMATION TECHNOLOGY