Skip to main content
Print this page
Select a Catalog
Walsh College Academic Catalog 2024-2025
Walsh College Transfer Resources
Walsh College Academic Catalog 2023-2024
Archive Catalogs
Catalog Search
Search Options
Entire Catalog
Programs
Courses
Search
http://walshcollege.smartcatalogiq.com/
3f571aa1-6e72-4b80-8839-291468d1e2d5
https://searchproxy.smartcatalogiq.com/search
c23b95a7-7dea-455b-a27e-be49f6fabe02
course
/Institutions/Walsh-College/json/2021-2022/Walsh-College-Catalog-2021-2022-local.json
/Institutions/Walsh-College/json/2021-2022/Walsh-College-Catalog-2021-2022.json
Contents
Welcome to Walsh
Academic Calendar & Important Dates
General Information
Walsh Degree Programs
Academic Policies and Requirements
Undergraduate Degree Programs
Graduate Degree Programs
Dual Degree Programs
Graduate Certificates
Doctoral Degree Programs
Courses
ACC - Accounting
BL - Business Law
COM - Communications
DIS - Dissertation
ECN - Economics
ENG - English
FIN - Finance
IDS - Interdisciplinary
IT - Information Technology
200
300
400
500
IT 501
IT 502
IT 505
IT 506
IT 510
IT 511
IT 512
IT 520
IT 530
IT 531
IT 532
IT 533
IT 534
IT 536
IT 537
IT 538
IT 540
IT 541
IT 542
IT 544
IT 545
IT 546
IT 547
IT 550
IT 551
IT 552
IT 553
IT 554
IT 555
IT 556
IT 565
IT 566
IT 567
IT 575
IT 590
IT 599
MGT - Management
MKT - Marketing
MTH - Math
QM - Quantitative Methods
RES - Research
TAX - Taxation
Walsh Leadership
Walsh Faculty
Walsh Board of Trustees
Walsh History
Notice of Nondiscrimination
Catalog Links
Catalog Home
Site Map
All Catalogs
IT 565
FUNDAMENTALS OF CYBERSECURITY
An exploration of the components of a comprehensive information systems security plan including such critical areas as planning and administration of security, the security program, access control and network security measures, Internet and e-commerce security issues, physical protection of computing facilities, and the legal and regulatory aspects of information security. Students will learn how to protect an organization from computer crime and potentially malicious behavior, and to ensure confidentiality, availability and data integrity through several hands-on case studies. Students will review the ten domains ISC2.
Credits
3
Prerequisite
None
Distribution
INFORMATION TECHNOLOGY