Skip to main content
Print this page
Select a Catalog
Walsh College Academic Catalog 2024-2025
Walsh College Transfer Resources
Walsh College Academic Catalog 2023-2024
Archive Catalogs
Catalog Search
Search Options
Entire Catalog
Programs
Courses
Search
http://walshcollege.smartcatalogiq.com/
3b56b1c9-a846-4050-bcb6-17ff8c375d0e
https://searchproxy.smartcatalogiq.com/search
a7808710-a43d-4ba0-8c29-81b803a3ae2d
course
/Institutions/Walsh-College/json/2023-2024/Walsh-College-Catalog-local.json
/Institutions/Walsh-College/json/2023-2024/Walsh-College-Catalog.json
Contents
Welcome to Walsh College
General Information
Academic Calendar & Important Dates
Admission to Walsh College
Admission on a Student Visa
Readmission to Walsh College
Financial Aid and Scholarships
Walsh College Student Services
International Student Information
Veteran Student Information
Walsh College Programs
Walsh College Courses
ACC - Accounting
BL - Business Law
BTC - Business & Technology
COM - Communications
DCT - Doctoral
DIS - Dissertation
ECN - Economics
ENG - English
FIN - Finance
IDS - Interdisciplinary
IT - Information Technology
200 Level Courses
300 Level Courses
400 Level Courses
500 Level Courses
IT 501
IT 502
IT 505
IT 506
IT 510
IT 511
IT 512
IT 520
IT 530
IT 531
IT 532
IT 533
IT 534
IT 536
IT 537
IT 538
IT 540
IT 541
IT 542
IT 544
IT 545
IT 546
IT 547
IT 550
IT 551
IT 552
IT 553
IT 554
IT 555
IT 556
IT 557
IT 558
IT 559
IT 560
IT 565
IT 566
IT 567
IT 575
IT 590
IT 591
IT 592
IT 593
IT 599
700
MGT - Management
MKT - Marketing
MTH - Math
QM - Quantitative Methods
RES - Research Methods
RSD - Residency
TAX - Taxation
Walsh College Policies and Procedures
Walsh College Leadership
Walsh College Faculty
Catalog Links
Catalog Home
Site Map
All Catalogs
IT 565
CYBERSECURITY FOR LEADERSHIP
An exploration of the components of a comprehensive information systems security plan including such critical areas as planning and administration of security, the security program, access control and network security measures, Internet and e-commerce security issues, physical protection of computing facilities, and the legal and regulatory aspects of information security. Students will learn how to protect an organization from computer crime and potentially malicious behavior, and to ensure confidentiality, availability, and data integrity through several hands-on case studies. Students will review the ten domains ISC2.
Credits
3
Prerequisite
None
Distribution
INFORMATION TECHNOLOGY