Skip Navigation
 
 

ISSC680 - Information Security Management

Course Details

Course Code: ISSC680 Course ID: 3874 Credit Hours: 3 Level: Graduate

Information Security includes an evaluation of the techniques, policies and strategies to ensure that data stored in an organization's computers cannot be accessed or processed without the consent of the organization. Also included, is an analysis of Information Security & Risk Management, Access Control, Physical Security, Security Architecture & Design, Business Continuity & Disaster Recovery Planning, Telecommunications & Network Security, Application Security, Operations Security, Law, Compliance & Investigations. This course also reviews the building blocks of information systems and cryptography is provided to reinforce the scope of security management.





Course Schedule

Registration Dates Course Dates Session Weeks
11/26/18 - 05/03/19 05/06/19 - 06/30/19 Spring 2019 Session I 8 Week session
12/31/18 - 05/31/19 06/03/19 - 07/28/19 Spring 2019 Session D 8 Week session
01/28/19 - 06/28/19 07/01/19 - 08/25/19 Summer 2019 Session B 8 Week session
02/25/19 - 08/02/19 08/05/19 - 09/29/19 Summer 2019 Session I 8 Week session
03/25/19 - 08/30/19 09/02/19 - 10/27/19 Summer 2019 Session D 8 Week session
04/29/19 - 10/04/19 10/07/19 - 12/01/19 Fall 2019 Session B 8 Week session

Current Syllabi

Upon completion of this course of study, the student will be able to:

  1. Recommend a course of action in support of Information Security & Risk Management.
  2. Assess the various Access Control methods.
  3. Differentiate between the different types of cryptographic algorithms.
  4. Evaluate the features and functionality of various Physical Security models.
  5. Appraise the various types of Security Architecture & Design models.
  6. Compare and Contrast various Business Continuity & Disaster Recovery Planning models.
  7. Demonstrate the ability to identify examples of Telecommunications & Network Security, Application Security and Operations Security.
  8. Analyze ethical issues that arise from the intersection of Law, Compliance & Investigations.

The grading will be based on essay assignments, Forum postings, and research paper

  1. There will be six essay assignments. The assignments and exercise will count as 30% of the final grade. The homework assignments will follow each of the major portions of the course. These assignments will be problems or questions from the text. They are selected to provide the student with information to understand the concepts discussed. Assignments should be prepared in Microsoft Word or an equivalent word processor program and uploaded into the student folder by the due date.
  2. There will be 8 Forum postings you will need to respond to. Answers should be a paragraph with a topic sentence that restates the question and supporting sentences using the terms, concepts, and theories from the required readings. Each answer should be a minimum of 250 words (about 6 or 7 sentences) with APA format citations. You may attack, support or supplement other students’ answers using the terms, concepts and theories from the required readings. All responses should be a courteous paragraph that contains a topic sentence with good supporting sentences. You may respond multiple times with a continuous discussion with points and counter points. The key requirement is to express your idea and then support your position using the terms, concepts and theories from the required readings to demonstrate to me that you understand the material. The Forum postings will count as 30% of the final grade.
  3. Project Topic and Proposal:
  4. Project Paper Outline:
  5. Annotated Bibliography:
  6. Final Paper:
NameGrade %
Unassigned Week 1 Forum
Week 2. Forum Week 3 Forum
Week 4 Forum Week 5 Forum
Week 6 Forum Week 7 Forum
Week 8 Forum Week 1 Assignment
Week 2 Assignment Week 3 Assignment
Week 4 Assignment Week 5 Assignment
Week 6 Assignment Week 2 Milestone 1 (Project Proposal)
Week 4 Milestone 2 (Project Outline) Week 6 Milestone 3 (Bibliography)
Week 7 Milestone 4 (Final Project) Extra credit

Reference: American Psychological Association. (2010). Publication manual of the American Psychological Association (6th edition). Washington, DC: Author. ISBN: 1-4338-0561-8

Web-based Readings

http://www.sans.org/rr/

http://www.sans.org/resources/policies/

http://www.cert.org/

Software Requirements

Webliography

  1. ACM digital library: http://portal.acm.org/dl.cfm
  2. Google Scholar : http://scholar.google.com/
  3. IEEE digital library: http://www.computer.org/portal/web/csdl/home
Book Title:REFERENCE ONLY- Information Security Fundamentals, 2nd edition-This text will be REQUIRED in ISSC661 and ISSC680. This text will be used as a reference only for the other courses in the ISSC program.
ISBN:9781439810620
Publication Info:Auerbach Publications
Author:Thomas R. Peltier
Unit Cost:$79.95
Book Title:Information Security: Design, Implementation, Measurement & Compliance
ISBN:9780849370878
Publication Info:Auerbach Publications
Author:Layton, Timothy P.
Unit Cost:$123.40

Previous Syllabi

Not current for future courses.