Operations Security is used to identify the controls over hardware, media and the operators with access privileges to any of these resources. This course will look at the mechanisms, tools and facilities that permit the identification of security events and subsequent actions that follow identification. The course will address the threats, vulnerabilities and countermeasures that can be utilized to physically protect an enterprise's resources and sensitive information. A study of Business Continuity and Disaster Recovery Planning addresses the preservation of the business in face of major disruption to normal business operations will also be included. The preparation, testing and updating of specific actions to protect critical business processes from the effects of major system and network failures will be explored.
For information regarding prerequisites for this course, please refer to the Academic Course Catalog.
This course completes the Information Assurance cognate in a new program: Masters of Information Systems.
Measurable Learning Outcomes
Upon successful completion of this course, the student will be able to:
- Discuss the relevance of course material and the use of technology to a biblical worldview.
- Demonstrate the mechanisms and devices necessary to build a secure organization.
- Assess security threats, vulnerabilities, and countermeasures.
- Implement appropriate security measures to prevent system and network intrusion.
- Use various relevant system and network security controls.
- Develop a business continuity and disaster recovery plan.
Textbook readings and lecture presentations/notes
Course Requirements Checklist
After reading the Syllabus and Student Expectations, the student will complete the related checklist found in the Course Overview.
The student will complete varying types of Discussions throughout the course. Each thread must be at least 500 words and demonstrate course knowledge. The student must also respond to 3 other classmates’ threads with at least 250 words in each reply. Discussions will also require peer-reviewed sources/references as indicated.
Project Assignments (3)
The student is required to create a security solution in 3 phases. The objective of the final, comprehensive project is to apply the learning objectives of the Information Assurance program to the project. The students will show competence through the execution of a final information security solution and business continuity plan.
There is a midterm and final quiz for this course. Each quiz will cover the course material for the modules in which they are assigned. Each quiz will be open-book/open-notes, contain 50 multiple-choice questions, and have a 1-hour time limit.