BMIS 665 Information Operations and Security
Course Description
Operations Security is used to identify the controls over hardware, media and the operators with access privileges to any of these resources. This course will look at the mechanisms, tools and facilities that permit the identification of security events and subsequent actions that follow identification. The course will address the threats, vulnerabilities and countermeasures that can be utilized to physically protect an enterprise’s resources and sensitive information. A study of Business Continuity and Disaster Recovery Planning addresses the preservation of the business in face of major disruption to normal business operations will also be included. The preparation, testing and updating of specific actions to protect critical business processes from the effects of major system and network failures will be explored.
For information regarding prerequisites for this course, please refer to the Academic Course Catalog.
Course Guide
View this course’s outcomes, policies, schedule, and more.*
*The information contained in our Course Guides is provided as a sample. Specific course curriculum and requirements for each course are provided by individual instructors each semester. Students should not use Course Guides to find and complete assignments, class prerequisites, or order books.
Rationale
This course completes the Information Assurance cognate in a new program: Masters of Information Systems.
Course Assignment
Textbook readings and lecture presentations
No details available.
Course Requirements Checklist
After reading the Syllabus and Student Expectations, the student will complete the related checklist found in the Course Overview.
Discussions (7)
Discussions are collaborating learning experiences. Therefore, the student will complete varying types of Discussions throughout the course. Each thread must be at least 500 words and demonstrate course knowledge. The student must also respond to 3 other classmates’ threads with at least 250 words in each reply. For each thread, students must support their assertions with at least 2 scholarly citations in APA format. Each reply must incorporate at least 2 scholarly citations in APA format. For Discussion: Trust Associated with Cyber Security and Discussion: Biblical Integration – Ethical Hacker Scenario, threads must incorporate at least 4 passages of Scripture and 2 peer-reviewed sources and the replies must include 2 biblical references.
Project Assignments (3)
The student is required to create a security solution in 3 phases. The objective of the final, comprehensive project is to apply the learning objectives of the Information Assurance program to the project. The students will show competence through the execution of a final information security solution and business continuity plan.
Quizzes (4)
There are four quizzes for this course. Each quiz will cover the course material for the modules in which they are assigned. Each quiz will be open-book/open-notes, contain 25 multiple-choice questions, and have a 20 minute time limit.

Have questions about this course or a program?
Speak to one of our admissions specialists.
Inner Navigation
Have questions?