Information Security Operations – CSIS 344

CG • Section 8WK • 11/08/2019 to 04/16/2020 • Modified 02/01/2024

Course Description

This course will cover the issues and tasks involved in the day to day operation of an Information Security System. The topics included in this course would be: risk management, auditing and monitoring, regulations and compliance, disaster recovery, incidence response, key management, information systems hardware and software operation, networks and transmission security, operational security, and cryptography.

For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

Rationale

In an Internet-centric world, organizations require business processes designed to protect critical or confidential information using cost-effective IT security methods and controls. This course will provide the student with the information and skills necessary to implement and maintain an effective information security program supporting business operations. To support effective information security program operations, the student will learn the operational concepts, principles, and activities of a security program as well as how to manage a program within an organization. The student will learn to consider the organization’s culture, business needs, processes, risk factors, and tolerance as well as regulatory compliance requirements when operating a security program.

Course Assignment

Textbook readings and lecture presentations

Course Requirements Checklist

After reading the Course Syllabus and Student Expectations, the student will complete the related checklist found in the Course Overview.