A comprehensive overview of the essential concepts students must know as they pursue careers in information systems security. Topics include a discussion of the new risks, threats, and vulnerabilities associated with the transformation to a digital world, including a look at how business, government, and individuals operate today. Additionally, information is included from the Official (ISC) 2 SSCP Certified Body of Knowledge and presents a high-level overview of each of the seven domains within the System Security Certified Practitioner certification. (Formerly BMIS 342)
Cyber security initiatives require a proactive and well-planned approach for defense measures. Such activities have to be thorough with respect to protections and exhaustive in regard to tracking and monitoring criminal activity. BMIS 343 looks at utilizing industry leading procedures for protecting, preventing, and tracking cyber-attacks.
Measurable Learning Outcomes
Upon successful completion of this course, the student will be able to:
- Discuss the relevance of course material and the use of technology to a biblical worldview.
- Recognize the appropriate steps for information security risk, response, and recovery.
- Annotate the basic concepts of cryptography to manage a secure infrastructure.
- Demonstrate the ability to assess and implement access controls.
- Explain how to identify and institute counter measures for malicious code.
- Analyze security issues, related networks, and systems.
Readings and lecture presentations
Course Requirements Checklist
After reading the Syllabus and Student Expectations, the student will complete the related checklist found in the Course Overview.
Discussions are collaborative learning experiences. Therefore, the student will participate in eight discussions. The student will post one thread by 11:59 p.m. (ET) on Thursday of the assigned Module: Week, and two replies by 11:59 p.m. (ET) on Monday of the assigned Module: Week.
The student will submit eight assignments, each dealing with a different aspect of cyber security.
The student will participate in two exams, each dealing with a different aspect of cyber security.