CSIS 344 Information Security Operations
Course Description
For information regarding prerequisites for this course, please refer to the Academic Course Catalog.
Course Guide
View this course’s outcomes, policies, schedule, and more.*
*The information contained in our Course Guides is provided as a sample. Specific course curriculum and requirements for each course are provided by individual instructors each semester. Students should not use Course Guides to find and complete assignments, class prerequisites, or order books.
Rationale
In an Internet-centric world, organizations require business processes designed to protect critical or confidential information using cost-effective IT security methods and controls. This course will provide the student with the information and skills necessary to implement and maintain an effective information security program supporting business operations. To support effective information security program operations, the student will learn the operational concepts, principles, and activities of a security program as well as how to manage a program within an organization. The student will learn to consider the organization’s culture, business needs, processes, risk factors, and tolerance as well as regulatory compliance requirements when operating a security program.
Course Assignment
Textbook readings and lecture presentations
No details available.
Course Requirements Checklist
After reading the Course Syllabus and Student Expectations, the student will complete the related checklist found in the Course Overview.
Discussions are collaborative learning experiences. Therefore, the student is required to create a thread in response to the provided prompt. Each thread must be at least 300 words and demonstrate course-related knowledge. In addition to the thread, the student is required to reply to 2 other classmates’ threads. Each reply must be at least 100 words.
The student is required to provide a written review of the information found in the Learn area in the assigned Module: Week. Each Article Review must be a minimum of 750 words, be in current APA format, and demonstrate course-related knowledge with biblical implications.
As a case study, the student will conduct a risk assessment for an organization of his/her choosing. Based on the results of the assessment, the student will draft a disaster recovery plan (DRP) and an incident response plan as part of an information security program. To that end, the student will submit for approval a topical outline and a topic proposal that will be used toward the requirements of the Research Paper: Final Assignment. The topic proposal must be at least 250 words, and the outline must be at least 3 tiers and must include at least 5 references in addition to the course textbooks and the Bible.
For the case study, the student will conduct a risk assessment for an organization of his/her choosing. He/she will write a research-based paper of at least 1,000 words in current APA format. The paper will report the result of the risk assessment in support of implementing an Information Security program or improving the program the organization already has in place. The paper must include at least 5 references in addition to the course textbooks, the Bible. The information from the Case Study Assignment must be incorporated into the Research Paper: Final Assignment.
The student will write a research-based paper of at least 2,000 words in current APA format. The paper must focus on the implementation and operation of the disaster recovery plan (DRP) and incident response team (IRT) portions of an Information Security Program in relation to the risk assessment conducted by the student in the Case Study Assignment. The paper must include at least 5 references in addition to the course textbooks, the Bible and the resources used in the Research Paper: Topic Proposal and Outline and in the Case Study Assignment.
The student will complete 4 Cybrscore Lab Assignments, each dealing with concepts relevant to the topic of study in the assigned Module: Week. The assignments are hands-on in a virtual environment and can be accessed through a third-party link on the assignment page.
Each quiz will cover the Learn material for the Modules: Weeks in which it is assigned. Each quiz will be open-book/open-notes, contain 30 multiple-choice and true/false questions, and have a 1-hour-30-minute time limit.

Have questions about this course or a program?
Speak to one of our admissions specialists.
Inner Navigation
Have questions?