CMGT/433 - Cyber Security
Course Description
This course explores the evolution from information security to cyber security, policy and cyber security development, and the relationships between business and public- or private-sector organizations in meeting the challenges of cyber security threats. Students will be introduced to the legal and regulatory requirements for internal network and Internet security as they apply to both business and personal use. Vulnerabilities of both the organization and the individual will be reviewed as well as the processes and controls for mitigating cyber security threats. The need for an IT audit will also be explored as part of the vulnerability or mitigation process as well as the need for development of an organization-wide cyber security policy.
PLEASE NOTE:
Attendance and participation are mandatory in all university courses, and specific requirements may differ by course. If attendance requirements are not met, a student may be removed from the course. Please review the Course Attendance Policy in the Catalog for more information.
Course Objectives
Week 1
- Illustrate the key milestones in the history of information security to cyber policy and development.
- Differentiate enterprise security and cybersecurity.
- Identify strategies to determine an organization’s current security environment.
Week 2
- Identify the common categories of cybersecurity threats to both private and public organizations.
- Summarize five challenges that both mobile and cloud computing contribute to safe computing.
- Explain the importance of testing in detection and intrusion risk reduction in the cyber environment.
- Analyze the relationship between security system development lifecycle (SSDL) and threat modeling.
Week 3
- Determine the major components of contingency planning.
- Identify three network security strategies to build a defensible network.
- Outline the steps involved with a positive incidence response to an intrusion.
- Summarize how identifying and assessing risk can lead to prevention.
Week 4
- Examine the value to the company of an IT security audit.
- List the key components of an IT security audit.
- List the responsibilities of employees in an organization’s cybersecurity plan.
- Summarize strategies for securing web communications.
Week 5
- Create cybersecurity awareness materials for employees and management of an organization.
- Summarize the legal and ethical issues of cybersecurity.
- Outline a security policy mission statement.
- Examine regulations and legislation constraints that apply to cybersecurity.
Prerequisites
NoneDisclaimers
The University of Phoenix reserves the right to modify courses.
While widely available, not all programs are available in all locations or in both online and on-campus formats. Please check with an Enrollment Representative.
Transferability of credit is at the discretion of the receiving institution. It is the student’s responsibility to confirm whether or not credits earned at University of Phoenix will be accepted by another institution of the student’s choice.