|
|
|
|
|
|
|
Course Criteria
Add courses to your favorites to save, share, and find your best transfer school.
-
3.00 Credits
Analysis of the basic legal principles applicable to ordinary commercial transactions, with special emphasis on contracts, agencies, and commercial paper.
-
3.00 Credits
Reviews basic legal principles applicable to formation and operation of business organizations including corporate and non-corporate entities. Also covers significant areas of legal regulation of business and property transactions.
-
3.00 Credits
Emphasizes the development of managerial theory and decision methodology in evaluating the financial function of the firm. Analyzes working capital management, the concepts and techniques employed in the procurement of resources from financial markets, and their allocation to productive investments. Prerequisites: ACCT 202.
-
3.00 Credits
This foundation course provides managers with the essential framework needed to design and develop an effective information security program. Explores methods used to raise general security awareness, reviews current industry practices, and develops expertise needed to adapt policies to safeguard proprietary information.
-
3.00 Credits
Effective security managers must know how to develop a security policy that will be adopted by all employees and supported by executive management. This course examines the steps required in policy development including risk assessment, identification of internal and external threats, legal and privacy issues, creating reports, and escalation procedures. Related topics such as access controls, security standards, and policy implementation are covered in depth.
-
3.00 Credits
Students explore the basic building blocks needed to implement a life-cycle security system. Instruction focuses on how to analyze internal applications, computing platforms/network infrastructure, and corporate objectives with an eye toward designing flexible security architecture that is best suited for the enterprise. Case studies are used to illustrate key security architecture concepts and methods. Visiting experts from the field of ISM enrich classroom discussions.
-
3.00 Credits
Investigate the key role the information security manager plays in designing and conducting both limited and full-scale security audits. Students review the essential components of a security audit and learn how to integrate methodology with company needs. The pitfalls connected with conducting a security audit are covered in full to assure that best practices are incorporated for effective results. Creating audit reports, identifying areas of vulnerability, and responding to third party audits are also addressed. Case studies reviewing government and private audits are used to illustrate course concepts.
-
3.00 Credits
The security manager must be equipped to identify and protect against all forms of internal and external threats. This computer lab-based course examines common security threats including hacker attacks, incursions, backdoor programs, email borne viruses, and the potential for internal sabotage. Students also learn how to anticipate and respond to such threats using an arsenal of security tools, appliances, and devices including firewalls, intrusion detection systems, vulnerability assessment systems, single sign on, virtual private networks, and authentication systems. Course work also touches on implementing practical network security measures including the importance of hardening operating systems and critical applications to eliminate vulnerabilities.
-
3.00 Credits
Students develop an understanding of the technology used to distribute information in support of eBusiness and the security concerns inherent in an open access environment. Instruction surveys the technologies that are key for backend integration (XML, CORBA, DCOM and JavaBeans) and front-end deployment (HTML and Java). Course work reviews the strengths and weaknesses of common operating systems such as Windows NT, Linux, and Unix as well as the risks versus benefits of deploying one system over another. Communications concepts such as TCP/IP, ISP delivery channels, and wireless technology are discussed in detail. Performance and security issues relative to each technology introduced in this course are discussed in depth.
-
3.00 Credits
Explores the 10 domains of the ISC2 Common Body of Knowledge to prepare students for the Certified Information system Security Professional (CISSP) examination.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Privacy Statement
|
Terms of Use
|
Institutional Membership Information
|
About AcademyOne
Copyright 2006 - 2024 AcademyOne, Inc.
|
|
|