Version: 3/20/2019 2
Additional Course Information
Topical Outline: Each offering of this course must include the following topics (be sure to include information regarding lab,
practicum, and clinical or other non-lecture instruction).
• Introduction to Management of Information Security
• Compliance: Laws and Ethics
• Governance and Planning for Security
• Security Policies
• Developing Security Programs
• Risk Management - identifying and assessing risk
• Controlling Risk
• Security Management Models
• Security Management Practices
• Planning for Contingencies
• Personnel and Security
Course Learning Outcomes:
Learning Outcomes – Upon successful completion of this course, students will:
1. Develop a security plan
2. Establish suitable level of protection
3. Determine legal issues
4. Implement network security design
5. Revise risk analysis and security plan
Methods of Assessment:
• Individual Projects
• Group Projects
• Lab Assignments
• Tests and Quizzes
• Final Exam
Required text(s), optional text(s) and/or materials to be supplied by the student:
Management of Information Security, 5th Edition, Michael E. Whitman - Herbert J. Mattord, ISBN-13: 978-1305501256 |
© 2017 or current similar textbook in the field.
Suggested Course Maximum:
16
List any specific or physical requirements beyond a typical classroom required to teach the
course.
Limited by equipment. This is capstone course.
Access to netlab
• Computer (64 bit CPU) equipped with 12 GB RAM or more (running virtual machines), graphics card capable of
supporting virtual machines, 19” or better monitor, and removable hard drive (500 GB or better) for each student and
same for instructor.
• Instructor’s machine needs 2 network interface cards (one to connect to WCJC network and one to connect to student
pcs). And Data projector