Close Menu

Cyber Security Management, IT-S 478

About this Course: 

In-depth examination of topics in the management of information technology security including access control systems and methodology, business continuity and disaster recovery planning, legal issues in information system security, ethics, computer operations security, physical security and security architecture models using current standards and models.

Course Status: 

Not scheduled


Basic understanding of information system (IS).

Who Should Attend: 

This course is valuable to any IT Professional involved in security compliance within the organization.

Expected Outcomes: 

Upon completion of this course, participants should be able to:

  • Describe what incident response is and how it came to mean what it does today
  • Identify and define key terms and critical concepts
  • Describe the role of professionals involved in incident response in an organizational structure
  • Explain the need for incident response
  • Describe the more common attacks used against organizations and individuals
  • Define threat management and its role in incident response
  • Explain what an incident management plan is and identify its major components

Course Outline: 

Planning for Security
Security policy
Risk Management
The Information Security Audit
Disaster Recovery and Business Continuity
Developing Security Programs
Security Management Models
Protection Mechanisms
Personnel and Security
Legal, Ethical and Professional Issues

Course Details: 

Grading/CEU award for this course includes assignments, paper and exams.