Preview

CMGT430 2015 SYLLABUS

Satisfactory Essays
Open Document
Open Document
2598 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CMGT430 2015 SYLLABUS
SYLLABUS
CMGT/430 Enterprise Security

Copyright ©2015 by University of Phoenix. All rights reserved.

Course Description
This course covers the managerial and technical considerations related to access controls, authentication, external attacks, and other risk areas facing an enterprise. This course will also survey the techniques to prevent unauthorized computer and facility access as well as the concepts for protecting the hardware and software assets of an enterprise.

Course Dates
Faculty Information
Name :
Email Address :
Phone Number :

Policies
Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents (both located on your student website):
• Academic Policies
University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality.

Academic Resources
• Information Systems Management in Practice
• Management Information Systems
• Securing the Virtual Environment: How to Defend the Enterprise Against Attack
• Computer Security: Principles and Practice
• Management of Information Security
• Course Software
Instructions
• Check the Course Software link to see if this course requires additional software. We do not recommend trial software versions because they expire. SupportingMaterial
• Course Software

• SkillSoft
Instructions
• Access the SkillSoft link. The first time you access SkillSoft, you need to register. Do the following to register for SkillSoft: Go to the SkillSoft Link.
Register by clicking on Register. The Register button is in the lower right corner, below the login boxes. Leave the Organization Code field blank.
Use your phoenix.edu e-mail address. Use your student website login name as your user ID (the name before the @email.phoenix.edu).

You May Also Find These Documents Helpful

  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    This course covers much material about information security in a few short weeks. Whereas the subject is much deeper than what is covered in the course material, you should obtain a useful overview of how important effective information security is, and some ways it can be effectively…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Csia 301 - Syllabus

    • 4678 Words
    • 19 Pages

    Prerequisite: CMIS 102. A comprehensive introduction to the protection of business information and the systems that support business processes. The objective is to identify common threats and attacks employed against Web-accessible applications, analyze the role of security models and architectures, explain the role of cryptography, and analyze issues related to security management and network security.…

    • 4678 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    BSA 375 Syllabus

    • 3768 Words
    • 25 Pages

    University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be…

    • 3768 Words
    • 25 Pages
    Satisfactory Essays
  • Satisfactory Essays

    FOCUS 2 Instructions

    • 273 Words
    • 1 Page

    3 Proceed with the registration and log in as an online student with the ONLINE STUDENT ACCESS CODE: Eagles…

    • 273 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Powerful Essays

    SCI100 Syllabus

    • 2086 Words
    • 15 Pages

    University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be…

    • 2086 Words
    • 15 Pages
    Powerful Essays
  • Satisfactory Essays

    Syllabus BCOM 285

    • 1376 Words
    • 6 Pages

    Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents:…

    • 1376 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    ISSA2014

    • 13545 Words
    • 40 Pages

    & Bartlett Learning has developed the first comprehensive program solution designed to prepare students for…

    • 13545 Words
    • 40 Pages
    Good Essays
  • Powerful Essays

    Psy/300 Syllabus

    • 3134 Words
    • 13 Pages

    Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents:…

    • 3134 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    You may register with our website by creating an account. To register, we require you to submit your name, email address and to create a password. You are responsible…

    • 1382 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Software Security

    • 4565 Words
    • 19 Pages

    Proceedings of the 10th Colloquium for Information Systems Security Education University of Maryland, University College Adelphi, MD June 5-8, 2006…

    • 4565 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    CSE 3482 Introduction to Computer Security Introduction to Information/Computer Security Instructor: N. Vlajic, Winter 2014 Learning Objectives Upon completion of this material, you should be able to: • Describe the key security requirements of confidentiality, integrity and availability (CIA). • Describe the CNSS security model (McCumber Cube). • Identify today’s most common threats and attacks against information. • Distinguish between different main categories of malware. Required Reading Computer Security, Stallings: Chapter 1…

    • 1155 Words
    • 11 Pages
    Satisfactory Essays
  • Good Essays

    a. Type your Logon ID (Your student ID) b. Type your Password c. Select “Student” from the dropdown list as member group. d. And finally click the “Sign In” button 2. Registration: a. Select the “Registration Page” from the Registration Menu. b. After your student ID, Please click the “Load Courses” button.…

    • 514 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Internet Security

    • 1915 Words
    • 8 Pages

    Over the last decade, the Internet has put the rest of the world at reach because of computers. In the same way it also made computers more reachable by the rest of the world as well. The Internet is subject to widespread attacks ranging from worms, hackers, spoofing, spam, and phishing; just to name a few. Every computer device is susceptible and vulnerable to security attacks and those attacks can be just as detrimental to an organization as it is to an individual. Organizations of all sizes want and need to secure their network connectivity to their data and applications because of the need to collaborate both inside and outside the organization. Because of the security risk vulnerability it poses, organizations need requirements established to maintain its integrity for all its valuable data. Not only is information security important to an organization but also its information is valuable to its consumers who information that it must protect.…

    • 1915 Words
    • 8 Pages
    Powerful Essays