** Regional & Continuing Education is working remotely until further notice. You can contact us via phone and email M–F, 8 a.m.–5 p.m. **

Security/Privacy Issues in IT

Online MBA Summer 2021: July 12-Aug 13

Description

This course covers a broad range of information security topics. The course theme is the protection of information resources from disruption, destruction, or disaster as well as unauthorized access. The course covers controls designed to (1) protect information assets, (2) detect the loss of information, and (3) correct information loss situations. Students study the use of authentication and authorization systems, firewalls, encryption systems, redundant disk arrays, and other tools designed to prevent loss of information. Students also study intrusion detection systems, file-fingerprinting tools as well as other methods and controls designed to detect information loss. Finally, students study backup strategies and controls designed to ensure the recovery of lost information. Single-site redundancy as well as the use of backup data centers and redundant communications systems are studied to address the protection of user access to information resources. Risk assessments, security policies, and formal controls processes are used to apply the information learned in the course to real world scenarios.
Prerequisites: Junior standing, open to Business and Computer Information System majors only.

Class Notes

Open to students admitted to the Special Session Online Masters in Business Administration Degree Program. Registrations are processed through the Regional & Continuing Education Office. Log on daily or as required by the faculty.

Class Details

Instructor
Instructor Name (static text): 
Johnson, Aaron A
Location

WWW ONLINE

Class Registration Information

Class #
1192
Course
MINS 536 -
SECT 501
Units
3
Fees
Amount per Unit
  • $1,000 / unit
Capacity
11/30
Class Meeting Dates

07/12/2021 - 08/13/2021

Days

Times

Registration

Class Fee: $3,000.00
MINS 536 - SECT 501

Security/Privacy Issues in IT

Class: 1192 Units: 3 Fees: $3,000.00

M-F 07/12/2021 - 08/13/2021

This course covers a broad range of information security topics. The course theme is the protection of information resources from disruption, destruction, or disaster as well as unauthorized access. The course covers controls designed to (1) protect information assets, (2) detect the loss of information, and (3) correct information loss situations. Students study the use of authentication and authorization systems, firewalls, encryption systems, redundant disk arrays, and other tools designed to prevent loss of information. Students also study intrusion detection systems, file-fingerprinting tools as well as other methods and controls designed to detect information loss. Finally, students study backup strategies and controls designed to ensure the recovery of lost information. Single-site redundancy as well as the use of backup data centers and redundant communications systems are studied to address the protection of user access to information resources. Risk assessments, security policies, and formal controls processes are used to apply the information learned in the course to real world scenarios.
Prerequisites: Junior standing, open to Business and Computer Information System majors only.

Class Notes

This course covers a broad range of information security topics. The course theme is the protection of information resources from disruption, destruction, or disaster as well as unauthorized access. The course covers controls designed to (1) protect information assets, (2) detect the loss of information, and (3) correct information loss situations. Students study the use of authentication and authorization systems, firewalls, encryption systems, redundant disk arrays, and other tools designed to prevent loss of information. Students also study intrusion detection systems, file-fingerprinting tools as well as other methods and controls designed to detect information loss. Finally, students study backup strategies and controls designed to ensure the recovery of lost information. Single-site redundancy as well as the use of backup data centers and redundant communications systems are studied to address the protection of user access to information resources. Risk assessments, security policies, and formal controls processes are used to apply the information learned in the course to real world scenarios.

Instructor
Instructor Name (static text): 
Johnson, Aaron A
Location
WWW ONLINE