Skip Navigation
 

Course Details

 

Course Details

Course Code: ISSC680 Course ID: 3874 Credit Hours: 3 Level: Graduate

Information Security includes an evaluation of the techniques, policies and strategies to ensure that data stored in an organization's computers cannot be accessed or processed without the consent of the organization. Also included, is an analysis of Information Security & Risk Management, Access Control, Physical Security, Security Architecture & Design, Business Continuity & Disaster Recovery Planning, Telecommunications & Network Security, Application Security, Operations Security, Law, Compliance & Investigations. This course also reviews the building blocks of information systems and cryptography is provided to reinforce the scope of security management.

Course Schedule

Registration Dates Course Dates Start Month Session Weeks
03/29/2022 - 09/02/2022 09/05/2022 - 10/30/2022 September Summer 2022 Session D 8 Week session
04/26/2022 - 09/30/2022 10/03/2022 - 11/27/2022 October Fall 2022 Session B 8 Week session
05/21/2022 - 11/04/2022 11/07/2022 - 01/01/2023 November Fall 2022 Session I 8 Week session
06/28/2022 - 12/02/2022 12/05/2022 - 01/29/2023 December Fall 2022 Session D 8 Week session
07/25/2022 - 12/30/2022 01/02/2023 - 02/26/2023 January Winter 2023 Session B 8 Week session

Current Syllabi

Upon completion of this course of study, the student will be able to:

  1. Recommend a course of action in support of Information Security & Risk Management.
  2. Assess the various Access Control methods.
  3. Differentiate between the different types of cryptographic algorithms.
  4. Evaluate the features and functionality of various Physical Security models.
  5. Appraise the various types of Security Architecture & Design models.
  6. Compare and Contrast various Business Continuity & Disaster Recovery Planning models.
  7. Demonstrate the ability to identify examples of Telecommunications & Network Security, Application Security and Operations Security.
  8. Analyze ethical issues that arise from the intersection of Law, Compliance & Investigations.

Upon completion of this course of study, the student will be able to:

  1. Recommend a course of action in support of Information Security & Risk Management.
  2. Assess the various Access Control methods.
  3. Differentiate between the different types of cryptographic algorithms.
  4. Evaluate the features and functionality of various Physical Security models.
  5. Appraise the various types of Security Architecture & Design models.
  6. Compare and Contrast various Business Continuity & Disaster Recovery Planning models.
  7. Demonstrate the ability to identify examples of Telecommunications & Network Security, Application Security and Operations Security.
  8. Analyze ethical issues that arise from the intersection of Law, Compliance & Investigations.
Book Title:REFERENCE ONLY- Information Security Fundamentals, 2nd edition-This text will be REQUIRED in ISSC661 and ISSC680. This text will be used as a reference only for the other courses in the ISSC program. - eBook available in the APUS Online Library
ISBN:9781439810620
Publication Info:Auerbach Publications Lib
Author:Thomas R. Peltier
Unit Cost:$79.95
 
Book Title:Information Security: Design, Implementation, Measurement & Compliance - eBook available in the APUS Online Library
ISBN:9780849370878
Publication Info:Auerbach Publications Lib
Author:Layton, Timothy P.
Unit Cost:$123.40
 

Previous Syllabi

Not current for future courses.