Course Code: ISSC680 Course ID: 3874 Credit Hours: 3 Level: Graduate
Information Security includes an evaluation of the techniques, policies and strategies to ensure that data stored in an organization's computers cannot be accessed or processed without the consent of the organization. Also included, is an analysis of Information Security & Risk Management, Access Control, Physical Security, Security Architecture & Design, Business Continuity & Disaster Recovery Planning, Telecommunications & Network Security, Application Security, Operations Security, Law, Compliance & Investigations. This course also reviews the building blocks of information systems and cryptography is provided to reinforce the scope of security management.
|Registration Dates||Course Dates||Session||Weeks|
|11/30/20 - 04/30/21||05/03/21 - 06/27/21||Spring 2021 Session I||8 Week session|
|12/28/20 - 06/04/21||06/07/21 - 08/01/21||Spring 2021 Session D||8 Week session|
|01/25/21 - 07/02/21||07/05/21 - 08/29/21||Summer 2021 Session B||8 Week session|
|02/22/21 - 07/30/21||08/02/21 - 09/26/21||Summer 2021 Session I||8 Week session|
|03/29/21 - 09/03/21||09/06/21 - 10/31/21||Summer 2021 Session D||8 Week session|
Upon completion of this course of study, the student will be able to:
- Recommend a course of action in support of Information Security & Risk Management.
- Assess the various Access Control methods.
- Differentiate between the different types of cryptographic algorithms.
- Evaluate the features and functionality of various Physical Security models.
- Appraise the various types of Security Architecture & Design models.
- Compare and Contrast various Business Continuity & Disaster Recovery Planning models.
- Demonstrate the ability to identify examples of Telecommunications & Network Security, Application Security and Operations Security.
- Analyze ethical issues that arise from the intersection of Law, Compliance & Investigations.
The grading will be based on essay assignments, Forum postings, and research paper
- There will be six essay assignments. The assignments and exercise will count as 30% of the final grade. The homework assignments will follow each of the major portions of the course. These assignments will be problems or questions from the text. They are selected to provide the student with information to understand the concepts discussed. Assignments should be prepared in Microsoft Word or an equivalent word processor program and uploaded into the student folder by the due date.
- There will be 8 Forum postings you will need to respond to. Answers should be a paragraph with a topic sentence that restates the question and supporting sentences using the terms, concepts, and theories from the required readings. Each answer should be a minimum of 250 words (about 6 or 7 sentences) with APA format citations. You may attack, support or supplement other students’ answers using the terms, concepts and theories from the required readings. All responses should be a courteous paragraph that contains a topic sentence with good supporting sentences. You may respond multiple times with a continuous discussion with points and counter points. The key requirement is to express your idea and then support your position using the terms, concepts and theories from the required readings to demonstrate to me that you understand the material. The Forum postings will count as 30% of the final grade.
- Project Topic and Proposal:
- Project Paper Outline:
- Annotated Bibliography:
- Final Paper:
|Unassigned||Constitution Day Quiz|
|Milestone 1 (Project Proposal)||Milestone 2 (Project Outline)|
|Milestone 3 (Bibliography)||Milestone 4 (Final Project)|
|Week 1 Assignment||Week 2 Assignment|
|Week 3 Assignment||Week 4 Assignment|
|Week 5 Assignment||Week 6 Assignment|
|Week 8 - Xtra Credit||Week 1 Forum|
|Week 2. Forum||Week 3 Forum|
|Week 4 Forum||Week 5 Forum|
|Week 6 Forum||Week 7 Forum|
|Week 8 Forum|
Reference: American Psychological Association. (2010). Publication manual of the American Psychological Association (6th edition). Washington, DC: Author. ISBN: 1-4338-0561-8
- Microsoft Office (MS Word, MS Excel, MS PowerPoint)
- Adobe Acrobat Reader (Click here for free download)
|Book Title:||REFERENCE ONLY- Information Security Fundamentals, 2nd edition-This text will be REQUIRED in ISSC661 and ISSC680. This text will be used as a reference only for the other courses in the ISSC program. - eBook available in the APUS Online Library|
|Publication Info:||Auerbach Publications|
|Author:||Thomas R. Peltier|
|Book Title:||Information Security: Design, Implementation, Measurement & Compliance - eBook available in the APUS Online Library|
|Publication Info:||Auerbach Publications|
|Author:||Layton, Timothy P.|
Not current for future courses.