- Degrees & Programs
- Student Activities
- Career Services
Course Code: SCMT373 Course ID: 2562 Credit Hours: 3 Level: Undergraduate
This course explores industry standards, practices and methods of determining the adequacy of security management programs. It reviews the interplay of management structures, functions and processes as well as proper procedures for conducting physical security analyses and evaluations. The course examines the principles of operating technology-centered programs for the protection of assets.
|Registration Dates||Course Dates||Session||Weeks|
|03/30/20 - 09/04/20||09/07/20 - 11/01/20||Summer 2020 Session D||8 Week session|
|04/27/20 - 10/02/20||10/05/20 - 11/29/20||Fall 2020 Session B||8 Week session|
|05/25/20 - 10/30/20||11/02/20 - 12/27/20||Fall 2020 Session I||8 Week session|
|06/29/20 - 12/04/20||12/07/20 - 01/31/21||Fall 2020 Session D||8 Week session|
|07/27/20 - 01/01/21||01/04/21 - 02/28/21||Winter 2021 Session B||8 Week session|
After completing this course the student will be able to:
CO-1: Distinguish security operations in the management environment and core competencies to initiate effective protection programs.
CO-2: Describe industry standards and practices used to effectively evaluate physical and cyber security programs.
CO-3: Illustrate the merits of vulnerability, risk, and assurance assessments in operating a successful security program.
CO-4: Assess the principles of operating physical/technology-centered and personnel-intensive programs.
A discussion question is provided and posts should reflect an assimilation of the readings. Students are required to provide a substantive initial post by Thursday at 11:55 pm ET and respond to 2 or more classmates by Sunday 11:55 pm ET. Forum posts are graded on timeliness, relevance, knowledge of the weekly readings, and the quality of original ideas.
Week 2, Week 4 & Final Assignments
The Assignments can be found in the assignment tab in the course website. Your assignments will be graded using the Rubric criteria as explained in the Rubric contained in the assignment section.
Each student is required to submit a research paper describing a model project to upgrade security at your facility (or a fictional facility) using the process identified in the three-part Security Architecture and Engineering series. In whatever order seems most logical to you, address total system design including barriers, site hardening, access control, lighting, Intrusion Detection Systems, CCTV, patrols, etc.
|Forum 1||4.17 %|
|Forum 2||4.17 %|
|Forum 3||4.17 %|
|Forum 4||4.17 %|
|Forum 5||4.17 %|
|Forum 6||4.17 %|
|Week 4 Assignment||12.50 %|
|Week 2 Assignment||12.50 %|
|Research Paper||30.00 %|
|Final Assignment||20.00 %|
|Final Assignment||20.00 %|
McCrie, R. D. (2007). Security operations management (2nd ed). Boston, MA: Elsevier Butterworth-Heinemann.
|Book Title:||Security Operations Management, 2nd Ed - e-book available in the APUS Online Library|
|Book Title:||To find the library e-book(s) req'd for your course, please visit http://apus.libguides.com/er.php to locate the eReserve by course #.|
|Author:||No Author Specified|
Not current for future courses.