Protection of Information Assets
Learning Outcomes
Upon successful completion of this course, students are expected to be able to evaluate the design, implementation and monitoring of logical access controls to ensure the confidentiality, integrity, availability and authorized use of information assets; evaluate the design, implementation and monitoring of physical access controls to ensure that information assets are adequately safeguarded ; evaluate network infrastructure security to ensure confidentiality, integrity, availability and authorized use of the network and the information transmitted ; evaluate the design, implementation and monitoring of environmental controls to prevent or minimize loss ; evaluate the processes and procedures used to store, retrieve, transport and dispose of confidential information assets.
Topics
This course provides assurance that the security architecture of enterprise ensures the confidentiality, integrity, and availability (CIA) of information assets. The course evaluates design, implementation and monitoring of logical and physical access controls to ensure CIA. Topics covered include network infrastructure security, environmental controls, and process and procedures used to store, retrieve, transport and dispose of confidential information assets.
Pre-requisite: IS323 – IT Governance
Published at :
SOCIAL MEDIA
Let’s relentlessly connected and get caught up each other.
Looking for tweets ...