People Innovation Excellence

Information System Security

Learning Outcomes

On successful completion of this course, students will be able to: Describe the role of information system security in organization; Explain information security policy and security program; Describe security management and risk management; Identify protection mechanisms and skills for information security personnel.

Topics

  1. Introduction to the Management of Information Security
  2. Planning for Security
  3. Planning for Contingencies
  4. Information Security Policy
  5. Developing the Security Program
  6. Security Management Models
  7. Security Management Practices
  8. Risk Management: Identifying and Assessing Risk
  9. Risk Management Case Study
  10. Risk Management: Controlling Risk
  11. Protection Mechanisms
  12. Personnel and Security

 


Published at :

Periksa Browser Anda

Check Your Browser

Situs ini tidak lagi mendukung penggunaan browser dengan teknologi tertinggal.

Apabila Anda melihat pesan ini, berarti Anda masih menggunakan browser Internet Explorer seri 8 / 7 / 6 / ...

Sebagai informasi, browser yang anda gunakan ini tidaklah aman dan tidak dapat menampilkan teknologi CSS terakhir yang dapat membuat sebuah situs tampil lebih baik. Bahkan Microsoft sebagai pembuatnya, telah merekomendasikan agar menggunakan browser yang lebih modern.

Untuk tampilan yang lebih baik, gunakan salah satu browser berikut. Download dan Install, seluruhnya gratis untuk digunakan.

We're Moving Forward.

This Site Is No Longer Supporting Out-of Date Browser.

If you are viewing this message, it means that you are currently using Internet Explorer 8 / 7 / 6 / below to access this site. FYI, it is unsafe and unable to render the latest CSS improvements. Even Microsoft, its creator, wants you to install more modern browser.

Best viewed with one of these browser instead. It is totally free.

  1. Google Chrome
  2. Mozilla Firefox
  3. Opera
  4. Internet Explorer 9
Close