Opinion Paper of Course 2 pages for $10
Synopsis of Learning
Learning Objective: Evaluate the content of this course.
Assignment Requirements
This assignment is different than all previous assignments. The goal of the assignment is for you to reflect on what you have learned during the course and the relevance of the learning materials. This is an opinion paper, so do not tell us what you think we want to hear! This assignment will help us improve the course.
Consider each of the Course Learning Objectives listed below:
Briefly discuss what you learned from the course.
Do you feel that you achieved each course learning objective? Elaborate.
Did the learning material and assignments prepare you to reach the objectives?
Conclude with your recommend changes to the learning content, what you liked least about the course, and what you liked best about the course.
Course Learning Objectives:
Identification of categorizations of information assets using risk assessment and risk analysis tools.
Identification of vulnerabilities and threats associated with information assets.
Implement policies, standards, procedures and guidelines to ensure the confidentiality, integrity and availability of assets.
Incorporate security and contingency planning.
Develop a security program utilizing standard security management models and practices.
Develop controls used to enforce confidentiality, integrity and availability.
Identify legal and ethical issues associated with the management of information assets.
Submission Requirements
Format: Microsoft Word
Font: Arial, 12-Point, Double- Space
Citation Style: APA
Length: 23 pages (plus a cover sheet)
These are list in the course.
Textbook : Whitman & Mattford, (2014). Management of Information Security, 4th ed. Boston: Cengage Learning.
Course Schedule:
Week
Reading
Topic
1
Chapter 1, p. 1-15
Introduction to Information Security Management
2
Chapter 1, p. 15-33
Information Security Project Management
3
Chapter 2
Planning for Security
Break
4
Chapter 3
Planning for Contingencies
5
Chapter 4
Information Security Policy
6
Chapter 5
Developing a Security Program
7
Chapter 6Chapter 7
Security Management Models Security Management Practices
8
Chapter 8
Risk Management: Identifying and Assessing Risk
9
Chapter 9
Risk Management: Controlling Risk
10
Chapter 10
Protection Mechanisms
11
Chapter 11
Personnel and Security
12
Chapter 12
Law and Ethics
“0.
Discount Code: 0
: +1 0 0-0
0..