External link disclaimer this course may contain

This preview shows page 10 - 12 out of 12 pages.

EXTERNAL LINK DISCLAIMERThis course may contain links to external sites neither owned nor maintained by UMUC. UMUC bears no responsibility for theaccuracy, legality, or content of external sites or for that of subsequent links. In addition, the terms of use, security policies, andprivacy policies may differ from those of UMUC. Contact the external site for answers to questions regarding its content, terms of use,and policies.LEARNING MANAGEMENT SYSTEM SUPPORTThose requiring technical assistance can access [email protected] Support directly in LEO under the Help menu. Additional technicalsupport is available 24 hours a day, seven days a week via self-help and live chat at()or by phone toll-free at 888-360-UMUC (8682).SYLLABUS CHANGESAll items on this syllabus are subject to change at the discretion of the Instructor and the Office of Academic Affairs.Class & Assignment ScheduleWeekAssignments
1Topic: IT Security Analysis & Techniques -- Gap AnalysesSystem IntroductionReview the "Classroom Walkthrough"Course IntroductionReview the "Course Documents"Review the "Syllabus"ReadingsAs posted in the online classroomAssignmentsParticipate in Online Discussions2Topic: IT Security for the Financial Services IndustryReadingsAs posted in the online classroomAssignmentsParticipate in Online DiscussionsProject 1 – Case Study 1 Gap Analysis3Topic: IT Security Requirements Analysis; Security ComplianceManagementReadingsAs posted in the online classroomAssignmentsParticipate in Online DiscussionsProject 2 – Case Study 1 Identify Requirements4Topic: Cybersecurity Issues & Risks: Social Media PlatformsReadingsAs posted in the online classroomAssignmentsParticipate in Online DiscussionsProject 3 – Case Study 1 Technology Evaluation5Topic: The Importance of Culture to Post-Merger Organizational SuccessReadingsAs posted in the online classroomAssignmentsParticipate in Online Discussions6Topic: Conflict Management Strategies (Issues and Applications)ReadingsAs posted in the online classroomAssignmentsParticipate in Online DiscussionsProject 4 – Case Study 1 Security Strategy and Plan withRecommendation Memo
7Topic: Business Impact of Cyber CrimeReadingsAs posted in the online classroomAssignmentsParticipate in Online DiscussionsProject 5 – Case Study 2 Implementation Plan8Topic: Business Impact of Cyber TerrorismReadingsAs posted in the online classroomAssignmentsParticipate in Online DiscussionsProject 6 – Case Study 2 Policy Review and RecommendationsPresentation
End of preview. Want to read all 12 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
N/A
Tags
Academia

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture