IS4550

Security Policies and Implementation

Welcome!

Welcome to the onsite Summer Quarter 2016 session of IS4550 at the Everett, Washington campus of ITT Technical Institute.

Course Description
This course explores security policies that protect and maintain an organization’s network and information systems assets. Topics include the effects of organizational culture, behavior and communications styles on generating, enforcing and maintaining security policies.

Major Instructional Areas
  1. Security policy requirements
  2. Security policy framework
  3. Creation of security policies
  4. Implementation issues
  5. Security policy controls
Course Objectives
  1. Identify the role of an information systems security (ISS) policy framework in overcoming business challenges.
  2. Analyze how security policies help mitigate risks and support business processes in various domains in the information technology (IT) infrastructure.
  3. Describe the components and basic requirements for creating a security policy framework.
  4. Describe the different methods, roles, responsibilities, and accountabilities of personnel, along with the governance and compliance of security policy framework.
  5. Describe the different ISS policies associated with the user domain.
  6. Describe the different ISS policies associated with the IT infrastructure.
  7. Describe the different ISS policies associated with risk management.
  8. Describe the different ISS policies associated with incident response teams (IRT).
  9. Describe different issues related to implementing and enforcing ISS policies.
  10. Describe the different issues related to defining, tracking, monitoring, reporting, automating, and configuration of compliance systems and emerging technologies.
Your browser is out-of-date!

You need to update your browser to view Foliotek correctly. Update my browser now

×