IS 4451 Information Security, Assurance and Compliance MASTER SYLLABUS

TROY UNIVERSITY
MASTER SYLLABUS
SORRELL COLLEGE OF BUSINESS
IS 4451
Information Security, Assurance and Compliance.
Prerequisites
IS 3320
Vision Statement
The Sorrell College of Business will be a recognized and respected leader for quality and
flexibility in the delivery of business education that prepares graduates to succeed in the
global business environment.
Mission Statement
The Sorrell College of Business supports the Troy University mission by preparing our
diverse student body to become ethical professionals equipped to compete in the global
business environment. To achieve this, our faculty, staff, and administration will:
1) provide quality education in global business through our undergraduate and
graduate programs, delivered around the world through face-to-face and online
environments, to traditional, non-traditional, military, and international
students;
2) contribute to the development and application of knowledge focused on applied
business, learning, and pedagogical research;
3) provide service to the University, business and professional organizations, and
our communities through individual involvement, business outreach, and our
centers for research.
Master Syllabi are developed by the senior faculty in each business discipline. This Master Syllabus must be used as the basis for developing the
instructor syllabus for this course, which must also comply with the content specifications outlined in the Troy University Faculty Handbook.
The objectives included on this Master Syllabus must be included among the objectives on the instructor’s syllabus, which may expand upon the
same as the instructor sees fit. The statement of purpose seeks to position the course properly within the curriculum and should be consulted by
faculty as a source of advisement guidance. Specific choice of text and other details are further subject to Program Coordinator guidance.
1 August 2005
Master Syllabus: IS 4451
2
Description
This course introduces information security awareness, governance, assurance, and
compliance associated with essential network infrastructure. Emphasis is placed on
understanding information systems security policy and technology countermeasures
across network infrastructure access points including physical security, authentication,
access control, encryption, and system management.
Objectives
On completion of the course, the student should be able to:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
Discuss the need for security.
Describe the application of symmetric and public key cryptography.
Install, configure, and manage Public Key certificate services.
Describe IP security issues and how the IPSec protocol addresses them.
Explain types of intrusions detection and prevention methods and systems.
Describe access control technologies.
Discuss physical control principles.
Develop and implement security policies.
Explain computer forensics.
Design and develop a disaster recovery plan.
Describe Risk Management concepts.
Discuss the legal and ethical issues of information security.
Explain approaches for maintaining information security.
Purpose
To recognize information and network infrastructure security as essential critical success
factors for information systems in a business environment, including how to plan,
implement, and manage security countermeasures. This course is an information systems
concentration elective within the global business major.
Approved Texts
Stallings & Brown (2012 or current). Computer Security: Principles and Practice,
Pearson/Prentice Hall.
Troy University Faculty Handbook (2010): Section 3.9.2.8 [extract] — essential elements of the syllabus (somewhat modified for space):
1. Course title
2. Course number +
section
3. Term
4. Instructor
5. Prerequisites
6. Office hours
7. Class days, times
8. Classroom
location
9. Office location +
e-mail address
10. Office telephone
11. Course
description,
objectives
12. Text(s)
13. Other materials
14. Grading methods, 16. General supports
criterion weights,
(computer works,
make-up policy,
writing center)
mid-term grade
17. Daily assignments,
reports
holidays, add/drop
15. Procedure, course
& open dates, dead
requirements
day, final exam
18. ADA statement
19. Electronic device
statement
20. Additional
services,
statements
21. Absence policy
22. Incomplete-work
policy
23. Cheating policy
24. Specialization
requirements
(certification,
licensure, teacher
competencies)
Master Syllabus: IS 4451
3
Whitman & Mattord (2011 or current). Management of Information Security (3rd ed.).
Cengage
Whitman & Mattord (2011 or current). Hands-On Information Security Lab Manual (3rd
ed.). Cengage
Palmer (2009 or current). Hands-On Microsoft® Windows® Server 2008 Administration
(1st ed.). Cengage.
Supplements
As deemed appropriate.
Troy University Faculty Handbook (2010): Section 3.9.2.8 [extract] — essential elements of the syllabus (somewhat modified for space):
1. Course title
2. Course number +
section
3. Term
4. Instructor
5. Prerequisites
6. Office hours
7. Class days, times
8. Classroom
location
9. Office location +
e-mail address
10. Office telephone
11. Course
description,
objectives
12. Text(s)
13. Other materials
14. Grading methods, 16. General supports
criterion weights,
(computer works,
make-up policy,
writing center)
mid-term grade
17. Daily assignments,
reports
holidays, add/drop
15. Procedure, course
& open dates, dead
requirements
day, final exam
18. ADA statement
19. Electronic device
statement
20. Additional
services,
statements
21. Absence policy
22. Incomplete-work
policy
23. Cheating policy
24. Specialization
requirements
(certification,
licensure, teacher
competencies)