SEC 440 UOP Courses / sec440dotcom - PowerPoint PPT Presentation

vedaa89
slide1 n.
Skip this Video
Loading SlideShow in 5 Seconds..
SEC 440 UOP Courses / sec440dotcom PowerPoint Presentation
Download Presentation
SEC 440 UOP Courses / sec440dotcom

play fullscreen
1 / 6
Download Presentation
SEC 440 UOP Courses / sec440dotcom
77 Views
Download Presentation

SEC 440 UOP Courses / sec440dotcom

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. SEC 440 UOP Courses / sec440dotcom

  2. SEC 440 UOP Courses SEC 440 Entire Course (UOP) SEC 440 Week 1 Organizational Information Security • SEC 440 Week 1 Organizational Information Security System Analysis • SEC 440 Week 2 Threat Assessment • SEC 440 Week 3 Hacker and Target Response • SEC 440 Week 4 Information Security Policy Powerpoint • SEC 440 Week 4 Information Security Policy Paper • information security system:Password protection and requirementsFirewallsSecurity features that prevent hackersConfidentiality requirementsPhysical protection of the system

  3. SEC 440 UOP Courses SEC 440 Week 2 Threat Assessment (UOP) SEC 440 Week 3 Hacker and Target Response (UOP) • You have recently assumed the role of the chief security officer for the Information Technology (IT) department within your current organization. One of your new responsibilities is to conduct an assessment of the threats facing your organization’s information security system. • Read the following scenario:A high-security-clearance employee was terminated from your workplace. As the chief information security officer, you suspect that the employee plans to retaliate by hacking into the organization’s information systems.

  4. SEC 440 UOP Courses SEC 440 Week 4 Information Security Policy Paper (UOP) SEC 440 Week 4 Information Security Policy Powerpoint (UOP) • Select an organization at which you or your team members are employed or an organization of which you are familiar.Write a 1,400- to 1,750-word paper describing the process you would use to design, develop, and implement an information security policy for the organization. Identify key policy components, continuous improvement methods, and cite applicable statutory authority. • Select an organization at which you or your team members are employed or an organization of which you are familiar.Describe the process you would use to design, develop, and implement an information security policy for the organization. Identify key policy components, continuous improvement methods, and cite applicable statutory authority.

  5. SEC 440 UOP Courses SEC 440 Week 5 Information System Security Plan (UOP) • Select one of the following organization types:HospitalBankManufacturerOnline wholesale enterpriseRetail businessState revenue agency

  6. SEC 440 UOP Courses