INFS3222-A It Security, Control/Assurance (Spring 2014)
About The Instructor
Section will be taught totally online with no scheduled class meetings. Students must arrange for daily access to a computer and the Internet prior to the start of classes. Robert Morris labs are to be used only as a backup in special situations and may not be relied upon for extended periods of time. In addition to the Internet link, online classes have a large emphasis on email. All messages from the instructor and other information regarding online classes, including user ids, passwords, and login instructions will be sent to your Robert Morris University email account.
Visit http://rmu.blackboard.com/ for more information.
Session, Dates: 4 (03/08/2014 - 05/03/2014)
Seats Available: Course Full, Choose another
The following additional fees apply to this section:
Fully Online Fee
Introduction to Information Technology Security Control Systems utilizes the Control Objectives for Information and Related Technology (COBIT) taxonomy to provide the student with an integrated theoretical and practical perspective of technology and information systems security and control. While the course has a focus on the requirements of a formal technologically-based information technology security system, emphasis is on the seven cognitive domain areas as specified in the ISACA Model Curriculum which includes: (1 Information Systems Security Assessment, (2) Information Systems Security Management, Planning, and Organization, (3)Information Systems Security Technical Infrastructure and Operations, (4) Protection of Information System Assets, (5) Testing Information Technology Controls and Implementing Anti-fraud Technology Using a Computer-aided Auditing Tool (CAAT), (6) Information Systems Disaster Recovery and Business Continuity, (7) Information Systems Acquisition, Development, and Maintenance, and (8) Information Systems Security Risk Management. As an underlying tenet, the course emphasizes refining individual communications skills necessary to the field of information systems security.