Information Security Policies

In this course, students will learn how management, political leadership, and the technical community must work together to make effective strategy and policy. The course will examine how to determine the vulnerabilities and risks. They will be exposed to different competing priorities and factors in the provision of security; legal, cost, and other constraints. From these constraints, they learn to derive different strategies (both technical and procedure) to achieve the desired security objectives.

Login Required