INSE 410 Corporate Governance, Policy, Risk, and Cybercrime
The risks associated with cybersecurity threats increases as our world becomes ever more interconnected. Learn how to comprehensively manage cybersecurity risks as they relate to modern information systems. This course covers the fundamentals of risks and risk management. Topics include risk identification, threat categorization, and vulnerability assessments. Relevant laws are presented along with approaches to risk mitigation and organizational planning. Organizational impact analysis and continuity planning are reviewed.
Cross Listed Courses
None
Prerequisite
All Technology Core courses
Corequisite
None
Washington Technology University
Syllabus
INSE 410 : Corporate Governance, Policy, Risk, and Cybercrime
5 Credits
Approved: 12/2/2021 2:17:08 PM
Course Description
The risks associated with cybersecurity threats increases as our world becomes ever more interconnected. Learn how to comprehensively manage cybersecurity risks as they relate to modern information systems. This course covers the fundamentals of risks and risk management. Topics include risk identification, threat categorization, and vulnerability assessments. Relevant laws are presented along with approaches to risk mitigation and organizational planning. Organizational impact analysis and continuity planning are reviewed.
Course Required Resources
· Gibson, D. (2015). Managing Risk in Information Systems. Burlington, Massachusetts: Jones & Bartlett Learning.
Course Keywords
Auditing, Client-server, Cloud computing, HTML, HTTP, Packet switching, Virtualization, VPN, Clickjacking, Malware, Pretexting, Ransomware, Social Engineering, Advanced Encryption Standard (AES), Digital Certificate, JavaScript, Web application, Vulnerability management, PCI, Resource pooling, Elasticity, Private Cloud, IaaS, PaaS, SaaS, STARS, Service level agreements, Integration testing, Security testing, Stress testing, Security assessment, Nmap, OS fingerprint, Nessus, Vulnerability assessment, Web server application, Data leakage, Client-side injection, VoIP, Active server pages (ASP), Business intelligence, Deep web, Computer incident response team, Common