INSE 410 Corporate Governance, Policy, Risk, and Cybercrime

The risks associated with cybersecurity threats increases as our world becomes ever more interconnected. Learn how to comprehensively manage cybersecurity risks as they relate to modern information systems. This course covers the fundamentals of risks and risk management. Topics include risk identification, threat categorization, and vulnerability assessments. Relevant laws are presented along with approaches to risk mitigation and organizational planning. Organizational impact analysis and continuity planning are reviewed.

Credits

5

Cross Listed Courses

None

Prerequisite

All Technology Core courses

Corequisite

None

Washington Technology University

Syllabus

INSE 410 : Corporate Governance, Policy, Risk, and Cybercrime

5 Credits

Approved: 12/2/2021 2:17:08 PM

Course Description

The risks associated with cybersecurity threats increases as our world becomes ever more interconnected. Learn how to comprehensively manage cybersecurity risks as they relate to modern information systems. This course covers the fundamentals of risks and risk management. Topics include risk identification, threat categorization, and vulnerability assessments. Relevant laws are presented along with approaches to risk mitigation and organizational planning. Organizational impact analysis and continuity planning are reviewed.

Course Required Resources

·      Gibson, D. (2015). Managing Risk in Information Systems. Burlington, Massachusetts: Jones & Bartlett Learning.

Course Keywords

Auditing, Client-server, Cloud computing, HTML, HTTP, Packet switching, Virtualization, VPN, Clickjacking, Malware, Pretexting, Ransomware, Social Engineering, Advanced Encryption Standard (AES), Digital Certificate, JavaScript, Web application, Vulnerability management, PCI, Resource pooling, Elasticity, Private Cloud, IaaS, PaaS, SaaS, STARS, Service level agreements, Integration testing, Security testing, Stress testing, Security assessment, Nmap, OS fingerprint, Nessus, Vulnerability assessment, Web server application, Data leakage, Client-side injection, VoIP, Active server pages (ASP), Business intelligence, Deep web, Computer incident response team, Common