Opinion Paper of Course – 2 pages for $10

Opinion Paper of Course – 2 pages for $10

Synopsis of Learning

Learning Objective: Evaluate the content of this course. 

Assignment Requirements

This assignment is different than all previous assignments.  The goal of the assignment is for you to reflect on what you have learned during the course and the relevance of the learning materials. This is an opinion paper, so do not tell us what you think we want to hear!  This assignment will help us improve the course.

Consider each of the Course Learning Objectives listed below:

  • Briefly discuss what you learned from the course.
  • Do you feel that you achieved each course learning objective? Elaborate.
  • Did the learning material and assignments prepare you to reach the objectives? 
  • Conclude with your recommend changes to the learning content, what you liked least about the course, and what you liked best about the course.

Course Learning Objectives:

  1. Identification of categorizations of information assets using risk assessment and risk analysis tools.
  2. Identification of vulnerabilities and threats associated with information assets. 
  3. Implement policies, standards, procedures and guidelines to ensure the confidentiality, integrity and availability of assets.
  4. Incorporate security and contingency planning. 
  5. Develop a security program utilizing standard security management models and practices.
  6. Develop controls used to enforce confidentiality, integrity and availability. 
  7. Identify legal and ethical issues associated with the management of information assets.

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, 12-Point, Double- Space
  • Citation Style: APA
  • Length: 2–3 pages (plus a cover sheet)

These are list in the course.

Textbook :  Whitman & Mattford, (2014). Management of Information Security, 4th ed. Boston: Cengage Learning.


Course Schedule:

WeekReadingTopic
1Chapter 1, p. 1-15Introduction to Information Security Management
2Chapter 1, p. 15-33Information Security Project Management
3Chapter 2Planning for Security
Break
4Chapter 3Planning for Contingencies
5Chapter 4Information Security Policy
6Chapter 5Developing a Security Program
7Chapter 6
Chapter 7
Security Management Models 
Security Management Practices
8Chapter 8Risk Management: Identifying and Assessing Risk
9Chapter 9Risk Management: Controlling Risk
10Chapter 10Protection Mechanisms
11Chapter 11Personnel and Security
12Chapter 12Law and Ethics

"You need a similar assignment done from scratch? Our qualified writers will help you with a guaranteed AI-free & plagiarism-free A+ quality paper, Confidentiality, Timely delivery & Livechat/phone Support.


Discount Code: CIPD30



Click ORDER NOW..

order custom paper