Preview

Syllabus Cmgt 4442

Powerful Essays
Open Document
Open Document
1936 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Syllabus Cmgt 4442
|[pic] |Syllabus |
| |College of Information Systems & Technology |
| |CMGT/442 Version 4 |
| |Information Systems Risk Management |

Copyright © 2010, 2009, 2008, 2006 by University of Phoenix. All rights reserved.

|Facilitator Information and Availability | |
| | |

Course Start Date:
Course End Date:

Local Campus Class Meeting Time, Days and Dates:
6 p.m. – 10:00 p.m., Thursdays

Campus/Learning Center:
Plantation

Course Description

This course identifies and defines the types of risks that information systems professionals need to consider during the development and implementation of computer based information systems. This course will survey remedies and prevention techniques available to address the risk areas present. Organizational policies and current regulatory considerations will also be examined relative to development, implementation, and use of computer based information systems.

Policies

Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents:

• University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course



References: Barr, J. G. (2012). Business continuity for Web sites. Faulkner Information Services. Ledford, J. L. (2012). Business continuity for corporate libraries. Faulkner Information Services. Keston, G. (2008). Identity management for IT security and administration. Faulkner Information Services. Vosevich, K. (2011). Risk management software market trends. Faulkner Information Services. Barr, J. (2011). Federal business continuity plans. Faulkner Information Services. Ledford, J. L. (2012). Federal Information Security Management Act (FISMA). Faulkner Information Services. Ainsworth, M. (2009). The business continuity planning process. Faulkner Information Services. Barr, J. G. (2011). The standard of good practice for information security. Faulkner Information Services. Shaw, R. (2012). Conducting an information security gap analysis. Faulkner Information Services.

You May Also Find These Documents Helpful

Related Topics