Skip to main content

MIS 681 Enterprise Security Management

Organizations with computer networks, Web sites, and employees carrying laptops and mobile devices face an array of security challenges. Among other things, they need to keep unauthorized people out of the network, thwart Web site hackers, and keep data safe from prying eyes or criminal hands. This course provides a high-level overview of these challenges. This course is not for the hard-core IT security engineer who works full time on networks. Instead, it is aimed at the nontechnical executive with responsibility for ensuring that information and assets stay safe and private. The course presents a guide to Thwarting Data Thieves and Hackers and covers the following technical issues in a nontechnical manner: -The concept of "defense in depth" -Network design -Business-continuity planning -Authentication and authorization -Providing security for your mobile work force -Hackers and the challenges they can present -Viruses, Trojans, and worms But it doesn't stop there. The course goes beyond the technical and covers highly important topics related to data security like outsourcing, contractual considerations with vendors, data privacy laws, and hiring practices.

Prerequisites

4 Graduate credits

Effective August 17, 2017 to present

Learning outcomes

General

  • Upon completion of this course, students will know the multiple aspects of managing enterprise security and exhibit communication and analysis skills for effectively managing enterprise security. Specifically, students will
  • Explain common security challenges faced by organizations with computer networks, websites, and mobile devices.
  • Evaluate how network design impacts overall security and how to implement basic measures to protect network infrastructure.
  • Develop strategies for ensuring that critical business functions can continue during and after a security incident.
  • Develop policies and strategies to secure devices connecting to enterprise systems, manage remote access, and protect data.
  • Recognize common types of hackers and their tactics, including how they exploit vulnerabilities in networks and systems.
  • Assess measures to protect against malware, including antivirus software, regular updates, and employee training.