Ask a Question

CMGT 582 ENTIRE COURSE

Sale price $50.00 Regular price $100.00

CMGT 582 ENTIRE COURSE
 
WEEK 1
CMGT 582 Week 1 Individual Assignment Information Security
 
Assignment Preparation: Activities include watching the SkillSoft® videos, completing the SkillSoft® course, independent student reading, and research.
 
  • Watch the "Fostering Collective Responsibility for IT Risk" video.
  • Watch the "Balancing Security with User Convenience" video.
  • Complete "Introduction to Information Security Governance" topic of the Skillsoft®course "CISM 2012: Information Security Governance (Part 1)."
 
Assignment: SituationYou have just joined an organization that depends on the use of the web to perform most of its major tasks. You have noticed that information security is mostly ignored by those performing the work tasks and it is not a priority with management or executive leadership.
 
Write a 1- to 2-page memo to the Chief Executive Officer (CEO) that is designed to increase the priority of information security. Include a convincing argument of why the survival of the organization may depend on information security. Include these topics:
 
  • Confidentiality, integrity, and availability
  • Authenticity
  • Accountability
  • Threats from malicious software
  • Security challenges of cloud computing
  • Cyberterrorism and information warfare
 
 
 
 
 
 
 
WEEK 2
 
CMGT 582 Week 2 Individual Assignment Organizational Information Security
 
Assignment Preparation: Activities include watching the SkillSoft® videos, completing the SkillSoft® course, independent student reading, and research.
 
  • Watch the "Technology and the Impact on Business and the Environment" Skillsoft video.
  • Complete "Defining law and ethics" point of topic "The Relationship Between Law and Ethics" of the Skillsoft® course "Business Law and Ethics."
  • Complete "Recognize the Effect of Laws and Regulations on Audit Planning," point of topic "Management of an IS Audit Function," of the lesson "Information Systems and the IS Audit Function" of the Skillsoft® course "CISA Domain: The Process of Auditing Information Systems - Part 1."
 
Write a 3- to 4-page analysis of ethical considerations for maintaining confidentiality and customer data.
 
Address the following issues in your analysis:
 
  • Define ethics.
  • Apply ethics to information systems.
  • Discuss the constituent parts IT/IS professional ethics.
  • Connect or relate the discussed constituent parts into an overall structure that may relate to an IT/IS code of conduct or ethics.
  • Discuss the rules produced by the Ad Hoc Committee on Responsible Computing.
  • Describe the privacy regulations or laws related to the identified ethical issues.
 
 
 
WEEK 3
 
 
 
CMGT 582 Week 3  Learning Team Assignment Riordan Manufacturing Security Audit
 
Review reading assignments involving the risk formula, information security risk assessment, security controls, and risk mitigation strategies.
 
Continue working on your Microsoft® PowerPoint® slides for the presentation.
 
Add 2- to 4-pages of information to your previously-submitted outline, considering any assessment input, related to any or all of the following:
 
  • Application of the formula for risk
  • Application of components of an information risk assessment
  • Description of security controls or safeguards that are related to your risk assessment.
  • Planned or identified best practice mitigation strategies.
 
Submit the draft for assessment. You will have the opportunity to redraft this information in following weeks to improve the content for the Week 6 requirement.
 
 
 
CMGT 582 Week 3 Individual Assignment EnPointe Technologies Risk Assessment
 
Assignment Preparation: Activities include watching the SkillSoft® videos, completing the SkillSoft® course, independent student reading, and research.
 
  • Watch the "QuickTalks: David Bach: Nonmarket Strategy: The Next Frontier of Competitive Advantage" Skillsoft® video.
  • Complete the "Intrusion Prevention Technologies" topic of the lesson "Understanding IPS Fundamentals" in the Skillsoft® course "Cisco IINS 2.0: Implementing IPS."
  • Complete slides 1 to 3 of the "Risk Response Strategies" topic of the Skillsoft® lesson "Plan Risk Responses" of the course "Risk response and Control (PMBOK® Guide Fifth Edition)."
 
Prepare a 3- to 5-page risk assessment of your organization or an organization with which you are familiar.
 
Include how the formula for risk can be applied to the organization.
 
Describe how risk assessment is related to security controls or safeguards.
 
Include the following in your assessment that is part of Figure 14.3, Risk Assessment Methodology, of the Stallings and Brown textbook Computer Security (p. 478):
 
  • System characterization
  • Threat identification
  • Vulnerability identification
  • Control analysis
  • Likelihood determination
  • Impact analysis
  • Risk determination
 
 
 
 
 
 
 
WEEK 4
 
CMGT 582 Week 4  Learning Team Assignment Security Audit – Part III
Review reading assignments involving security technologies and methodologies to include access control technologies.
 
Continue working on your Microsoft® PowerPoint® slides for the presentation.
 
Add 2- to 4-pages of information to your previously submitted updated outline, considering any assessment input, related to any or all of the following that you plan to include in your security audit:
 
  • Application of network security technologies and methodologies
  • Evaluation of security technologies and methodologies
  • Description of access control technologies
 
Submit the draft for assessment. You will have the opportunity to redraft this information in following weeks to improve the content for the Week 6 requirement.
 
 
 
CMGT 582 Week 4 Individual Assignment Technologies & Methodologies Evaluation
 
Assignment Preparation: Activities include watching the SkillSoft® videos, completing the SkillSoft® course, independent student reading, and research.
 
  • Watch the "Creating an Actionable Risk Management Strategy" SkillSoft® video.
  • Complete the "Network Security Appliances and Methods" topic of the Skillsoft® course "CompTIA Network+ 2012: Network Security Part 3."
  • Complete the "Firewalls, IDS and Network Security Solutions" topic of the Skillsoft®course "CompTIA Network+ 2012: Network Security Part 3."
 
Consider information management risks to include cybercrime and cyber-related crimes.
 
Write a 3- to 5-page evaluation of security technologies and methodologies used to mitigate information management risks. An evaluation is generally based on specific criteria and standards.
 
Include at least the following:
 
  • Firewalls
  • Intrusion prevention systems
  • Intrusion detection systems
  • Access control
  • Cryptographic tools and processes
 
 
WEEK 5
 
CMGT 582 Week 5  Learning Team Assignment Learning Team: Security Audit – Part IV
Review reading assignments involving security policies, planning, and implementation to include multilevel security processes.
 
Continue working on your Microsoft® PowerPoint® slides for the presentation.
 
Add 2- to 4-pages of information to your previously submitted updated outline, considering any assessment input, related to any or all of the following that you plan to include in your security audit:
 
  • Security policies
  • Security planning
  • Evaluation of security planning
  • Multilevel or defense security elements of security planning
 
Submit the draft for assessment. You will have the opportunity to redraft this information in the following week to improve the content for the Week 6 requirement.
 
 
CMGT 582 Week 5 Individual Assignment POLICY IMPLEMENTATION
 
Assignment Preparation: Activities include watching the completing the SkillSoft® course, independent student reading, and research.
 
  • Complete the "Security Policy Documents and Life Cycle" topic of the Skillsoft® course "SSCP Domain: Security Operations and Administration Part 1."
 
  • Complete the "Risk Management and Regulatory Compliance" topic of the "Security Policies and Life-Cycle Approach" lesson of the Skillsoft® course "Cisco IINS 2.0: Security and Strategies."
 
Consider security planning policies, procedures, and models to include multilevel and cryptographic processes.
 
Write a 4- to 6-page discussion of how policies are used to implement a security plan.
 
Include the following:
 
  • Description of security planning policies
  • Description of how human resources security is included in security planning
  • Description of how cryptographic tools may be included in security planning
  • Application of security planning policies to manage security
  • Evaluation of how specific policies are used to implement security plans
 
 
 
 
 
 
 
 
WEEK 6
 
CMGT 582 Week 6  Learning Team Security Audit Presentation
 
Complete and submit the security audit of the organization.
CMGT 582 Week 6  Learning Team Security Audit Presentation
 
 
 
Finalize and submit the team's Microsoft® PowerPoint® presentation.
 
 
 
 
CMGT 582 Week 6 Individual Assignment SYSTEMS DEVELOPMENT LIFE CYCLE (SDLC)
 
Assignment Preparation: Activities include watching the completing the SkillSoft® course, independent student reading, and research.
 
  • Complete the "Information Risk Management Overview" topic of the "Information Risk Management Program" lesson of the Skillsoft® course "CISM 2012: Information Risk Management and Compliance (Part 1)."
 
  • Completethe "Auditing and Testing IS Security" topic of the "Auditing Internal and External Security" lesson of the Skillsoft® course "CISA Domain: Protection of Information Assets - Part 2."
 
Consider the systems development life cycle (SDLC), security systems life cycle, and information systems security certification and accreditation.
 
Write a 3- to 5-page evaluation of the use of the security life cycle. Include the following:
 
  • All six phases
  • Review of steps unique to the security life cycle, not in common with SDLC
  • Applicable criteria and standards, such as certification and accreditation, used in your evaluation

Questions & Answers

Have a Question?

Be the first to ask a question about this.

Ask a Question