Liberty BMIS 663 Secure Enterprise Design and Development Entire Class



Liberty BMIS 663 Secure Enterprise Design and Development Entire Class

Course Brief Overview:

This course includes studies in security architecture and applications security. A detailed look will be given at the concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems, equipment, networks, and applications. The course will explore controls used to enforce various levels of confidentiality, integrity, and availability. For information regarding prerequisites for this course, please refer to the Academic Course Catalog.


In the competitive marketplace of today, firms must operate efficiently by continually monitoring activities for reducing costs and increasing revenues. Such efficiencies rely on a stable enterprise architecture where systems are interconnected and information is secure. The importance of a well-designed, well-developed, and well-managed enterprise is paramount in order for firms to leverage pertinent data and make this information available for knowledge workers dispersed throughout the corporate organization. BMIS 663 assists in this regard by providing a thorough review of the necessary computer security components needed to maintain a secure enterprise.

Observable Learning Outcomes:

Upon successful completion of this course, the student will be able to:

  1. Discuss the relevance of course material and the use of technology to a biblical worldview.
  2. Compare modern information security standards.
  3. Explain access control theory.
  4. Apply access control theory.
  5. Distinguish physical and operations security.
  6. Illustrate secure design principles for systems, networks, and applications.

Check out our further courses and programs by visiting liberty university.

Course Assignment Details:

Textbook readings and lecture presentations

Course Requirements Checklist

After reading the Course Syllabus and Student Expectations, the student will complete the related checklist found in the Course Overview.

Total No.of Discussions Sessions (8)

  • Discussions are collaborative learning experiences.
  • Therefore, the student will complete the assigned textbook readings in each module/week and post a thread of at least 250 words, containing thoughtful answers to 2 questions from the assigned reading. No more than 4 students may answer the same question.
  • If necessary, the student may also list within his/her thread any concepts on which further clarification is needed.
  • The student must then reply to at least 2 classmates’ threads.
  • A reply to a classmate’s request for clarification will be accepted as 1 of the 2 required replies. Each reply must contain at least 150 words.

Project Feasibility Study Assignment:

  • The student will select a business in order to begin research on the Final Project.
  • The objective of this project is to analyze, design, and plan to implement a secure enterprise information system.
  • The paper must incorporate professional writing, current APA standards, and at least 5 scholarly references (e.g., peer-reviewed journal articles).

Secure Network Application Project Assignment:

  • Using Microsoft Visio or a subsequent visual design tool, the student will diagram a network and write a thorough report detailing the design.
  • The report must be a minimum of 5 pages (excluding the title page), Visio diagram(s), and references. It must include, at a minimum, 5 peer-reviewed sources to justify the design.

Firewall Application Project Assignment:

  • The student will develop an appropriate set of firewall rules and access control lists. Using appropriate professional research, the student will document the necessary access information for the designed information system.
  • The project must be a minimum of 5 pages (excluding the title page, firewall rules, and references), follow current APA standards, and include a minimum of 5 peer-reviewed sources.

Final Project Assignment:

  • The student will prepare a research paper that is 25 pages, not including the title page and reference page.
  • The research must demonstrate thoughtful consideration of the ideas and concepts presented in the course and provide new thoughts and insights relating directly to the topic of information security planning.
  • The overall goal of this project is to develop, introduce, discuss, and present a specific policy as part of an information security plan.
  • Additionally, the paper must reflect professional writing, and current APA standards, and include a minimum of 10 scholarly references (e.g., peer-reviewed journal articles).

Total No.of Quizzes (3)

Each quiz will cover the Learn material up to and including the module: week in which it is assigned. Each quiz will be open-book/open-notes, contain 12 multiple-choice questions, and have a time limit of 20 minutes.

Quiz: Midterm

The exam will cover the Learn materials for Module 1: Week 1 – Module 4: Week 4. It will be open-book/open-notes, contain 68 multiple-choice questions, and have a time limit of 2 hours.



We are glad that you preferred to contact us. Please fill our short form and one of our friendly team members will contact you back.