Liberty BMIS 664 Information Forensics Compliance and Risk Management Entire Course

$4.99

Description

Get Assistant With Liberty BMIS 664 Information Forensics Compliance and Risk Management Entire Course

Course Explanation:

This course covers a diverse set of topics in information security and incident response. The risk Management domain involves the identification of an organization’s information assets and the development, documentation, and implementation of policies, standards, procedures, and guidelines that ensure confidentiality, integrity, and availability. The Legal, Regulations, Investigations, and Compliance domains address computer crime laws and regulations, the investigative measures and techniques which can be used to determine if a crime has been committed and methods to gather evidence. Incident handling provides the ability to react quickly and efficiently to malicious technical threats or incidents.

For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

Reasoning:

Competitive firms today will have the ability to proactively identify and prevent information loss. Such losses can occur by security breaches, poorly planned information systems, and by a lack of managerial guidance. To ensure a firm is compliant and prepared for information threats, risks need to be identified and prevented. Additionally, countermeasures must be implemented to mitigate and manage the potential future loss of pertinent data and information. BMIS 664 prepares the student to address such activities by examining the topics of information forensics, compliance, and risk management in greater detail.

Measurable Learning Outcomes:

Upon successful completion of this course, the student will be able to:

  1. Discuss the relevance of course material and the use of technology to a biblical worldview.
  2. Compare risk management frameworks.
  3. Conduct risk management assessments.
  4. Evaluate risk management assessments.
  5. Illustrate business compliance laws and regulations pertaining to information systems.
  6. Support corporate computer investigations.
  7. Analyze cyber forensic theories and principles.
  8. Apply cyber forensic theories and principles.
  9. Diagram appropriate steps to monitor and respond to security incidents.

Course Assignment Summary:

Textbook readings and lecture presentations

Course Requirements Checklist

Before working through the checklist outlined in the Course Overview, the student should review the Liberty University curriculum.

No.of Discussions Sessions (8)

Discussions are collaborative learning experiences. Therefore, the student will write a thread containing scholarly supported answers to 2 questions from the assigned module/week’s textbook readings. No more than 4 students may answer the same question. If necessary, the student may list within his/her threads any concepts on which he/she needs further clarification. The student must also reply to at least 2 classmates’ threads using scholarly support. The student may reply to a classmate’s request for clarification as 1 of his/her 2 required replies.

Information Controls Project:

Using security-based virtual machines, Microsoft PowerPoint, Visio, or an alternate type of visual presentation software, the student will create a presentation intended for the controlling board of an organization that evaluates security threats using IT controls.

Network Security Threat Project:

Using security-based virtual machines, Microsoft PowerPoint, Visio, or an alternate type of visual presentation software, the student will evaluate the likely threats to an organization’s network and will draft an examination of these and other threats. The student must include the likely impact each would have if they were successfully implemented.

Threat Interception Project:

Using security-based virtual machines, Microsoft PowerPoint, Visio, or an alternate type of visual presentation software, the student will evaluate the strengths and weaknesses of 3 security protocols; Transport Layer Security (TLS), Secure Sockets Layer (SSL), and Private Communications Transport (PCT) and one additional chosen protocol. The student must include an analysis of the threats each protocol is likely to mitigate or prevent.

Final Project:

  1. The student will be placed in a hypothetical scenario in which an organization has been attacked and unauthorized funds have been transferred.
  2. The student must utilize all of the information gained throughout the course to successfully complete the project.

Total No.of Quizzes (3)

Each quiz will cover the Learn material up to and including the module: week in which it is assigned.

Midterm Exam

The exam will cover the Learn materials for the modules: the weeks in which it is assigned.

 

GET FREE SESSION WITH EXPERTS

We are glad that you preferred to contact us. Please fill our short form and one of our friendly team members will contact you back.