Liberty CSIS 344 Information Security Operations Entire Class



Liberty CSIS 344 Information Security Operations Entire Class


Course Description

This course will cover the issues and tasks involved in the day-to-day operation of an Information Security System. The topics included in this course would be risk management, auditing and monitoring, regulations and compliance, disaster recovery, incidence response, key management, information systems hardware and software operation, networks and transmission security, operational security, and cryptography.

For information regarding prerequisites for this course, please refer to the Academic Course Catalog.


In an Internet-centric world, organizations require business processes designed to protect critical or confidential information using cost-effective IT security methods and controls. This course will provide the student with the information and skills necessary to implement and maintain an effective information security program supporting business operations. To support effective information security program operations, the student will learn the operational concepts, principles, and activities of a security program as well as how to manage a program within an organization. The student will learn to consider the organization’s culture, business needs, processes, risk factors, and tolerance as well as regulatory compliance requirements when operating a security program.

Measurable Learning Outcomes

Upon successful completion of this course, the student will be able to:

  1. Describe the purpose, value, and requirements of an information security system in support of business operations.
  2. Describe the industry best practices and current trends in technical and physical information security methods necessary to maintain the confidentiality, integrity, and availability of digital information at rest, in transit, and in use during business operations as part of an information security system.
  3. Demonstrate the ability to institute information security systems operations using industry best practices as a part of business activities including risk analysis and management, regulatory compliance, business continuity, governing policy management, incident response actions, cryptographic infrastructure management, network security methods, operational security, and other information security systems practices.
  4. Discuss the relevance and value of course material relative to a biblical worldview.

Course Assignment

Textbook readings and lecture presentations

Course Requirements Checklist

After reading the Course Syllabus and Student Expectations, the student will complete the related checklist found in the Course Overview.

Please consult Liberty University for details on the requirements for this course.



We are glad that you preferred to contact us. Please fill our short form and one of our friendly team members will contact you back.