Embed presentation
Download to read offline


This course examines operations security and controls over personnel, hardware, software, and systems. It covers abuse channels and appropriate countermeasures. Students will learn to identify security measures and develop policies and procedures in compliance with laws and regulations. They will also recognize key activities involved in securing an enterprise, including network availability technologies and different types of administrative management and media storage control. The course requires students to write a 500-word reflection applying the knowledge or theories learned to their current or potential future work environments.

