Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
Course Objectives
Upon completion of the course, students will be able to
1) Recognize the concepts, processes, roles and rationale for the organization’s IT Policy Framework.
2) Identify challenges and barriers that may inhibit the success of an IT Security Policy structure.
3) Establish policies related to data risks and roles the incident response team.
4) Understand how to design, organize, implement and maintain IT Security Policy Framework.
5) Develop IT Security Policies and/or Framework that would govern a business scenario.
Weekly Unit
Readings/Topics
Assignments and Due Dates
Week 1
Jan 06 – Jan 12
Lesson 1: Information Systems Security Policy Management
Chapter 1, “Information System Security Policy Management”
Chapter 2, “Business Drivers for Information Security Policies”
Chapter 3, “U.S. Compliance Laws and Information Security Policy Requirements”
Week 1 Assignment Required
Assignment 1
Jan 12th 2020
*Failing to Participate in Week 1 may result in being dropped from the course.
Week 2
Jan 13 – Jan 19
Lesson 2: Business Challenges and Security Policy Implementation Issues
Chapter 4, “Business Challenges Within the Seven Domains of IT Responsibility”
Chapter 5, “Information Security Policy Implementation Issues”
Project Check Point: Team member list
LAB : Crafting an Organization-Wide Security Management Policy for Acceptable Use
Lab: Developing an Organization-Wide Policy Framework Implementation Plan
Assignment 2
Jan 12th 2020
Week 3
Jan 20 – Jan 26
Lesson 3: IT Security Policies, Procedures, and Guidelines
Chapter 6, “IT Security Policy Frameworks”
Chapter 7, “How to Design, Organize, Implement, and Maintain IT Security Policies”
Checkpoint 2: A draft of your research of DOD-specific requirements for an organization’s IT infrastructure and U.S. compliance laws that may affect the firm
Lab : Defining an Information Systems Security Policy Framework for an IT Infrastructure
Jan 26th 2020
Week 4
Jan 27 – Feb 02
Lesson 4: IT Security Policy Framework Approaches
Chapter 8, “IT Security Policy Framework Approaches”
Checkpoint 3: A draft of DoD-compliant policies, standards, and controls that affect the User, Workstation, LAN, and LAN-to-WAN Domains
Lab: Crafting a Layered Security Management Policy—Separation of Duties
PRACTICAL CONNECTION ASSIGNMENT
Feb 2nd 2020
Week 5
Feb 03 – Feb 09
Lesson 5: User Domain and IT Infrastructure Security Policies
Chapter 9, “User Domain Policies”
Chapter 10, “IT Infrastructure Security Policies”
Lab: Crafting an Organization-Wide Security Awareness Policy
Lab: Defining a Remote Access Policy to Support Remote Health Care Clinics
Checkpoint 4: A bulleted list of DoD-compliant policies, standards, and controls that affect the WAN, Remote Access, and System/Application Domains
Feb 9th 2020
Week 6
Feb 10 – Feb 16
Lesson 6: Data Classification and Handling Policies, Risk Management Policies, and Incident Response Team (IRT) Policies
Chapter 11, “Data Classification and Handling Policies and Risk Management Policies”
Chapter 12, “Incident Response Team (IRT) Policies”
Lab: Identifying Necessary Policies for Business Continuity—BIA and Recovery Time Objectives
Crafting a Security or Computer Incident Response Policy—CIRT Response Team
Checkpoint 5: A draft of your course project report if you want feedback before submitting your final deliverable
Feb 16th 2020
Week 7
Feb 17 – Feb 23
Lesson 7: IT Security Policy Implementation and Enforcement, Compliance Systems and Emerging Technologies
Chapter 13, “IT Security Policy Implementations”
Chapter 14, “IT Security Policy Enforcement”
Chapter 15, “IT Policy Compliance and Compliance Technologies”
Lab: Assessing and Auditing an Existing IT Security Policy Framework Definition
Aligning an IT Security Policy Framework to the Seven Domains of a Typical IT Infrastructure
Project: Department of Defense (DoD) Ready Report
Feb 23rd 2020
Week 8
Feb 24 – Feb 27
Lesson 8: Course Review and Final Examination
Final Examination
*SHORT WEEK* All assignments must be completed by DATE at TIME EST.
Final Examination
Feb 25th 2020
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.