CS699: Cyber Security Capstone

Course Credits:
3
Course Hours Per Week:
15

Course Overview

This capstone course introduces new topics such as wireless and mobile device security, Advanced Persistent Threats, and cloud computing. This course will also examine strategies for tightening security profiles from the perspective of an Information Security Manager concerned with strategically identifying the objectives, scope, resource requirements, and measurements of an integrated security plan.

In the course project, Information Security Program: Creating a Comprehensive Security Plan, students will demonstrate mastery of the cyber security program content, updating existing course projects to create a comprehensive security plan for an organization. The final project will look at the management of an information security program that will focus on program objectives, scope, resources, challenges in developing the program, and obtaining buy-in from senior management. 

Course Learning Objectives

  • Synthesize knowledge gained from the disciplines that make up the JIU MBA in Information Security Management – Cyber Security.
  • Identify the roles and responsibilities of the Information Security Manager.
  • Analyze the relationships of program objectives, scope, resources, and metrics for an Information Security Program.
  • Critique and update physical and network security assessments, risk management plans, contingency plans, and rules of engagement and penetration testing plans to address wireless and mobile devices, cloud computing, Advanced Persistent Threats, and client-side threats as necessary.
  • Apply critical thinking and problem-solving skills to the diagnosis and solution of business issues related to cyber security.
  • Demonstrate scholarship and competence through effective oral and written communication.

Course Prerequisites

Special Requirements

The CISSP All-in-One Exam Guide is a required resource that you will use throughout this set of specialization courses for Cyber Security. It is listed as a required text in all Cyber Security courses. You only need to purchase it once, unless later editions of the guide are released as you pursue the specialization.