Overview

To view overview information, please select an offering from the drop-down menu above.

Academic contacts

To view unit coordinator information, please select an offering from the drop-down menu above.

Offerings

DUBAI-ISC-TJD-FACE2FACE-2026-2026
DUBAI-ISC-TMD-FACE2FACE-2025-2025
DUBAI-ISC-TSD-FACE2FACE-2026-2026
KAPLAN-SGP-TJA-MIXEDMODE-2026-2026
KAPLAN-SGP-TMA-MIXEDMODE-2025-2025
KAPLAN-SGP-TSA-MIXEDMODE-2026-2026
MALAYSIAKL-TJC-FACE2FACE-2026-2026
MALAYSIAKL-TMC-FACE2FACE-2025-2025
MALAYSIAKL-TSC-FACE2FACE-2026-2026
MURDOCH-S1-FACE2FACE-2025-ONGOING
MURDOCH-S1-ONLINEFLEX-2025-ONGOING

Other learning activities

To view other learning activity information, please select an offering from the drop-down menu above.

Learning activities

To view learning activity information, please select an offering from the drop-down menu above.

Learning outcomes

1.

Describe the fundamentals of information and computer security, security controls, security functions and information security system implementation planning.

2.

Develop contingency plans and execute a test of contingency plans.

3.

Create an information security policy and present its major components.

4.

Recommend and develop security measures as part of a security program, such as staffing plans, intrusion detection systems and security practices for employees.

5.

Identify security threats, assess the risk of adverse events and evaluate the possible effects on information assets.

6.

Describe ethical and legal issues associated with information and computer security.

7.

Identify and apply information security standards and models, such as NIST, ISO.

Assessments

To view assessment information, please select an offering from the drop-down menu above.

Additional information

Unit content:
  1. Introduction to Computer and Information Security
  2. Fundamental Principles and Controls of Computer and Information Security
  3. Planning for Security and Contingencies
  4. Information Security Policy
  5. Developing the Security Program
  6. Security Management Models and Practices
  7. Risk Management: Identifying and Assessing Risk
  8. Controlling Risk
  9. Protection Mechanisms
  10. Personnel and Security
  11. Compliance: Law and Ethics for Information Security