Overview
To view overview information, please select an offering from the drop-down menu above.
Academic contacts
To view unit coordinator information, please select an offering from the drop-down menu above.
Offerings
DUBAI-ISC-TJD-FACE2FACE-2026-2026
DUBAI-ISC-TMD-FACE2FACE-2025-2025
DUBAI-ISC-TSD-FACE2FACE-2026-2026
KAPLAN-SGP-TJA-MIXEDMODE-2026-2026
KAPLAN-SGP-TMA-MIXEDMODE-2025-2025
KAPLAN-SGP-TSA-MIXEDMODE-2026-2026
MALAYSIAKL-TJC-FACE2FACE-2026-2026
MALAYSIAKL-TMC-FACE2FACE-2025-2025
MALAYSIAKL-TSC-FACE2FACE-2026-2026
MURDOCH-S1-FACE2FACE-2025-ONGOING
MURDOCH-S1-ONLINEFLEX-2025-ONGOING
Requisites
Prerequisite
Exclusion
Other learning activities
To view other learning activity information, please select an offering from the drop-down menu above.
Learning activities
To view learning activity information, please select an offering from the drop-down menu above.
Learning outcomes
1.
Describe the fundamentals of information and computer security, security controls, security functions and information security system implementation planning.
2.
Develop contingency plans and execute a test of contingency plans.
3.
Create an information security policy and present its major components.
4.
Recommend and develop security measures as part of a security program, such as staffing plans, intrusion detection systems and security practices for employees.
5.
Identify security threats, assess the risk of adverse events and evaluate the possible effects on information assets.
6.
Describe ethical and legal issues associated with information and computer security.
7.
Identify and apply information security standards and models, such as NIST, ISO.
Assessments
To view assessment information, please select an offering from the drop-down menu above.
Additional information
Unit content:
- Introduction to Computer and Information Security
- Fundamental Principles and Controls of Computer and Information Security
- Planning for Security and Contingencies
- Information Security Policy
- Developing the Security Program
- Security Management Models and Practices
- Risk Management: Identifying and Assessing Risk
- Controlling Risk
- Protection Mechanisms
- Personnel and Security
- Compliance: Law and Ethics for Information Security