CSS440 Security Policy and Leadership
This course focuses on the design process used by an organization as it implements a security policy. This includes key policy considerations of acceptable use, remote access, information protection, perimeter security, wireless communications, and e-mail. Emphasis is on the procedures to be considered for the implementation of policy and leadership required to enact and maintain security within the organization. Selected case studies and security policies will be reviewed and analyzed.
Corequisite
None
Distribution
Computer Science/Engineering/Information Technology
Notes
Not available online.