CISM-5355 Cybersecurity Operations
Description
Business and government are facing a rapidly expanding need for information security managers. This course surveys information security program design, networking and application security, the implementation of information security safeguards and information security auditing, disaster recovery, policy development, identity management, and effective threat assessment. Students who have taken CISM 4355 cannot take CISM 5355.
Lecture Hours: 3.00 Lab Hours: 0Total Hours: 3.00
Semesters
Course Title | Instructor | Campus | Section | Syllabus |
---|---|---|---|---|
Cybersecurity Operations | Gelareh (Ellie) Towhidi, Ph.D. | Carrollton | 01 | external Syllabus via Concourse External Resource |
Cybersecurity Operations | Gelareh (Ellie) Towhidi, Ph.D. | Distance | E01 | external Syllabus via Concourse External Resource |