0% found this document useful (0 votes)
14 views

Syllabus - Information Control and Security Syllabus

Uploaded by

Kiran Gowda
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

Syllabus - Information Control and Security Syllabus

Uploaded by

Kiran Gowda
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Information Control and Security 1.

5 Credits

Course Description

This demands additional computer security measures to protect the information and relevant
systems. This course prepares the students to meet the new challenges in the world of
increasing threats to computer security by providing them with an understanding of the
various threats and countermeasures.

Learning Objectives

 To train and sensitize participants to various challenges and the way to deal with them
in Information Security.
 To learn fundamentals concepts related control to IT Security and provide technical
knowledge on topics such as BCP/DR etc.

 To widen the Participants horizon about various IT Security solutions and be able to
build a body of knowledge consisting of Standardized Security Structures for various
areas. For instance, setting up a Large Data Centre, providing IT controls, Implemen-
tation of Enterprise Solutions, Mass Multi-location infrastructure rollouts, etc.
 To learn how to identify IT Risk and manage risk effectively.
 To understand the technical and managerial aspects of managing infrastructure re-
quirements and customer expectations in any project.
 To deal with Vendors and Manage the process of outsourcing.
 To understand the complexity of modern IT infrastructure and the challenges in man-
aging these.

Unit I Information Security Overview (2.5 Hrs)

Understanding what Information is and why it needs to be protected. Trends in Information


Security. Basics of Information Security

Unit II EBA Information Security Risks (2.5 Hrs)

Understanding Risks in Information Security. Understanding Threats in Information Secur-


ity. Hacking Methodology.

Unit III ERP Understanding different types of Security (2.0 Hrs)

Understanding logical Security. Understanding Physical Security. Understanding IT


Security related process.
Unit IV Understanding Data Security (2.5 Hrs)

Understanding Data Security at Rest along with encryption. Understanding Network


Security. Understanding basics of Firewall and other security devices. Understanding
Cryptography.

Unit V BCP/DR Understanding. (2.5 Hrs)

Understanding BCP and DRP. Understanding BIA (Business Impact Analysis)

Unit VI Best Practices in Information Control and Security (2.0) Hrs.

Understanding Best Practices in IT Security

Unit VII Cyber Security (2.0) Hrs.

[Total 16 Hours]

Recommended Reading

1. IT Security Governance by IT Governance Institute (ITGI)


2. BS:7799/ISO/IEC:17799
3. IBM Business Process Manager Security – Red Books – by J Keith Wood
Jens Engelke

4. Handbook of Database Security: Applications and Trends (Paperback) by


Michael Gertz

5. Network and Communication Security by Mike Wills


6. Business Continuity Management by Brahim Herbane, Dominic Elliott,
Ethné Swartz
7. Information Systems Control and Audit – Ron Weber -- Pearson

You might also like