Beruflich Dokumente
Kultur Dokumente
This course covers the main aspects of IT security from a manager's point of view.
Managers in any field need to be aware of security and have a grasp on what can be done
to monitor and improve it. This is a field that literally changes on a daily basis and as the
world becomes more and more interconnected there isn't a business or government on
earth that doesn't have some sort of electronic entry into their private infrastructure. We will
examine how these resources can be protected in both a proactive and reactive way. The
Course addresses the key aspects of security including the following as well as others:
This course takes a managers approach in dealing with the planning and implementing from
a high level. There is some technical information covered but deals more with general
information instead of vendor specific settings. The assignments will revolve around
identifying targets and how they can be exploited.
This course is not only for MIS students but any student who wants to be in a manager's
role in any company and is involved in maintaining and increasing revenues as well as
reputation. Technology is everywhere and even if you think you are not a target you can
become an easy way into bigger and better targets. Managers need to be aware what has
to be done to ensure the successful securing of technology in business today.
Materials
Supplementary resource materials: URL: https://ulearn.ualberta.ca with articles, software,
case studies, and exercises, etc.
Pre-requisites
You must have completed the introductory information systems course MIS 311 and have
some experience with using computers. If you lack such pre-requisites, you should discuss
your situation with the instructor prior to enrolling in this course.
Format
The format of the course will consist of lectures, group discussions, case studies, webcasts, scheduled lab sessions, a final exam, several small assignments, 2 larger
assignments and class participation.
Date
Sept 8
Sept
13,15
Sept
20,22
Sept
27,29
Topic
Text Additional
PP Resources
-Intro
Jim Kiddoo
-Group Setup
-Assignment
intro
Jim Kiddoo
Identify Targets
Jim Kiddoo
Examine
Outcomes
Implementation
challenges
Policy Creation
Oct 4,6 and
Enforcement
Auditing and
Oct 11,13
Forensics
Disaster Recover
Oct 18,20 and Business
Continuity
Oct 25,27 Points of Entry
Detect and
Nov 1,3
Protect
Nov 8,10 Latest Attempts
Nov 15,17 Presentations
Nov 22,24 Review
Nov 29,
Dec 1
1.
2.
3.
4.
5.
Instructor/Guest Comments/Notes
Jim Kiddoo
Jim Kiddoo
Jim Kiddoo
Jim Kiddoo
Jim Kiddoo
Jim Kiddoo
Jim Kiddoo
Jim Kiddoo
Jim Kiddoo
Jim Kiddoo