Network Security Management

NETM200 — Network Security Management, 3.0 hours

Description

This course focuses on security and risk management. Topics covered but not limited to Contemporary security issues, Security management processes, Architecture and models, Risk analysis and management, Security planning, and Analysis and safeguards.

Program Objectives

  1. Understand the key threats to information security, the manager's role in securing the systems, and the legal and ethical issues involved.
  2. Describe the importance and characteristics of a strategic plan for information security and the three types of security policies that need to be developed.
  3. Learn how to develop and security program including staffing, education, and training. Understand risk assessment and how to manage it.
  4. Understand risk management and the appropriate strategies options. Understand the information security management models and the importance of access control.
  5. Take the security management concepts in earlier lessons and see how they are applied in day-to-day practice.
  6. Learn how to develop contingency plans including disaster recovery and incident response.
  7. Learn how to create a maintenance program for the information security program including monitoring and review procedures.
  8. Learn about a variety of protection components such as firewalls, intrusion detection, encryption, and biometric access control.

Professor

Professor

Professor Mr. Nicholas Theodule received his Master of Science Degree in Information Systems from University of Phoenix, after acquiring his Bachelor of Science in Electronics Communication Engineering Technology Degree. Prior to this, he had acquired an Applied Associates of Science Degree in Computer-Aided Drafting and Design. In addition, he had served eight years as a Military Police Officer within the US Army Reserves. With his past and current educational experiences as an educator, he has been able to assist with removing any academic barriers regarding online learning. Such barriers can stem from those that could affect accessibility, development of online engagement, online learning and constraints relating to learning resources, time management, and delivery of assignments. Along with continued discovery towards refining one’s online academic engagement, his role is to collaborate with Faculty and Staff in order to assist with content comprehension.

Online Support (IT) and Moodle Navigation

Online Support (IT) and Moodle Navigation:

All members of the Lakewood College community who use the College’s computing, information or communication resources must act responsibly. Support is accessible by calling 1-800-517-0857 option 2 or by emailing info@lakewoodcollege.edu

Books and Resources

Books and Resources

Michael E. Whitman, Herbert J. Mattord. Management of Information Security. 6th ed. Cengage, 2019.

Evaluation Method

Evaluation Method

Graded work will receive a numeric score reflecting the quality of performance.
Course Requirement Summary

  • Assignments - Total of 140 Points
  • Weekly discussion forums-Total of 80 Points
  • Final Exam - 50 Points

 

Grading Scale

Grading Scale

Graded work will receive a numeric score reflecting the quality of performance as given above in evaluation methods. The maximum number of points a student may earn is 190. To determine the final grade, the student's earned points are divided by 190.

Your overall course grade will be determined according to the following scale:

A = (90% -100%)
B = (80% - 89%)
C = (70% - 79%)
D = (60% - 69%)
F < (Below 60%)

Writing Assignment Grading Rubric

Assignment and Discussion Forum Post Rubrics

Writing Assignment Grading Rubric

Points

Excellent
10-9 pts

Good
8-6 pts

Poor
5-3 pts

Very Poor
2-1 pts

No Response
0 pts

Original Posting

____/10

Writing assignment was well thought out, coherent, and thoughtfully organized with all parts of the questions addressed along with appropriate

grammar and spelling

Writing was clear and relatively well organized and responded to many/most of the key points with a few mistakes in regard to grammar and spelling

Writing was somewhat confusing and not well organized and had little or no focus on the subject matter with significant grammar and spelling errors

Writing is confusing and hard to follow with no organization while missing the point of the assignment entirely

No Assignment

Total Points

____/10

Additional Comments:

Discussion Question Grading Rubric

Discussion Question Grading Rubric

Points

Excellent Pass

Good Pass

Poor Fail

No Response Fail

Original Posting

PASS/FAIL

Original post reflected good focus to the discussion with well thought out ideas and appropriate grammar and spelling

Original post responded to the topic in a general fashion but failed to organize them well and had a few mistakes in regard to grammar and spelling

Responded with little or no focus to the discussion and contained short, irrelevant and/or confusing commentary with significant grammar and spelling errors

No posting

Reply to fellow student

PASS/FAIL

Response to fellow student reflected good focus to the post with well thought out ideas and appropriate grammar and spelling

Response to fellow student in a general fashion but failed to organize them well and had a few mistakes in regard to grammar and spelling

Little or no focus to the post and contained short, irrelevant and/or confusing commentary with significant grammar and spelling errors

No posting

Total Points

PASS/FAIL

Additional Comments:

Academic Integrity/ Plagiarism

Academic Integrity/ Plagiarism:

Cheating (dishonestly taking the knowledge of another person whether on a test or an assignment and presenting it as your work) and plagiarism (to take and pass off as one's own the ideas or writing of another) are a serious issue. While it is legitimate to talk to others about your assignments and incorporate suggestions, do not let others "write" your assignments in the name of peer review or "borrow" sections or whole assignments written by others. We do get ideas from life experiences and what we read but be careful that you interpret these ideas and make them your own.

I am aware that many types of assignments are available on the internet and will check these sources when there is legitimate suspicion.

Penalty is a zero on the assignment. In cases where there is a major or continuous breach of trust, further discipline, such as an "F" in the course, may be necessary.

The major consequence of any form of cheating is damage to your character and the result of trust and respect.

Disability Accommodations

Disability Accommodations

Students who have a disability and wish to request an academic accommodation should contact Jim Gepperth, the Disabilities Services Coordinator and Academic Dean. The student can request an accommodation at any time although it is encouraged to do so early in the enrollment process. The student should complete an accommodation request form which begins a conversation between the school and the student regarding the nature of their disability and an accommodation that would help the student succeed in their program. The school may request documentation regarding the disability to address the accommodation request effectively. The school will communicate to the student the type of accommodation arranged. This process typically follows a team approach, bringing together persons from the academic department (including the instructor) and personnel from other departments as necessary. Additional information on disability accommodations may be found in the Lakewood University Catalog.

Disability Services Email: disabilityservices@lakewood.edu

Supplemental Texts

Supplemental Texts

You can use the following resources to assist you with proper source citation. 

American Psychological Association Style Guide- https://www.mylakewoodu.com/pluginfile.php/118179/mod_resource/content/1/APA%20Style%20Guide%207th%20edition.pdf

The Purdue OWL website is also a helpful resource for students. Here is a link to the OWL website: https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/general_format.html

Library

Library

 

Mary O'Dell is the Librarian on staff at Lakewood University

She is available by appointment. You can make an appointment with her by emailing her at modell@lakewood.edu or call at 1-800-517-0857 X 730

You may also schedule a meeting at this link: https://my.setmore.com/calendar#monthly/r3a761583354923270/01032020

She can assist you with navigating LIRN, research, citations etc.

Support

Support

Each student at Lakewood University is assigned a Success Coach. Your Success Coach exists to assist you with academic and supportive services as you navigate your program. They will reach out to you, often, to check-in. Please use the resources they offer.

Student Services is available to assist with technical questions regarding Lakewood University and all services available to you.

1-800-517-0857 option 2
info@lakewood.edu
studentservices@lakewood.edu

Career Services

Career Services

Students are offered Career Services at any point as they journey their academics at Lakewood University.

1-800-517-0857 option 2
careerservices@lakewood.edu

Objectives

Objectives
  1. Understand the key threats to information security, the manager's role in securing the systems, and the legal and ethical issues involved.
  2. Describe the importance and characteristics of a strategic plan for information security and the three types of security policies that need to be developed.
  3. Learn how to develop and security program including staffing, education, and training. Understand risk assessment and how to manage it.
  4. Understand risk management and the appropriate strategies options. Understand the information security management models and the importance of access control.
  5. Take the security management concepts in earlier lessons and see how they are applied in day-to-day practice.
  6. Learn how to develop contingency plans including disaster recovery and incident response.
  7. Learn how to create a maintenance program for the information security program including monitoring and review procedures.
  8. Learn about a variety of protection components such as firewalls, intrusion detection, encryption, and biometric access control.

Lessons

Lessons
Title
Lesson #1
Course Topic
  • Introduction to the Management of Information Security
  • Compliance: Law and Ethics
Readings/Assignments
  • Study Course Syllabus
  • Read Chapters 1 & 2
  • Participate in the Discussion Forum
  • Complete Assignment 1
  • Complete Assignment 2
  • Lesson Evaluation
Due

Completion of the following items: 

  • Discussion Forum 
  • Assignment 1
  • Assignment 2
Objectives
Objective 1
Title
Lesson #2
Course Topic
  • Governance and Strategic Planning for Security
  • Information Security Policy
Readings/Assignments
  • Read Chapters 3 & 4
  • Participate in the Discussion Forum
  • Complete Assignment 3
  • Complete Assignment 4
  • Lesson Evaluation
Due

Completion of the following items:

  • Complete Forum
  • Assignment 3 
  • Assignment 4
Objectives
Objective 2
Title
Lesson #3
Course Topic
  • Developing the Security Program
  • Risk Management: Assessing Risk
Readings/Assignments
  • Read Chapters 5 & 6
  • Participate in the Discussion Forum
  • Lesson Evaluation
Due

Completion of the following items:

  • Complete Forum
Objectives
Objective 3
Title
Lesson #4
Course Topic
  • Risk Management: Treating Risk
  • Security Management Models
Readings/Assignments
  • Read Chapters 7 & 8
  • Participate in the Discussion Forum
  • Complete Assignment 5
  • Lesson Evaluation
Due

Completion of the following items:

  • Complete Forum
  • Assignment 5
Objectives
Objective 4
Title
Lesson #5
Course Topic
  • Security Management Practices
Readings/Assignments
  • Read Chapters 9
  • Participate in the Discussion Forum
  • Lesson Evaluation
Due

Completion of the following items:

  • Complete Forum
Objectives
Objective 5
Title
Lesson #6
Course Topic
  • Planning for Contingencies
Readings/Assignments
  • Read Chapters 10
  • Participate in the Discussion Forum
  • Complete Assignment 6
  • Lesson Evaluation
Due

Completion of the following items:

  • Complete Forum
  • Assignment 6
Objectives
Objective 6
Title
Lesson #7
Course Topic
  • Security Maintenance
Readings/Assignments
  • Read Chapters 11
  • Participate in the Discussion Forum
  • Lesson Evaluation
Due

Completion of the following items:

  • Complete Forum
Objectives
Objective 7
Title
Lesson #8
Course Topic
  • Protection Mechanisms
Readings/Assignments
  • Read Chapter 12
  • Participate in the Discussion Forum
  • Complete Assignment 7
  • Complete the Final Project Case Study
  • Request the Next Course
  • Lesson Evaluation
  • THANKS FOR A GREAT CLASS
Due

Completion of the following items:

  • Complete Forum
  • Assignment 7
  • Final Project Case Study
Objectives
Objective 8

Overview

Course

Course

Contact Information

Contact Information

Nicholas Theodule

Email: ntheodule@lakewood.edu

Phone: 1.800.517.0857 ext. 795