CENTRAL TEXAS COLLEGE ITSY 2459 SECURITY ASSESSMENT AND AUDITING. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:

Similar documents
CENTRAL TEXAS COLLEGE ITNW 1316 NETWORK ADMINISTRATION. Semester Hours Credit: 3

CENTRAL TEXAS COLLEGE ITSE 2486 INTERNSHIP, COMPUTER PROGRAMMING/PROGRAMMER, GENERAL. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:

CENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:

CENTRAL TEXAS COLLEGE ITSE 2459 ADVANCED COMPUTER PROGRAMMING C# Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:

CENTRAL TEXAS COLLEGE ITSE 1302 COMPUTER PROGRAMMING. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:

CENTRAL TEXAS COLLEGE SYLLABUS FOR POFT 2312 BUSINESS CORRESPONDENCE AND COMMUNICATION Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS:

II. LEARNING OUTCOMES A. Upon successful completion of this course, Introduction to Early Childhood Education, the student will be able to:

CENTRAL TEXAS COLLEGE SYLLABUS FOR POFT 1319 RECORDS AND INFORMATION MANAGEMENT Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS:

CENTRAL TEXAS COLLEGE SYLLABUS FOR ARTC 2488 INTERNSHIP GRAPHIC DESIGN. Semester Hours Credit: 4 Contact Hours: 304 INSTRUCTOR: OFFICE HOURS:

CENTRAL TEXAS COLLEGE SYLLABUS FOR CDEC 1354 CHILD GROWTH AND DEVELOPMENT :30-8:30 P.M. 217 RM

CENTRAL TEXAS COLLEGE SYLLABUS FOR MUSI 1306 MUSIC APPRECIATION. Semester Hours Credit: 3

CENTRAL TEXAS COLLEGE SYLLABUS FOR COMM 2324 PRACTICUM IN ELECTRONIC MEDIA (ADVANCED AUDIO) Semester Credit Hours: 3 INSTRUCTOR:

CENTRAL TEXAS COLLEGE SYLLABUS FOR SPCH 1318 INTERPERSONAL COMMUNICATION. Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS:

CENTRAL TEXAS COLLEGE HRPO 2301 HUMAN RESOURCES MANAGEMENT Semester Hours Credit: 3 INSTRUCTOR: ( ) OFFICE HOURS: ( )

Central Texas College HAMG 2388 Internship Hospitality Administration and Management. Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS:

CENTRAL TEXAS COLLEGE SYLLABUS FOR ACCT 2301 PRINCIPLES OF FINANCIAL ACCOUNTING. Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS:

Central Texas College. Menu Management Semester Hours Credit: 2

CENTRAL TEXAS COLLEGE GOVT 2305 Federal Government (Federal constitution & topics) Semester Credit Hours: 3 INSTRUCTOR:

CENTRAL TEXAS COLLEGE SYLLABUS FOR RELE 1325 REAL ESTATE MATH. Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS:

CENTRAL TEXAS COLLEGE SYLLABUS FOR RELE 1315 REAL ESTATE PROPERTY MANAGEMENT. Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS:

CENTRAL TEXAS COLLEGE SYLLABUS FOR LGLA 1317 LAW OFFICE TECHNOLOGY Semester Hours Credit: 3 INSTRUCTOR: OFFICE PHONE:

CENTRAL TEXAS COLLEGE SYLLABUS FOR LGLA 2303 TORTS AND PERSONAL INJURY LAW Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS:

CENTRAL TEXAS COLLEGE SYLLABUS FOR CRIJ 2314 CRIMINAL INVESTIGATION. Semester Hours Credit: 3

CENTRAL TEXAS COLLEGE SYLLABUS FOR RELE 1311 LAW OF CONTRACTS. Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS:

IMPORTANT NOTE REGARDING FEEDBACK AND RESPONSIBILITY FOR LEARNING

CENTRAL TEXAS COLLEGE DEPARTMENT OF DRAFTING AND DESIGN SYLLABUS FOR DFTG 1417 ARCHITECTURAL DRAFTING-RESIDENTIAL

Central Texas College. Ft. Riley, KS. GOVT 2306 Texas Government. Independent Study

CENTRAL TEXAS COLLEGE INDUSTRIAL TECHNOLOGY DEPARTMENT SYLLABUS FOR ARTC 1327 TYPOGRAPHY

CENTRAL TEXAS COLLEGE SYLLABUS FOR DSMA 0306 INTRODUCTORY ALGEBRA. Semester Hours Credit: 3

CENTRAL TEXAS COLLEGE SYLLABUS FOR ARTS 2357 PHOTOGRAPHY II. Semester Hours Credit : 3

DEGREE REQUIREMENTS & ACADEMIC GUIDELINES

COURSE SYLLABUS FIREWALLS & NETWORK SECURITY. ITSY-2301 Number Lecture - Lab - Credit. ITSY-1342 Prerequisites. April 16, 2015 Revision Date

CENTRAL TEXAS COLLEGE SYLLABUS FOR HMSY 1470 FINAL PROJECT IN HOMELAND SECURITY AND EMERGENCY MANAGEMENT Semester Hours Credit: 3

Hagerstown Community College OFFICIAL COURSE SYLLABUS DOCUMENT

GOVT 2305 Federal Government Frank Phillips College

ITSY Security Assessment/Auditing Spring 2010 Professor: Zoltan Szabo D111 LEC TR 11:20AM 12:45PM D111 LAB TR 12:50PM 02:15PM

Introduction to Criminal Justice Central College

Course Syllabus GAME 1336 Intro. to 3D Game Modeling Spring 2015 CRN: 46650

Midlands Technical College MED 134 Medical Assisting Financial Management - Hybrid Health Sciences Medical Assisting Sum mer

Crime Scene Investigation Central College

CENTRAL TEXAS COLLEGE SYLLABUS FOR ARTS 1311 DESIGN I. Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS:

HIM 103 Introduction to Health Information Management & Coding and Classification Systems Health Sciences Health Information Management Spring 2015

SYLLABUS FOR ENGLISH 2311 TECHNICAL AND BUSINESS WRITING. Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS:

ACC Child Care & Development Department CDEC Special Topics in Early Childhood Master Syllabus

CENTRAL TEXAS COLLEGE SYLLABUS FOR AIRP 1307 AVIATION METEOROLOGY Semester Hours Credit: 3

EDU 230 Schools in Communities Social & Behavioral Sciences Department

Medical Assistant Program Coleman College for Health Sciences

General Academic Information

HITT 1249/1349 AUSTIN COMMUNITY COLLEGE Semester: Fall 2015 Course Dates: Aug 24 Dec 16, 2015

EDUC 1301: INTRODUCTION TO THE TEACHING PROFESSION COURSE SYLLABUS

Midlands Technical College MED 124- Medical Computer Practicum- Hybrid Health Sciences Medical Assisting Spring

HITT 1301/1001 AUSTIN COMMUNITY COLLEGE Semester

Florida State College at Jacksonville MAC 1105: College Algebra Summer Term 2011 Reference: MW 12:00 PM 1:45 PM, South Campus Rm: G-314

HITT 1345 AUSTIN COMMUNITY COLLEGE Semester: Spring 2016 Course Dates: January 19 May 15, HITT Health Care Delivery Systems

CENTRAL TEXAS COLLEGE SYLLABUS FOR ARTS 2347 CERAMICS II. Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS:

BRAZOSPORT COLLEGE LAKE JACKSON, TEXAS SYLLABUS BUSG 2309: SMALL BUSINESS MANAGEMENT COMPUTER TECHNOLOGY & OFFICE ADMINISTRATION DEPARTMENT

The University of Texas at Tyler COLLEGE OF BUSINESS & TECHNOLOGY Fall Semester 2013 Course Syllabus. Introduction to the American Health Care System

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline

MAT 120 Probability & Statistics Mathematics

Syllabus Systems Analysis and Design Page 1 of 6

SOC 101 Introduction to Sociology Social & Behavioral Sciences Department

Professor: Monica Hernandez Phone: (956) Dept. Secretary Ms. Canales

ACC Child Care & Development Department CDEC 1417-Child Development Associate Training I Master Syllabus

Small Business Management BUSG 2309 Course Syllabus

MATH 1314 College Algebra Frank Phillips College

LEWIS-CLARK STATE COLLEGE BUSINESS TECHNOLOGY & SERVICE SYLLABUS. MEDPT 172 Medical Terminology or Instructor Permission

PSY 201 General Psychology Social & Behavioral Sciences Department

Medical Assistant Program Coleman College for Health Sciences

Procedures of Policy No. (3) - Undergraduate Registration and Enrollment

Central Alabama Community College

Address: XXX. Semester/Year: xxx

IT 145 Section 300 Fall 2013 Web Design Fundamentals: HTML and Style Sheets. Syllabus and Course Outline

HRD 5336 Adult Learning

CRJU 1068-Criminal Law for Criminal Justice COURSE SYLLABUS Lecture Spring Semester 2016

How To Perform A Rehabilitation Counseling Practicum

Academic Policies Graduate School of Public Health and Health Policy (GSPHHP)

Forensic Biology 3318 Syllabus

Introduction to Sociology Online Course Syllabus SOC 2301 D30 CRN Fall 2015 Angelo State University

Advanced Film Production Workshop. Course Outline

CJ 4480 Digital Forensics II Syllabus - Term

CENTRAL TEXAS COLLEGE SYLLABUS FOR SPAN 1411/1412 BEGINNING SPANISH I & II. Semester Hours Credit: 4/4 INSTRUCTOR: OFFICE HOURS:

Graduate Studies Program. Student Handbook

JOHN A. LOGAN COLLEGE M. Rogers SM 14. CIS SECURITY AWARENESS 3 cr. (3-0)

Basic understanding of data security tools such as access control mechanisms, authentication tools and cryptographic constructs.

California University Online Distance elearning Simplified Student Handbook. CONTENTS I. Introduction Welcome Mission Statement

BRAZOSPORT COLLEGE LAKE JACKSON, TEXAS SYLLABUS. ITNW 2313: NETWORKING HARDWARE Online Course Version COMPUTER TECHNOLOGY DEPARTMENT

Human Resource Management HRPO Human Resource Management

Course Syllabus. Senior Project Studio. Course Description: Students begin the design and production of advanced interactive project.

CIT 212 Microsoft Networking II Windows Server 2012 R2 Administration Fall 2015

Course Syllabus CRIJ Introduction to Criminal Justice Spring 2012 Tuesday & Thursday 2:50-4:05pm

How To Get A Dual Credit At North Central Texas College

SOUTHEASTERN LOUISIANA UNIVERSITY School of Nursing Spring, Completion of all 200 level nursing courses

Transcription:

CENTRAL TEXAS COLLEGE ITSY 2459 SECURITY ASSESSMENT AND AUDITING Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS: I. INTRODUCTION A. Capstone experience for the security curriculum. Synthesizes technical material covered in prior courses to monitor, audit, analyze, and revise computer and network security systems to ensure appropriate levels of protection are in place to assure regulatory compliance. B. This course serves as a required or elective course on various degree plans. Curriculum plans for degrees and certificates are listed in the current Central Texas College catalog. C. The delivery method of this course may be traditional lecture/lab, blended lecture/lab, or online. D. Prerequisites: Twelve (12) semester hours of Information Technology Security (ITSY) coursework. II. LEARNING OUTCOMES Upon successful completion of this course, Security Assessment and Auditing, the student will be A. Review security plan to ensure appropriate level of protection. (C5, C6, C8, C15, C19, C20). B. Assess network security design. (C1, C5, C6, C8, C19, C20, F1, F3, F8, F9, F12). C. Audit network system based on security design. (C1, C5, C6, C8, C19, C20, F1, F3, F8, F9, F12). D. Use relevant tools to assure security requirements. (C5, C6, C8, C15, C19, C20). E. Review all security policies and procedures on a regular basis. (C1, C5, C6, C8, C19, C20, F1, F3, F8, F9, F12). October 2014

III. INSTRUCTIONAL MATERIALS A. The instructional materials identified for this course are viewable through www.ctcd.edu/books B. Lecture Classes also require at least one USB storage device. Online students may use cloud based storage. IV. COURSE REQUIREMENTS A. Attend both lecture and lab or in the case of online delivery, be actively engaged in Blackboard and maintain constant progress. B. Be prepared to participate in discussion, team projects/assignments and take unannounced assessments relating to the lecture materials. C. Complete all exams/assessments. D. Submit all assignments on time. V. ASSESSMENTS A. Student content mastery will be evaluated in the following areas: Assessments (midterm exam, quizzes, projects, discussion etc.) Final Assessment (final exam and/or semester project, participation) B. Scheduled and unscheduled assessments will be given at the discretion of the instructor. C. Exams/assessments may be composed of both subjective and objective questions plus computer output. D. A student must take all exams/assessments. Both online and on campus students who know in advance that they will be absent due to school sponsored trips, military duty or orders, or any other valid reason, must arrange to take an early exam/assessment. Unexpected absences due to illness or other extenuating circumstances will require the student to contact the instructor about make-up work in lieu of the missed exam/assessment. E. Students with unexcused absences will be given a zero for each missed assignment. ITSY 2459 2

VI. SEMESTER GRADE COMPUTATION Course Requirements Points Points Grade Quality Points Assignments 300 900-1000 A-Superior 4 Assessments 300 800-899 B-Above Average 3 Final Assessment 400 700-799 C-Average 2 600-699 D Passing but 1 Unsatisfactory TOTAL 1000 0-599 F-Failure 0 VII. NOTES AND ADDITIONAL INSTRUCTIONS FROM THE INSTRUCTOR A. Course Withdrawal: It is the student s responsibility to officially withdraw from a course if circumstances prevent attendance. Any student who desires to, or must, officially withdraw from a course after the first scheduled class meeting must file a Central Texas College Application for Withdrawal (CTC Form 59). The student must sign the withdrawal form. CTC Form 59 will be accepted at any time prior to Friday of the 12th week of classes during the 16-week fall and spring semesters. The deadline for sessions of other lengths is: 10-week session Friday of the 8th week 8-week session Friday of the 6th week 5-week session Friday of the 4th week The equivalent date (75% of the semester) will be used for sessions of other lengths. The specific last day to withdraw is published each semester in the Schedule Bulletin. For non-goarmyed active military students, the effective date of withdrawal is the filing date with the Education Center. For all other students, the effective date of withdrawal is the date that the withdrawal application is received by the Central Texas College representative. Students who used financial aid, military tuition assistance, VA benefits, or other non-personal funds may be required to repay tuition and fees to the funding agency. For specific repayment requirements, contact the Office of Student Financial Aid or Veterans Services Office before withdrawing. Military tuition assistance students should visit their military Education Center or Navy College Office. A student who officially withdraws will be awarded the grade of W provided the student s attendance and academic performance are satisfactory at the time of official withdrawal. Students must file a withdrawal application with the College before they may be considered for withdrawal. ITSY 2459 3

A student may not withdraw from a class for which the instructor has previously issued a grade of F, FI, FN, IP, or XN. B. Instructor Initiated Withdrawals: Faculty are authorized to withdraw students who are not making satisfactory course progress to include failure to meet College attendance requirements as outlined in the section of the Catalog entitled Satisfactory Progress Standards. The instructor will assign the appropriate grade on CTC Form 59 for submission to the registrar. Students enrolled in distance learning courses are expected to maintain constant progress throughout the course. Failure to do so may result in the student being administratively withdrawn by the instructor. Students who have not attended class by the 12th class day of a 16-week course or the 6th class day of an 8-week term may be administratively withdrawn by the instructor with a grade of "W." Students may also be administratively withdrawn from any class when their absences exceed a total of four class meetings for a 16-week course or three class meetings for less than 16-week courses and; in the opinion of the instructor, the student cannot satisfactorily complete the course. In a distance learning course the last date of attendance is the last activity by the student in the course. C. Administrative Withdrawal: A student may be administratively withdrawn by a designated member of the administrative staff of the College when the student has been placed on Academic Suspension or Disciplinary Suspension; the student has an outstanding financial obligation owed to the college; or the student registered for a course without the required prerequisite or departmental permission. The College is under no obligation to refund tuition and fees, or other costs associated with an administrative or instructor initiated withdrawal. D. Incomplete Grade: The College catalog states, An incomplete grade may be given in those cases where the student has completed the majority of the coursework but, because of personal illness, death in the immediate family, or military orders, the student is unable to complete the requirements for a course... Prior approval from the instructor is required before the grade of IP for Incomplete is recorded. E. Cell Phones and Pagers: Students will silence cell phones and mobile devices while in the classroom or lab. F. Americans with Disabilities Act (ADA): Disability Support Services provide services to students who have appropriate documentation of a disability. Students requiring accommodations for class are responsible for contacting the Office of Disability Support Services (DSS) located on the central campus. This ITSY 2459 4

service is available to all students, regardless of location. Review the website at www.ctcd.edu/disability-support for further information. Reasonable accommodations will be given in accordance with the federal and state laws through the DSS office. G. Instructor Discretion: The instructor reserves the right of final decision in course requirements and may make changes to the course outline and/or assignments as needed. H. Civility: Individuals are expected to be aware of what a constructive educational experience is and be respectful of those participating in a learning environment. Failure to do so can result in disciplinary action up to and including expulsion. I. Degree Progression: Students who receive a grade of D are advised not to enroll in the next course for which this course was a prerequisite. J. Failing Grade: The grade of F or FN will be given for academic failure, non-attendance or scholastic dishonesty. K. Scholastic Honesty: All students are expected to maintain the highest standards of scholastic honesty in the preparation of all course work and during examinations. The college policy on scholastic honesty, including definitions on plagiarism, collusion, and cheating can be found at the following URL: http://online.ctcd.edu/plagiarism.cfm ITSY 2459 5

VIII. COURSE OUTLINE A. Unit One: Introduce course requirements and objectives and lab orientation a. Apply course requirements and objectives as defined in the syllabus and reviewed by the instructor 2. Learning Activities a. Read syllabus (C5, F1) b. Read and analyze assignments (C5, C6, F1, F9, F11, F12) a. Discuss syllabus b. Cover functional units of a computer c. Cover hardware and software fundamentals d. Conduct laboratory demonstration B. Unit Two: The Need for Information Systems Security Compliance a. Examine the role of an IT assessment. b. Examine the role of IT auditing. c. Compare the difference between and audit and an assessment. d. Summarize compliance and explain why it is important. 2. Learning Activities a. What is a security assessment and audit? b. What is the importance of governance and compliance? C. Unit Three: Overview of U. S. Compliance Laws a. Describe the goals and requirements for key acts of Congress. b. Understand Department of Defense requirements and the importance of information assistance. c. Describe the goals and requirements of the payment card industry Data Security Standard. ITSY 2459 6

d. Describe various regulations concerning protection of health, accounting, and other information. 2. Learning Activities a. The Role of Planning b. Precursors to Planning c. Strategic Planning d. Planning for Information Security Implementation D. Unit Four: What is the Scope of and IT Compliance Audit? a. Understand what organizations need to do to achieve and maintain compliance. b. Explain why protecting privacy data is important or achieving compliance. c. Understand the process for selecting security controls. d. Compare the different domains of IT infrastructure. 2. Learning Activities a. Contingency Planning definition b. Components of Contingency Planning c. Business Resumption Planning d. Testing Contingency Plans E. Unit Five: Auditing Standards and Frameworks a. Understand the importance of using a framework for audits. b. Describe various strategies for using standards and framework for compliance auditing. c. Understand COSO and how it relates to information technology. d. Describe the key parts and importance of COBIT. e. Understand the importance of and benefits of a SAS 70 audit ITSY 2459 7

f. Describe the key ISO.IEC standards that relate to information security g. Describe the NIST 800-53 and 800-53A standards h. Understand the need for hybrid auditing approaches a. Read chapter (C5, C6, C8, C19, F1, F5, F11) b. Complete case studies (C5, C6, C8, C19, F1, F5, F11) a. Enterprise Information Security Policy b. Issue-Specific Security Policy c. System-Specific Policy d. Guidelines for Policy Development F. Unit Six: Planning an IT Infrastructure Audit for Compliance a. Understand how to define the scope and frequency of an audit b. Identify the key requirements of an Audit c. Understand the importance of risk management in assessing security controls d. Understand information and resources needed for an IT audit e. Relate the IT security policy framework into the seven domains of IT infrastructure f. Understand why monitoring requirements help with an IT audit g. Identify security control points h. Differentiate between the project management tasks of an IT audit a. Read and discuss chapter (C5, C6, F1, F5, F11) a. Organizing for Security. b. Placing Information Security within an Organization. c. Components of the Security Program. d. Information Security Roles and Titles. e. Implementing Security Education, Training, and Awareness Programs. G. Unit Seven: Conducting and IT Infrastructure Audit for Compliance a. Understand the elements of conducting and audit of IT infrastructure. ITSY 2459 8

b. Recognize strategies to manage risk and provide baseline configurations to control risk. c. Understand why conducting a gap analysis is important d. Recognize when it is necessary to conduct an audit taking a layere4d approach e. Evaluate different methods and techniques for performing an IT security assessment f. Understand how a security assessment fits into the audit process g. Identify different types of tools used to enable an audit h. Recognize the value of monitoring and configuration management to the audit process i. Articulate a methodology to testing security controls j. Identify common issues that might hamper the audit efforts k. Understand safeguards necessary for security operations and administration roles a. Security Management Models. b. Security Management Practices. c. Metrics in Information Security Management. d. Emerging Trends in Certification and Accreditation. H. Unit Eight: Writing the IT Infrastructure Audit Report a. Design the layout for a proper executive summary b. Understand audit findings and their importance to the audit report c. Understand the gap analysis and its importance to the audit report d. Identify the risk components part of an IT security assessment and audit report e. Understand how IT security controls identified in the IT audit report relate to the security policy framework and protection of privacy data f. Identify key areas from which a gap analysis should be documented g. Understand how to report upon a compliance assessment h. Understand how to craft meaningful compliance recommendations ITSY 2459 9

a. Risk Management. b. Risk Identification. c. Risk Assessment. d. Documenting the Results of Risk Assessment I Unit Nine: Compliance within the User Domain a. Examine the compliance law requirements and business drivers b. Compare how items found in the User Domain contribute to compliance c. Describe methods of ensuring compliance in the User Domain d. Summarize best practices for User Domain compliance a. Risk Control Strategies b. Managing Risk c. Feasibility Studies and Cost-Benefit Analysis d. Recommended Risk Control Practices e. The OCTAVE Method f. Microsoft Risk Management Approach J. Unit Ten: Compliance within the Workstation Domain a. Examine compliance law requirements and business drivers b. Compare how devices and components found in the workstation Domain contribute to compliance c. Describe methods of ensuring compliance in the workstation Domain d. Summarize best practices for Workstation Domain compliance a. Access Controls ITSY 2459 10

b. Firewalls. c. Intrusion Detection Systems. d. Remote Access Protection. e. Wireless Network Protection. f. Scanning and Analysis Tools. g. Cryptography. K. Unit Eleven: Compliance within the LAN Domain a. Examine compliance law requirements and business drivers b. Compare how devices and components found in the Workstation Domain contribute to compliance c. Describe methods of ensuring compliance within the LAN Domain d. Summarize best practices for Workstation Domain compliance a. Access Controls b. Authentication c. Authorization L Unit Twelve: Compliance within the Lan-to-Wan Domain a. Examine compliance law requirements and business drivers b. Compare how devices and components found in the Lan-to-Wan Domain contribute to compliance c. Describe methods of ensuring compliance in the Lan-to-Wan Domain d. Summarize best practices for Lan-to-Wan Domain compliance 3. Unit Outline: Follow the learning activities a. Staffing the Security Function b. Qualifications and Requirements c. Entering the Information Security Profession ITSY 2459 11

M. Unit Thirteen: Compliance within the WAN Domain a. Examine compliance law requirements and business drivers b. Compare how devices and components found in the WAN Domain contribute to compliance c. Describe methods of ensuring compliance in the WAN Domain d. Summarize best practices for WAN Domain compliance requirements a. Law and Ethics in Information Security b. The Legal Environment. c. Ethical Concepts in Information Security. d. Professional Organizations and their Codes of Ethics. e. Organizational Liability and the Need for Counsel.\ N. Unit Fourteen: Compliance within the Remote Access Domain a. Examine compliance law requirements and business drivers b. Compare how devices and components found in the Remote Access Domain contribute to compliance c. Describe methods of ensuring compliance in the Remote Access Domain d. Summarize best practices for WAN Domain compliance requirements a. Law and Ethics in Information Security b. The Legal Environment. c. Ethical Concepts in Information Security. d. Professional Organizations and their Codes of Ethics. e. Organizational Liability and the Need for Counsel. ITSY 2459 12

O. Unit Fifteen: Compliance within the System/Application Domain a. Examine compliance law requirements and business drivers b. Compare how devices and components found in the Systems/Application Domain contribute to compliance c. Describe methods of ensuring compliance in the System/Application Domain d. Summarize best practices for WAN Domain compliance requirements a. Law and Ethics in Information Security b. The Legal Environment. c. Ethical Concepts in Information Security. d. Professional Organizations and their Codes of Ethics. e. Organizational Liability and the Need for Counsel. P. Unit Sixteen: Ethics, Education, and Certification for IT Auditors a. Understand the required skills and knowledge required for a career in IT auditing b. Understand what makes up a code of conduct and a code of ethics c. Identify codes of Ethics for various professional organizations d. Identify the components that make up a mature code of conduct and why organizations establish them e. Understand the differences between auditing associations and other professional bodies f. Differentiate between certifications available to auditors and IT professionals g. Identify educational opportunities and resources available to IT auditors ITSY 2459 13

a. Law and Ethics in Information Security b. The Legal Environment. c. Ethical Concepts in Information Security. d. Professional Organizations and their Codes of Ethics. e. Organizational Liability and the Need for Counsel. ITSY 2459 14