Our dedication to Racial Equality and Social Justice (RESJ) spans decades. Learn more about our RESJ Initiative
Information Security & Risk Management Concentration
-
Credits:
15
Concentration Description
The undergraduate concentration in Information Security and Risk Management is for students who want a basic understanding of how to identify, analyze and evaluate cyber security risks and threats to complement their major in Cybersecurity. The course work provides a practical framework for understanding how to design and develop IT risk and cyber security programs using industry frameworks and methodologies.
The concentration is accepted in any Cambridge College bachelor’s degree, as open electives.
Curriculum
This course prepares students to develop governance frameworks for information security management. Students learn how to design and develop IT risk and cyber security programs using industry frameworks and methodologies. Students in this course will learn the various governance, risk and compliance frameworks used in highly regulated industries such as healthcare, finance, energy, and utilities.
This course immerses learners in the legal and ethical aspects governing today's digital world. The course will cover domestic and international cyber law, digital rights and copyright issues, social network and virtual world legality, and the laws and regulations governing cloud networks and Internet advertising.
This course examines the fundamental principles IT auditors need to effectively assess IT Assets. Audit and compliance are the essential tenets of risk management. Learners will cover audit controls, the audit process, auditing techniques, auditing frameworks, standards and regulations, business continuity, and disaster recovery.
The Protecting and Handling Data course is designed to provide students with a data-oriented approach for data handling, data security and analytics. Data is valuable, both to organizations and malicious actors. The massive amount of personal, financial and intellectual data enterprises collect makes a tempting (and lucrative) target for attackers. This course will help students learn where systems may be vulnerable to a data privacy breach.
This class examines the process of how IT auditors perform and respond to audits. IT auditing and cybersecurity go hand-in-hand. In-depth financial details and other highly sensitive data about employees, clients, and customers are common within your IT infrastructure. Students will learn the approaches to evaluating and addressing technology risk from the perspective of an auditor. This course will take students through the practice of risk management –identification, quantification, response, monitoring—and business continuity for an organization.