You are on page 1of 8

click to buy

https://www.grades4u.com/cmgt-582-entire-course-p2499.php

CMGT 582 ENTIRE COURSE

WEEK 1
CMGT 582 Week 1 Individual Assignment Information Security

Assignment Preparation: Activities include watching the SkillSoft videos, completing the
SkillSoft course, independent student reading, and research.

Watch the "Fostering Collective Responsibility for IT Risk" video.

Watch the "Balancing Security with User Convenience" video.

Complete "Introduction to Information Security Governance" topic of the Skillsoft course


"CISM 2012: Information Security Governance (Part 1)."

Assignment: Situation: You have just joined an organization that depends on the use of the web
to perform most of its major tasks. You have noticed that information security is mostly ignored by
those performing the work tasks and it is not a priority with management or executive leadership.

Write a 1- to 2-page memo to the Chief Executive Officer (CEO) that is designed to increase the
priority of information security. Include a convincing argument of why the survival of the
organization may depend on information security. Include these topics:

Confidentiality, integrity, and availability

Authenticity

Accountability

Threats from malicious software

Security challenges of cloud computing

Cyberterrorism and information warfare


WEEK 2

CMGT 582 Week 2 Individual Assignment Organizational Information Security

Assignment Preparation: Activities include watching the SkillSoft videos, completing the
SkillSoft course, independent student reading, and research.

Watch the "Technology and the Impact on Business and the Environment" Skillsoft video.

Complete "Defining law and ethics" point of topic "The Relationship Between Law and
Ethics" of the Skillsoft course "Business Law and Ethics."

Complete "Recognize the Effect of Laws and Regulations on Audit Planning," point of
topic "Management of an IS Audit Function," of the lesson "Information Systems and the IS
Audit Function" of the Skillsoft course "CISA Domain: The Process of Auditing Information
Systems - Part 1."

Write a 3- to 4-page analysis of ethical considerations for maintaining confidentiality and


customer data.

Address the following issues in your analysis:

Define ethics.

Apply ethics to information systems.

Discuss the constituent parts IT/IS professional ethics.

Connect or relate the discussed constituent parts into an overall structure that may relate
to an IT/IS code of conduct or ethics.

Discuss the rules produced by the Ad Hoc Committee on Responsible Computing.

Describe the privacy regulations or laws related to the identified ethical issues.
WEEK 3

CMGT 582 Week 3 Learning Team Assignment Riordan Manufacturing Security Audit

Review reading assignments involving the risk formula, information security risk assessment,
security controls, and risk mitigation strategies.

Continue working on your Microsoft PowerPoint slides for the presentation.

Add 2- to 4-pages of information to your previously-submitted outline, considering any


assessment input, related to any or all of the following:

Application of the formula for risk

Application of components of an information risk assessment

Description of security controls or safeguards that are related to your risk assessment.

Planned or identified best practice mitigation strategies.

Submit the draft for assessment. You will have the opportunity to redraft this information in
following weeks to improve the content for the Week 6 requirement.

CMGT 582 Week 3 Individual Assignment EnPointe Technologies Risk Assessment

Assignment Preparation: Activities include watching the SkillSoft videos, completing the
SkillSoft course, independent student reading, and research.

Watch the "QuickTalks: David Bach: Nonmarket Strategy: The Next Frontier of
Competitive Advantage" Skillsoft video.

Complete the "Intrusion Prevention Technologies" topic of the lesson "Understanding IPS
Fundamentals" in the Skillsoft course "Cisco IINS 2.0: Implementing IPS."

Complete slides 1 to 3 of the "Risk Response Strategies" topic of the Skillsoft lesson
"Plan Risk Responses" of the course "Risk response and Control (PMBOK Guide Fifth
Edition)."
Prepare a 3- to 5-page risk assessment of your organization or an organization with which you
are familiar.

Include how the formula for risk can be applied to the organization.

Describe how risk assessment is related to security controls or safeguards.

Include the following in your assessment that is part of Figure 14.3, Risk Assessment
Methodology, of the Stallings and Brown textbook Computer Security (p. 478):

System characterization

Threat identification

Vulnerability identification

Control analysis

Likelihood determination

Impact analysis

Risk determination

WEEK 4

CMGT 582 Week 4 Learning Team Assignment Security Audit Part III
Review reading assignments involving security technologies and methodologies to include
access control technologies.

Continue working on your Microsoft PowerPoint slides for the presentation.

Add 2- to 4-pages of information to your previously submitted updated outline, considering any
assessment input, related to any or all of the following that you plan to include in your security
audit:
Application of network security technologies and methodologies

Evaluation of security technologies and methodologies

Description of access control technologies

Submit the draft for assessment. You will have the opportunity to redraft this information in
following weeks to improve the content for the Week 6 requirement.

CMGT 582 Week 4 Individual Assignment Technologies & Methodologies Evaluation

Assignment Preparation: Activities include watching the SkillSoft videos, completing the
SkillSoft course, independent student reading, and research.

Watch the "Creating an Actionable Risk Management Strategy" SkillSoft video.

Complete the "Network Security Appliances and Methods" topic of the Skillsoft course
"CompTIA Network+ 2012: Network Security Part 3."

Complete the "Firewalls, IDS and Network Security Solutions" topic of the Skillsoftcourse
"CompTIA Network+ 2012: Network Security Part 3."

Consider information management risks to include cybercrime and cyber-related crimes.

Write a 3- to 5-page evaluation of security technologies and methodologies used to mitigate


information management risks. An evaluation is generally based on specific criteria and
standards.

Include at least the following:

Firewalls

Intrusion prevention systems

Intrusion detection systems

Access control

Cryptographic tools and processes


WEEK 5

CMGT 582 Week 5 Learning Team Assignment Learning Team: Security Audit Part IV
Review reading assignments involving security policies, planning, and implementation to include
multilevel security processes.

Continue working on your Microsoft PowerPoint slides for the presentation.

Add 2- to 4-pages of information to your previously submitted updated outline, considering any
assessment input, related to any or all of the following that you plan to include in your security
audit:

Security policies

Security planning

Evaluation of security planning

Multilevel or defense security elements of security planning

Submit the draft for assessment. You will have the opportunity to redraft this information in the
following week to improve the content for the Week 6 requirement.

CMGT 582 Week 5 Individual Assignment POLICY IMPLEMENTATION

Assignment Preparation: Activities include watching the completing the SkillSoft course,
independent student reading, and research.

Complete the "Security Policy Documents and Life Cycle" topic of the Skillsoft course
"SSCP Domain: Security Operations and Administration Part 1."

Complete the "Risk Management and Regulatory Compliance" topic of the "Security
Policies and Life-Cycle Approach" lesson of the Skillsoft course "Cisco IINS 2.0: Security
and Strategies."
Consider security planning policies, procedures, and models to include multilevel and
cryptographic processes.

Write a 4- to 6-page discussion of how policies are used to implement a security plan.

Include the following:

Description of security planning policies

Description of how human resources security is included in security planning

Description of how cryptographic tools may be included in security planning

Application of security planning policies to manage security

Evaluation of how specific policies are used to implement security plans

WEEK 6

CMGT 582 Week 6 Learning Team Security Audit Presentation

Complete and submit the security audit of the organization.


CMGT 582 Week 6 Learning Team Security Audit Presentation

Finalize and submit the team's Microsoft PowerPoint presentation.

CMGT 582 Week 6 Individual Assignment SYSTEMS DEVELOPMENT LIFE CYCLE (SDLC)

Assignment Preparation: Activities include watching the completing the SkillSoft course,
independent student reading, and research.
Complete the "Information Risk Management Overview" topic of the "Information Risk
Management Program" lesson of the Skillsoft course "CISM 2012: Information Risk
Management and Compliance (Part 1)."

Completethe "Auditing and Testing IS Security" topic of the "Auditing Internal and
External Security" lesson of the Skillsoft course "CISA Domain: Protection of Information
Assets - Part 2."

Consider the systems development life cycle (SDLC), security systems life cycle, and information
systems security certification and accreditation.

Write a 3- to 5-page evaluation of the use of the security life cycle. Include the following:

All six phases

Review of steps unique to the security life cycle, not in common with SDLC

Applicable criteria and standards, such as certification and accreditation, used in your
evaluation

click to buy

https://www.grades4u.com/cmgt-582-entire-course-p2499.php

You might also like