Online training
Enroll today!
Enroll today!
Course Description
This course enables you to understand how to effectively define an information assurance analysis and an information risk management and analysis strategy. You will gain knowledge regarding policy compliance strategies as well as how to utilize AWS cloud intrusion detection and prevention. Additionally, you will gain the opportunity to understand enterprise architecture as it relates to IT strategies, including team management, change management, and vendor management. Finally, you will learn how to create clearly defined IT strategy policies, including how to set an agenda, define policy formulation, methods of decision making, policy implementation; how to effectively monitor and evaluate policy framework. This includes adopting usage of policy templates to define an acceptable use policy, access control policy, change management policy, information security policy, remote access policy, email communication and security policy, email security policy, and data management policy, disaster recovery policy, and understand policy management tools.
This is an 8-week online course that can be completed at your own pace. Assignments must be submitted for grading as required and quizzes must be passed with a 70% or higher score. You are not allowed to retake quizzes. All quiz scores are recorded automatically.
You are required to earn a C grade or higher to pass this course. All course procedural activities and assessments are graded in alignment with the grading rubric; there is a total of 1000 points to be earned to get an A. Successful completion of this course and all assignments are required to earn full points. Upon completion, you will receive a Certificate of Completion from DOC Technology Systems LLC.
Course Learning Outcomes
1. Interpret information assurance to learn why it is important for business as well as how to improve risk management strategies for your organization.
2. Gain the ability to assess known information risk and utilize a risk mitigation security strategy.
3. Acquire the knowledge to assess privacy issues relating to your organization and learn how to develop and manage compliance risk control and mitigation profile strategies.
4. Illustrate intrusion detection and prevention for AWS cloud.
5. Assess team management, disruptive technology, change management, and IT value creation.
6. Define IT policy that aligns with NIST SP 800 recommendations.
7. Modify policy effectively as well as learn how to track and monitor policy compliance.
Course Weekly Topics
Week 1/Information Assurance Analysis
Week 2/ Information Risk Management and Analysis Strategies
Week 3/ Policy Compliance Strategies
Week 4/ AWS Cloud Intrusion Detection and Prevention
Week 5/ Mid-term
Week 6/ Enterprise Architecture IT Strategies
Week 7/IT Strategy Policies-part 1
Week 8/ IT Strategy Policies-part 2
Weekly Assignment Schedule
Week 1
You will research Chapter 1 and external resources to gain knowledge on the significance of information assurance to effectively develop an analysis. This includes understanding the value of an information assurance primer. You will develop an Information Usage Profile and define the risk factors that correlate with their organization in a 4–5-page paper. You will also complete a multiple-choice quiz on Chapter 1.
Week 2
You will read Chapter 2 and research external resources to begin developing an information risk management and analysis strategy for their organization. You will also develop four tables-i.e., risk factors risk mitigation strategies security control, information sensitivity risk profile, and security profile risk to represent risk management for their organization in a 5–6-page paper. You will also complete a multiple-choice quiz on Chapter 2.
Week 3
You will read Chapter 3 and review external resources to help them apply policy compliance strategies to their organization. This includes gaining knowledge about privacy compliance risks profile and compliance controls profile creation. You will also gain understanding of how to define privacy compliance risk mitigation strategies as they relate to their organization. Furthermore, you will develop a privacy compliance risk profile and privacy compliance control profile for their organization in a 4–5-page paper. You will also complete a multiple-choice quiz on Chapter 3.
Week 4
You will read Chapter 4 and external resources to help them understand why AWS cloud intrusion detection and prevention is reliable for their organization’s cloud storage. You will also write a 4–5-page paper outlining the advantages of implementing cloud security laws and policy with their organization. Your paper must detail information regarding H.R. 4943, HIPAA, Payment Card Industry Data Security Standards, and the Gramm-Leach Bliley Act; NIST SP 800-37, 800-210, and 800-94. Learners will also complete a multiple-choice quiz on Chapter 4.
Week 5
You will complete a mid-term multiple choice quiz on Chapters 1,2,3, and 4.
Week 6
You will read Chapter 5 and external resources to comprehend enterprise architecture IT strategies. You will also develop a 5-page paper conveying their response to Table 5-1 regarding Business and IT Solution Overview as it relates to their organization. You will also share details about their proposed IT guidelines and IT principles for their organization. And you will also complete a multiple-choice quiz on Chapter 5.
Week 7
You will read Chapter 6 pages 97-118 and external resources to comprehend IT strategy policy development and implementation. You will create a strategic plan that aligns with Table 6-1 for their organization as well as convey a policy life cycle for their organization that aligns with the life cycle on pages 103-107. This paper must be 4-5 pages. You will also complete a multiple-choice quiz on Chapter 6 pages 97-118.
Week 8
You will read Chapter 6 pages 119-129 and external resources to comprehend how to develop effective policies for their organization. You will adopt five of the policies in Chapter 6 and write them out as they relate to their organization in a 6-8 page paper. You will also complete a multiple-choice quiz on Chapter 6 pages 119-129.
Take the next step to improve information assurance in your workplace and enroll today.
This 8-week online training course helps you prepare to effectively thwart vulnerabilities and win the war against unauthorized attackers.
$3500.00 U.S. dollars per person.
$3000.00 U.S. dollars per person of groups of 3 or more.
Enroll today…
Please allow 24 hours after completing the enrollment form for an instructor to reach out to you to help you can take advantage of this eLearning opportunity.

