ISM 4575: Introduction to Corporate Computer Network and IT Security

What is this 'Introduction to Corporate Computer Network and IT Security' course all about?

This course compares a broad selection of contemporary issues in computer security.  Security activities, methods, methodologies, and procedures including inspection and protection of information assets, detection of and reaction to threats to information assets, and examination of pre- and post-incident procedures, technical and managerial responses, and an overview of the Information Security Planning and Staffing functions are contrasted and discussed.

This course compares a broad selection of contemporary issues in computer security.  Security activities, methods, methodologies, and procedures including inspection and protection of information assets, detection of and reaction to threats to information assets, and examination of pre- and post-incident procedures, technical and managerial responses, and an overview of the Information Security Planning and Staffing functions are contrasted and discussed.


Wayne State Two Factor Duo Enrollment

Take a moment and watch as WSU Director of Information Security, Kevin Hayes, describes the two factor enrollment process.

Enroll in ISM 4575