Information Control and Security 1.
5 Credits
Course Description
This demands additional computer security measures to protect the information and relevant
systems. This course prepares the students to meet the new challenges in the world of
increasing threats to computer security by providing them with an understanding of the
various threats and countermeasures.
Learning Objectives
To train and sensitize participants to various challenges and the way to deal with them
in Information Security.
To learn fundamentals concepts related control to IT Security and provide technical
knowledge on topics such as BCP/DR etc.
To widen the Participants horizon about various IT Security solutions and be able to
build a body of knowledge consisting of Standardized Security Structures for various
areas. For instance, setting up a Large Data Centre, providing IT controls, Implemen-
tation of Enterprise Solutions, Mass Multi-location infrastructure rollouts, etc.
To learn how to identify IT Risk and manage risk effectively.
To understand the technical and managerial aspects of managing infrastructure re-
quirements and customer expectations in any project.
To deal with Vendors and Manage the process of outsourcing.
To understand the complexity of modern IT infrastructure and the challenges in man-
aging these.
Unit I Information Security Overview (2.5 Hrs)
Understanding what Information is and why it needs to be protected. Trends in Information
Security. Basics of Information Security
Unit II EBA Information Security Risks (2.5 Hrs)
Understanding Risks in Information Security. Understanding Threats in Information Secur-
ity. Hacking Methodology.
Unit III ERP Understanding different types of Security (2.0 Hrs)
Understanding logical Security. Understanding Physical Security. Understanding IT
Security related process.
Unit IV Understanding Data Security (2.5 Hrs)
Understanding Data Security at Rest along with encryption. Understanding Network
Security. Understanding basics of Firewall and other security devices. Understanding
Cryptography.
Unit V BCP/DR Understanding. (2.5 Hrs)
Understanding BCP and DRP. Understanding BIA (Business Impact Analysis)
Unit VI Best Practices in Information Control and Security (2.0) Hrs.
Understanding Best Practices in IT Security
Unit VII Cyber Security (2.0) Hrs.
[Total 16 Hours]
Recommended Reading
1. IT Security Governance by IT Governance Institute (ITGI)
2. BS:7799/ISO/IEC:17799
3. IBM Business Process Manager Security – Red Books – by J Keith Wood
Jens Engelke
4. Handbook of Database Security: Applications and Trends (Paperback) by
Michael Gertz
5. Network and Communication Security by Mike Wills
6. Business Continuity Management by Brahim Herbane, Dominic Elliott,
Ethné Swartz
7. Information Systems Control and Audit – Ron Weber -- Pearson