{"id":213,"date":"2017-05-30T20:22:22","date_gmt":"2017-05-30T20:22:22","guid":{"rendered":"http:\/\/bocchinfuso.net\/?page_id=213"},"modified":"2018-06-27T12:56:16","modified_gmt":"2018-06-27T12:56:16","slug":"mgt5114-introduction-information-security-management","status":"publish","type":"page","link":"http:\/\/bocchinfuso.net\/index.php\/fit-msit-cybersecurity\/mgt5114-introduction-information-security-management\/","title":{"rendered":"MGT5114 &#8211; Introduction to Information Security Management"},"content":{"rendered":"<p>MGT5114 &#8211; Introduction to Information Security Management<br \/>\nCredit Hours: 3<br \/>\nExamines the fundamental principles of computer security as applied to information technology (IT). Covers foundations, psychology, prevention, detection, human factors, technical considerations, management processes and future considerations for the security of information technology.<\/p>\n<p><strong>Grades<\/strong><\/p>\n<p>[google-drive-embed url=&#8221;https:\/\/drive.google.com\/file\/d\/0B1fr2Qqx-moWOFo4Y1ktT05SZ1U\/preview?usp=drivesdk&#8221; title=&#8221;MGT5114 &#8211; Section 2 &#8211; Introduction to Information Security Management.pdf&#8221; icon=&#8221;https:\/\/drive-thirdparty.googleusercontent.com\/16\/type\/application\/pdf&#8221; width=&#8221;100%&#8221; height=&#8221;400&#8243; style=&#8221;embed&#8221;]<\/p>\n<p><strong>Assignments<\/strong><\/p>\n<p>[display-posts category=&#8221;MGT5114&#8243; include_date=&#8221;true&#8221; include_excerpt=&#8221;true&#8221; excerpt_length=&#8221;20&#8243; posts_per_page=&#8221;1000&#8243; order=&#8221;DESC&#8221;]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>MGT5114 &#8211; Introduction to Information Security Management Credit Hours: 3 Examines the fundamental principles of computer security as applied to information technology (IT). Covers foundations, psychology, prevention, detection, human factors, technical considerations, management processes and future considerations for the security of information technology. Grades [google-drive-embed url=&#8221;https:\/\/drive.google.com\/file\/d\/0B1fr2Qqx-moWOFo4Y1ktT05SZ1U\/preview?usp=drivesdk&#8221; title=&#8221;MGT5114 &#8211; Section 2 &#8211; Introduction to Information Security [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":207,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"http:\/\/bocchinfuso.net\/index.php\/wp-json\/wp\/v2\/pages\/213"}],"collection":[{"href":"http:\/\/bocchinfuso.net\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/bocchinfuso.net\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/bocchinfuso.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/bocchinfuso.net\/index.php\/wp-json\/wp\/v2\/comments?post=213"}],"version-history":[{"count":8,"href":"http:\/\/bocchinfuso.net\/index.php\/wp-json\/wp\/v2\/pages\/213\/revisions"}],"predecessor-version":[{"id":547,"href":"http:\/\/bocchinfuso.net\/index.php\/wp-json\/wp\/v2\/pages\/213\/revisions\/547"}],"up":[{"embeddable":true,"href":"http:\/\/bocchinfuso.net\/index.php\/wp-json\/wp\/v2\/pages\/207"}],"wp:attachment":[{"href":"http:\/\/bocchinfuso.net\/index.php\/wp-json\/wp\/v2\/media?parent=213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}