INFO70048
Security Policies
Sheridan
 
  I: Administrative Information   II: Course Details   III: Topical Outline(s)  Printable Version
 

Land Acknowledgement

Sheridan College resides on land that has been, and still is, the traditional territory of several Indigenous nations, including the Anishinaabe, the Haudenosaunee Confederacy, the Wendat, and the Mississaugas of the Credit First Nation. We recognize this territory is covered by the Dish with One Spoon treaty and the Two Row Wampum treaty, which emphasize the importance of joint stewardship, peace, and respectful relationships.

As an institution of higher learning Sheridan embraces the critical role that education must play in facilitating real transformational change. We continue our collective efforts to recognize Canada's colonial history and to take steps to meaningful Truth and Reconciliation.


Section I: Administrative Information
  Total hours: 42.0
Credit Value: 3.0
Credit Value Notes: N/A
Effective: Winter 2023
Prerequisites: N/A
Corequisites: N/A
Equivalents: N/A
Pre/Co/Equiv Notes: N/A

Program(s): Cybersecurity - Legal & Ethic
Program Coordinator(s): N/A
Course Leader or Contact: N/A
Version: 20230109_00
Status: Approved (APPR)

Section I Notes: This is a course offered through OntarioLearn. Access to the course materials will be through OntarioLearn.com and you will be sent an email with your login details.

 
 
Section II: Course Details

Detailed Description
Students study key structure elements and terms of written information protection policy and review typical policy contents. Students develop the related standards, procedures, and guidelines for implementing the policy. Students evaluate the tools needed to select, develop, and apply a security program that meets business goals.

Program Context

 
Cybersecurity - Legal & Ethic Program Coordinator(s): N/A
n/a


Course Critical Performance and Learning Outcomes

  Critical Performance:
N/A
 
Learning Outcomes:

To achieve the critical performance, students will have demonstrated the ability to:

  1. Explain business drivers for information security policies and list guidelines and models for writing effective policies
  2. Evaluate business risks and liabilities and explain their relationship to security policies
  3. Discuss the effects of Canadian and International laws and regulations within the context of Security Policy Implementation
  4. List and explain the Seven Domains of IT infrastructure
  5. Identify and explain Information Security Policy Implementation Issues
  6. Design and implement an IT Security Policy Framework
  7. Design and implement Incident Response Team Policies

Evaluation Plan
Students demonstrate their learning in the following ways:

 Evaluation Plan: ONLINE
 Assignments (5 x 14%)70.0%
 Final Exam30.0%
Total100.0%

Provincial Context
The course meets the following Ministry of Colleges and Universities requirements:


 

Prior Learning Assessment and Recognition
PLAR Contact (if course is PLAR-eligible) - Office of the Registrar
Students may apply to receive credit by demonstrating achievement of the course learning outcomes through previous relevant work/life experience, service, self-study and training on the job. This course is eligible for challenge through the following method(s):

  • Other
    Notes:  This course is delivered through OntarioLearn and hosted by Seneca College. Access to this course is through OntarioLearn website.

 
 
Section III: Topical Outline
Some details of this outline may change as a result of circumstances such as weather cancellations, College and student activities, and class timetabling.
Instruction Mode: Online
Professor: N/A
Resource(s):
 TypeDescription
RequiredTextbookSecurity Policies and Implementation Issues with Theory Labs, Robert Johnson; Chuck Easttom, Jones and Bartlett Learning, 3rd, ISBN 9781284200003
RequiredTextbookLaboratory Manual to accompany Security Policies and Implementation Issues, Robert Johnson, Jones and Bartlett Learning, 2nd, ISBN 9781284059168

Applicable student group(s): Online Students
Course Details:
  • Information Technology Security Program Management

  • Business Drivers for Information Security

  • Canadian and International Laws, Industry Standards, and Compliance

  • The Seven Domains of IT Infrastructure

  • Information Security Program Implementation Issues

  • IT Security Frameworks

  • Designing, Implementing and Maintaining IT Security Policies

  • Security Policy Framework Approaches

  • User Domain Policies

  • Information Classification Policies and Risk Management

  • Incident Response Policies

  • IT Security Policies and Awareness Program Implementations

  • Enforcement and Compliance



Sheridan Policies

It is recommended that students read the following policies in relation to course outlines:

  • Academic Integrity
  • Copyright
  • Intellectual Property
  • Respectful Behaviour
  • Accessible Learning
All Sheridan policies can be viewed on the Sheridan policy website.

Appropriate use of generative Artificial Intelligence tools: In alignment with Sheridan's Academic Integrity Policy, students should consult with their professors and/or refer to evaluation instructions regarding the appropriate use, or prohibition, of generative Artificial Intelligence (AI) tools for coursework. Turnitin AI detection software may be used by faculty members to screen assignment submissions or exams for unauthorized use of artificial intelligence.

Course Outline Changes: The information contained in this Course Outline including but not limited to faculty and program information and course description is subject to change without notice. Nothing in this Course Outline should be viewed as a representation, offer and/or warranty. Students are responsible for reading the Important Notice and Disclaimer which applies to Programs and Courses.


[ Printable Version ]

Copyright © Sheridan College. All rights reserved.