Overview Back to Top
Need answer to this question?
Order an original paper Now!
We’re giving you a 15% discount on your first Order.
Discount Code: SKILNEW15
Use the above discount code during checkout
During this course, you will engage in a case project wherein you will select an organization to review throughout the course. This case project is important because it allows you to apply your knowledge and learning from each module of this course to a real-world example. You will have a case study assignment in each module starting in Module 2. In Module 8, you will summarize all of your work in a final presentation.
Important Notes Back to Top
The organization you choose for this case study should not be used in any of the weekly discussions starting in Module 2.
In each module, you will write a 500 word paper focused on the topic in that module using proper APA formatting.
If you have any issues working on any of the case study assignments, please reach out to your instructor.
Schedule Back to Top
The following is a development schedule that indicates what you will focus on in each module to prepare for the project.
| Module | Deliverable | Type |
2 | Topic Selection and Organizational NeedsReport | Document |
| 3 | Information Security Management Report | Document |
| 4 | Risks Report | Document |
5 | Incident Response and Contingency PlanningReport | Document |
| 6 | Legal, Ethical, and Professional Issues Report | Document |
| 7 | Security Technology Report | Document |
| 8 | Final Presentation | Presentation |
Rubric Back to Top
You can view the rubric for the final presentation submission here: