This asynchronous course provides the foundation for understanding the key issues associated with protecting information assets, determining the levels of protection and response to security incidents, and designing a consistent, reasonable information security system, with appropriate intrusion detection and reporting features. It is a prerequisite for all subsequent cybersecurity courses in the Disaster and Emergency Management graduate program.

Students are exposed to the spectrum of security activities, methods, methodologies, and procedures. Coverage includes inspection and protection of information assets, detection of and reaction to threats to information assets, and examination of pre- and post-incident procedures, technical and managerial responses, and an overview of the information security planning and staffing functions. Reviews of past hacking, criminal, and terrorist (state and non-state) attacks on information networks are a component of this course.