Вы находитесь на странице: 1из 8

SYLLABUS SEC/480 Version 3

Syllabus
College of Criminal Justice and Security SEC/480 Version 3 Security Capstone Course
Copyright 2011, 2009, 2007 by University of Phoenix. All rights reserved.

Course Description This is the capstone course for Organizational Security and Management undergraduate program. The course provides students with the opportunity to integrate and apply specific program knowledge and learning in a comprehensive manner with regard to the areas of risk and threat assessment, physical, personal, and information system(s) security, emergency and critical incident response, and organizational administration and management. Students will evaluate and demonstrate their professional growth with the development of an effective organizational security plan. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: University policies: You must be logged into the student website to view this document. Instructor policies: This document is posted in the Course Materials forum.

University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. SEC/480 Policies Students are required to achieve a minimum grade of "C -" in this course. Students who fail to earn a minimum grade of "C -" in this course must retake the course to satisfy the degree requirement. Course Materials All electronic materials are available on the student website.

Week One: Risk and Threat Assessment


Details
Objectives Readings Participation Discussion Questions Activities and Preparation 1.1 Assess the strengths, weaknesses, threats, and vulnerabilities of organizational security system(s). Read this weeks Electronic Reserve Readings. Participate in class discussion. Respond to weekly discussion questions. Review the following previous courses and course materials: 7/23/13 7/23/13 2 2

Due
7/23/13

Points

SYLLABUS SEC/480 Version 3

SEC/320: Survey of Security Specializations SEC/340: Criminology and the Criminal Justice System SEC/350: Legal and Regulatory Issues in Security Management SEC/400: Threat and Vulnerability Management SEC/450: Global Security Issues SEC/460: Terrorism Learning Team Instructions Individual Risk and Threat Assessment Create the Learning Team Charter. Begin working on the Learning Team Assignment: Security Response Plan Presentation and Paper, due in Week Three. Select an organization with which you are familiar and obtain faculty approval for your choice. Write a 1000 word paper that includes the following information: The organizational overview 7/23/13 13

Prioritized assessment of the strengths, weaknesses, threats and vulnerabilities of your selected organizations security system(s), including facilities, people, information systems, and other appropriate assets The influence of crime and criminology in your assessment, as well as applicable national and global issues Format your paper consistent with APA guidelines.

Week Two: Physical, Personal, and Information System(s) Security


Details
Objectives Readings Participation Discussion Questions Activities and Preparation 2.1 Design a physical, personal, and information systems security plan for an organization. Read this weeks Electronic Reserve Readings. Participate in class discussion. Respond to weekly discussion questions. Resource: ETS Proficiency Profile (EPP) Assessment Overview and Instructions found on the student website Complete the EPP Assessment. This is due before Week Five. This assessment can be taken at anytime in the duration of the course. 7/30/13 7/30/13 2 2

Due

Points

SYLLABUS SEC/480 Version 3

Review the following previous courses and course materials: Learning Team Instructions SEC/370: The Administration Process SEC/410: Physical Security SEC/420: Personal Security SEC/440: Security of Information Systems and Technology 7/30/13 5

Continue working on the Learning Team Assignment: Security Response Plan Paper and Presentation, due in Week Three. Create outline of paper, there must be evidence of contribution, collaboration and editing by each team member in the learning team forum. Resource: Risk and Threat Assessment from Week One Write a 1000-word paper in which you design a physical, personal, and information systems security plan for your organization from the Risk and Threat Assessment assignment. Provide the rationale and a preliminary budget for your recommendations. Format your paper consistent with APA guidelines.

Individual Security Strategy

7/30/13

10

Week Three: Emergency and Critical Incident Response


Details
Objectives Readings Participation Discussion Questions Activities and Preparation 3.1 Establish a critical incident and emergency response plan for an organization. Read this weeks Electronic Reserve Readings. Participate in class discussion. Respond to weekly discussion questions. Review the following previous courses and course materials: SEC/330: Industrial Safety SEC/350: Legal and Regulatory Issues in Security Management SEC/370: The Administration Process SEC/400: Threat and Vulnerability Management SEC/430: Principles of Investigation SEC/470: Homeland Security and Interagency Response SEC/470: Homeland Security and Interagency Response Review and familiarize yourself with the following Web sites in preparation for this Weeks assignments: 8/6/13 8/6/13 2 2

Due

Points

SYLLABUS SEC/480 Version 3

National Incident Management System (NIMS) o http://www.fema.gov/emergency/nims/

Incident Command System (ICS) o http://www.fema.gov/emergency/nims/IncidentCom mandSystem.shtm

Individual Preparedness, Prevention, Response, and Recovery Plan

Resource: Risk and Threat Assessment from Week One Write a 1000-word paper in which you establish a critical incident and emergency management response plan for your organization, to include preparedness, prevention, response, and recovery to catastrophic events or significant security incidents. Include external relations and communications necessary to execute your plan. Provide the rationale and a preliminary budget for your recommendations. Format your paper consistent with APA guidelines.

8/6/13

10

Learning Team Security Response Plan Paper and Presentation

Write a 1,700- to 2,850-word paper detailing a security response plan based on the scenario and institutional descriptions provided on the student website. The plan should include threat assessment, staffing requirements, communications, evacuation plans, financial considerations, equipment, chain of command, and allocation of resources. Your faculty member will assign each team one of the following institutions for analysis and plan formulation: Hospital School Banking System Industrial Manufacturing Complex Electrical, Water/Sewer, Gas Services Private Correctional Facility

8/6/13

10

Format your paper consistent with APA guidelines. Prepare a 10- to 15-slide Microsoft PowerPoint presentation to accompany the paper.0

Week Four: Organizational Behavior and Management


Details
Objectives 4.1 Apply the concepts of organizational behavior and management in designing an organizational security plan.

Due

Points

SYLLABUS SEC/480 Version 3

Readings Participation Discussion Questions Activities and Preparation

Read this weeks Electronic Reserve Readings. Participate in class discussion. Respond to weekly discussion questions. Review the following previous courses and course materials: SEC/310: Introduction to Organizational Security and Management SEC/350: Legal and Regulatory Issues in Security Management SEC/360: Interpersonal Communications SEC/370: The Administration Process SEC/390: Organizational Behavior and Management Resource: Risk and Threat Assessment from Week One Review the Risk and Threat Assessment from Week One. Write a 1000-word paper in which you apply the concepts of organizational behavior and management in designing an organizational security plan. Your design should be consistent with organizational behavior and management theory and practices and include: organizational mission, vision, goals, philosophy, and code of ethics; organizational structure; staffing needs; the roles and responsibilities of personnel; and any applicable discussion of leadership, processes, communication, and organizational behavior. Provide the rationale and include a preliminary budget for your recommendations Format your paper consistent with APA guidelines. 8/13/13 10 8/13/13 8/13/13 2 2

Individual Organizational Behavior and Management Design

Individual EPP Assessment

Resources: EPP Assessment Overview and Instructions found on the student website Complete the EPP Assessment. This is due before Week Five. This assessment can be taken at anytime in the duration of the course.

8/13/13

Learning Team Instructions

Discuss the principles behind the design of their organizational structure. Discuss the concepts of organizational behavior and management and how they apply to the design of an organizational security plan. Include underlying factors such as, organizational mission, vision, goals, philosophy, code of ethics, organizational structure, etc. Create summary.

8/13/13

SYLLABUS SEC/480 Version 3

Week Five: Organizational Security Plan Integration


Details
Objectives Readings Participation Discussion Questions Activities and Preparation 5.1 Synthesize all components for an organizational security plan. Read this weeks Electronic Reserve Readings. Participate in class discussion. Respond to weekly discussion questions. Review the following previous courses and course materials: SEC/310: Introduction to Organizational Security and Management SEC/320: Survey of Security Specializations SEC/330: Industrial Safety SEC/340: Criminology and the Criminal Justice System SEC/350: Legal and Regulatory Issues in Security Management SEC/360: Interpersonal Communications SEC/370: The Administration Process SEC/390: Organizational Behavior and Management SEC/400: Threat and Vulnerability Management SEC/410: Physical Security SEC/420: Personal Security SEC/430: Principles of Investigation SEC/440: Security of Information Systems and Technology SEC/450: Global Security Issues SEC/460: Terrorism SEC/470: Homeland Security and Interagency Response Resources: All assessments from previous weeks Compile all assessments from previous weeks and synthesize them into a 5,000- to 8,000-word comprehensive organizational security plan. Include an introduction and conclusion, as well as the final budget. The following content areas are required: Introduction: Vision and mission; may include purpose, philosophy, goals, objectives, code of ethics, and other management-related communications Risk assessment Security strategy Preparedness, prevention, response, and recovery 8/20/13 15 8/20/13 8/20/13 2 2

Due

Points

Individual Comprehensive Security Plan

SYLLABUS SEC/480 Version 3

Organizational behavior and management Finalized budget Conclusion

Format your paper consistent with APA guidelines. Prepare a 15- to 20- slide Microsoft PowerPoint presentation outlining your complete organizational security plan. Learning Team Instructions Discuss Discuss the components of an effective organizational security plan. Discuss the different components that constitute the makeup of an effective organizational security plan. Compare and contrast the importance of each security element of an effective security plan: - Introduction: Vision and Mission; purpose, philosophy, goals, objectives, etc. - Risk Assessment - Security Strategy - Preparedness, prevention, response and recovery - Organizational Behavior and Management - Budget Create summary. Optional Discussion Questions Week One Discussion Questions What are the different types of risks? What are the concepts of risk and mitigation as they apply to threat and risk management of an organization? How are the various techniques for eliminating, reducing, and mitigating each of the risk types implemented through an organizational security plan? Explain. What different types of crime are classified as a threat or risk that organizations need to be aware of when developing a security plan? How does the influence crime and criminology impact on organizations management techniques of risks and threats? What recommendations would you make to combat the risks and threats presented by crime and criminology as it applies to an organizations security plan? Explain. Week Two Discussion Questions What measures should be taken in the initial design of a security plan to ensure personal security within an organization? What are the three lines of physical defense that organizations need to consider? What is the significance of concentric layers of security? How does this apply to the security of the organization? Why is it important to understand security as a process? How do these apply to the overall security strategy of an organizational security plan? 8/20/13 3

SYLLABUS SEC/480 Version 3

What is the purpose of including information systems security as part of an organizational security plan? What actions need to be taken to ensure that proper security measures are included in the design of the security plan as it applies to information systems? What budgetary considerations need to be taken into account? What recommendations would you make to combat the risks and threats presented by information system and network breaches as it applies to an organizations security plan? Explain. Week Three Discussion Questions What impactboth negative and positivedid September 11th have on the private sector as it applies to preparedness, prevention, response, and recovery to catastrophes or security incidents? How did September 11th change organizational attitudes toward preparedness? How did September 11th change organizational attitudes toward prevention? What is meant by business continuity and why should businesses have a continuity of operations plan? What is the difference between homeland security events and natural disaster events? What is all hazards management? What is the role of external relations (all parties involved) and communications in response to a critical incident or emergency situation? How does the appropriate level of communication impact the overall effectiveness of response? What recommendations would you make to ensure interagency cooperation and effective communication as it applies to an organizations security plan in response to a critical incident or emergency situation? Explain. Week Four Discussion Questions What is management? What are the broad categories of managerial roles as they are applied in a security setting? Which is most important and why? What are the differences between leadership and management as they are applied to security organizations? How does an organizations mission, vision, goals, philosophy, managerial roles and leadership impact the design, development, and implementation of an organizational security plan? Explain. What are the most significant principles in organizational security plan design as it relates to organizational behavior? What personal and organizational characteristics need to be addressed and taken into consideration in order for the security plan to be effective? Compare and contrast the various elements of organizational behavior that lead to the successful design, development, and implementation of a successful organizational security plan. Week Five Discussion Questions How can experienced security professionals prepare themselves for challenges and opportunities that they have never encountered before? Why is it important for a security professional to know the particular target environment to which they are assigned extremely well? Do you think it is possible that experience with one type of environment can actually be a drawback for security professionals approaching another type of environment for the first time? Explain. Copyright
University of Phoenix is a registered trademark of Apollo Group, Inc. in the United States and/or other countries. Microsoft, Windows, and Windows NT are registered trademarks of Microsoft Corporation in the United States and/or other countries. All other company and product names are trademarks or registered trademarks of their respective companies. Use of these marks is not intended to imply endorsement, sponsorship, or affiliation. Edited in accordance with University of Phoenix editorial standards and practices.

Вам также может понравиться