After completing the course, the student is able to:
* develop BCM (Business Continuity Management) and SA (Systems Availability) strategy;
* develop organization specific information security policies in organizations;
* conduct Information Security (and risk) Analysis;
* conduct Information Security Audits;
* understand information security standards, regulations, and policies;
* improve employees’ compliance with the information security procedures through training, campaigning and other means;
* describe certifications related to information security (such as ISO27001); as well as
* describe public-key infrastructure (PKI), Digital signature, & Certification authority (CA)