1 / 26100%
CIS512
Preview: CIS512 Advanced Computer Architecture :
Course Guide
Prerequisites
Course Description
Instructional Materials
This course examines the structure and operation of digital computers in the context of providing
data and infrastructure security. Emphasis will be placed on strategies to select, deploy, integrate
and administer modern computing environments to support the organization's overall security
posture. Topics include hardware components of modern computing environments and their
deployment in compliance with applicable cybersecurity laws and policies.
Required Resources
William Stallings. 2019. Effective Cybersecurity: Guide to Using Best A Practices and
Standards. CIS512 Pearson Education 1st edition textbook available at
https://www.strayerbookstore.com
Miloslava Plachkinova. 2018. Teaching Case: Security Breach at
Target. http://libdatab.strayer.edu/login?url=https://search.ebscohost.com/login.aspx?
direct=true&db=eric&AN=EJ1173595&site=eds-live&scope=site
National Institute of Standards and Technology. No date. NIST | National Institute of Standards and
Technology. https://www.nist.gov/
Iqbal Ahmed. December 2019. A Brief Review: Security Issues in Cloud Computing and Their
Solutions. http://libdatab.strayer.edu/login?url=https://search.ebscohost.com/login.aspx?
2020 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary
information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed
written permission of Strayer University.
NOTE: The links in this document do not function. Please refer to your course to
view/download linked content.
Course Learning Outcomes
direct=true&db=a9h&AN=138666095&site=eds-live&scope=site
Kumar Patel. September 2019. Cloud Computing Security Risks: Identification and
Assessment. http://libdatab.strayer.edu/login?url=https://search.ebscohost.com/login.aspx?
direct=true&db=bth&AN=139240729&site=eds-live&scope=site
Vijaya Pise. March 2019. Cloud Computing - Recent Trends in Information Technology.
http://libdatab.strayer.edu/login?url=https://search.ebscohost.com/login.aspx?
direct=true&db=bth&AN=136460620&site=eds-live&scope=site
Supplemental Resources
Janine S. Hiller. March 2017. Privacy in Crises: The NIST Privacy Framework.
http://libdatab.strayer.edu/login?url=https://search.ebscohost.com/login.aspx?
direct=true&db=a9h&AN=121368202&site=eds-live&scope=site
Shen Lei. December 2014. The NIST Cybersecurity Framework: Overview and Potential Impacts.
http://libdatab.strayer.edu/login?url=https://search.ebscohost.com/login.aspx?
direct=true&db=bth&AN=99971017&site=eds-live&scope=site
Mark-David McLaughlin. September 2018. Challenges and Best Practices in Information Security
Management. http://libdatab.strayer.edu/login?url=https://search.ebscohost.com/login.aspx?
direct=true&db=bth&AN=131666795&site=eds-live&scope=site
National Institute of Standards and Technology. No date. Cybersecurity.
https://www.nist.gov/topics/cybersecurity
Walter Primoff. December 2017. The Equifax Data Breach: What CPAs and Firms Need to Know
Now. http://libdatab.strayer.edu/login?url=https://search.ebscohost.com/login.aspx?
direct=true&db=bth&AN=126654696&site=eds-live&scope=site
Jordi Pujol. February 17, 2020. Is This the End of Privacy? Snowden and the Power of
Conscience. https://doi.org/10.1080/23753234.2020.1713017
Tarzie. March 2017. Edward Snowden, Frenemy of the State . http://libdatab.strayer.edu/login?
url=https://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=121624989&site=eds-
live&scope=site
2020 Strayer University. Rights Reserved. This document contains Strayer University Confidential and Proprietary All
information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed
Students also viewed