CIS 502 MENTOR Extraordinary Life/cis502mentor.com CIS 502 MENTOR Extraordinary Life/cis502mentor.com | Page 45

Be typed , double spaced , using Times New Roman font ( size 12 ), with one-inch margins on all sides ; citations and references must follow APA or school-specific format . Check with your professor for any additional instructions .
6 . Include a cover page containing the title of the assignment , the student ’ s name , the professor ’ s name , the course title , and the date . The cover page and the reference page are not included in the required assignment page length .
7 . Include charts or diagrams created in Excel , Visio , MS Project , or one of their equivalents such as Open Project , Dia , and OpenOffice . The completed diagrams / charts must be imported into the Word document before the paper is submitted . 
 The specific course learning outcomes associated with this assignment are
Evaluate an organization ’ s security policies and risk management procedures , and its ability to provide security countermeasures
Describe the details and the importance of application security models and their implementation from a management perspective .
Analyze the methods of managing , controlling , and mitigating security risks and vulnerabilities
Evaluate and explain from a management perspective the industry-standard equipment , tools , and technologies

Be typed , double spaced , using Times New Roman font ( size 12 ), with one-inch margins on all sides ; citations and references must follow APA or school-specific format . Check with your professor for any additional instructions .

6 . Include a cover page containing the title of the assignment , the student ’ s name , the professor ’ s name , the course title , and the date . The cover page and the reference page are not included in the required assignment page length .

7 . Include charts or diagrams created in Excel , Visio , MS Project , or one of their equivalents such as Open Project , Dia , and OpenOffice . The completed diagrams / charts must be imported into the Word document before the paper is submitted . 
 The specific course learning outcomes associated with this assignment are

Evaluate an organization ’ s security policies and risk management procedures , and its ability to provide security countermeasures

Describe the details and the importance of application security models and their implementation from a management perspective .

Analyze the methods of managing , controlling , and mitigating security risks and vulnerabilities

Evaluate and explain from a management perspective the industry-standard equipment , tools , and technologies