i am working as software developer !!! i need 2 pages there are two courses .no apa format. working as an Be able to apply knowledge and theory gained in their courses of study within current workpli am working as software developer !!! i need 2 pages there are two courses .no apa format.  working as an Be able to apply knowledge and theory gained in their courses of study within current workplace or in their future employment.Be able demonstrate the application of theory to workplace in written form.Be able to identify the benefits of incorporating real-world experience into an academic program.subject operational security!!!Course ObjectivesUpon completion of this course, the student will:·         Recognize the activities involved in securing the operations of an enterprise and identify the technologies used to maintain network and resource availability.·         Identify the effects of various hardware and software violations on the system, and recognize how different types of operational and life-cycle assurance are used to secure operations.·         Determine the effects of different attacks on the network and identify the consequences of those effects.·         Recognize how different auditing and monitoring techniques are used to identify and protect against system and network attacks.·         Recognize the need for resource protection, distinguish between e-mail protocols, and identify different types of e-mail vulnerability.·         Identify basic mechanisms and security issues associated with the Web, and recognize different technologies for transferring and sharing files over the Internet.·         Recognize key reconnaissance attack methods and identify different types of administrative management and media storage control.·         Identify the appropriate security measures and controls for creating a more secure workspace.Chapter 1, “Information Systems Security Policy Management”Chapter 2, “Business Drivers for Information Security PoliciesChapter 3, “U.S. Compliance Laws and Information Security Policy Requirements”Chapter 4, “Business Challenges Within the Seven Domains of IT Responsibility”Chapter 5, “Information Security Policy Implementation Issues”Chapter 6, “IT Security Policy Frameworks”Chapter 7, “How to Design, Organize, Implement, and Maintain IT Security Policies”Chapter 8, “IT Security Policy Framework Approaches”Chapter 9, “User Domain Policies”Chapter 10, “IT Infrastructure Security Policies”Chapter 11, “Data Classification and Handling Policies and Risk Management Policies”Chapter 12, “Incident Response Team (IRT) Policies”Chapter 13, “IT Security Policy Implementations”Chapter 14, “IT Security Policy Enforcement”Chapter 15, “IT Policy Compliance and Compliance Technologies”subject physical security!!!Course Objectives/Learner Outcomes:Upon completion of this course, the student will:·         Recognize basic threats to an organization’s physical security and identify the security mechanisms used in securing an enterprise environment.·         Identify the security mechanisms and strategies used to protect the perimeter of a facility.·         Identify the appropriate physical security mechanisms to implement in each scenario.·         Identify the appropriate mechanisms and controls for securing the inside of a building or facility.Select the most appropriate intrusion detection technology for a scenarioIntroduction to Vulnerability AssessmentInfluence of Physical DesignApproaches to Physical SecuritySecurity LightingElectronics Elements: Detailed DiscussionUse of Locks in Physical Crime PreventionChapter 7 & Chapter 8Internal Threats and CountermeasuresChapter 9 & Chapter 10External Threats and CountermeasuresBiometrics in the Criminal Justice System and Society Today.Access Control Systems and Identification Badges,Chain-Link Fences StandardsDoors, Door Frame and Signage.Glass and WindowsThe Legalization of Marijuana and the Security Industry