Fill out this form to get free information on courses, admissions and financial aid from your personal advisor.
Please use our International Form if you live outside of the U.S.
Please use our Domestic Form if you live in the U.S.
This sequence represents the minimum time to completion. Time to completion will vary by student, depending on individual progress and credits transferred, if applicable. For a personalized estimate of your time to completion, call an enrollment advisor at 855-646-5286.
|Course Code||ITEC 6115||Course||Computer Networking and Operating Systems||Credits||(3 sem. cr.)|
|Course Code||ITEC 6170||Course||Fundamentals of Information Assurance||Credits||(3 sem. cr.)|
|Course Code||ITEC 6610||Course||Information Assurance and Risk Management||Credits||(3 sem. cr.)|
Within this course, students can learn the concepts of computer operating systems, including the main functions, similarities, and differences. Students can explore a variety of topics, including configuration, file systems, security, administration, interfacing, multitasking, and performance analysis. In addition, they can further their understanding of computers through the study of computer networks by learning key networking concepts, components, and the design of information and communication infrastructure solutions.
The principles of confidentiality, integrity, and availability of data while it is being stored, processed, or communicated guide the policies and practices of information assurance. In this course, students investigate the theory of information security and data protection, study common system risks and vulnerabilities, and follow best practices to protect computer and data assets. These practices address organizational policies, access controls, software and network design, and logging and auditing.
Students in this course learn about the security governance structure that organizations employ to manage risks. Various laws, regulations, and organizational objectives are typically mapped to organizational policies and translated into procedures, practices, standards, and guidelines. Students examine appropriate organizational structures for providing oversight and managing security throughout the enterprise.