Remember that Walden’s Title IV Code is 025042.
From ensuring the privacy of our healthcare information to defending financial institutions from breach, information security professionals are in growing demand.*
In this specialization, you will learn techniques for detecting threats and protecting and defending resources against attacks, the security governance structures organizations use to manage IT-related risks, and legally sound methods for investigating and responding to security breaches. You will also explore ethical considerations and the organizational and human factors that affect cyber security.
This sequence represents the minimum time to completion. Time to completion will vary by student, depending on individual progress and credits transferred, if applicable. For a personalized estimate of your time to completion, call an enrollment advisor at 1-866-492-5336.
*According to the Bureau of Labor Statistics, “Employment of information security analysts is projected to grow 37% from 2012 to 2022, much faster than the average for all occupations.” On the Internet at http://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm (viewed online February 16, 2014). National long-term projections may not reflect local and/or short-term economic or job conditions and do not guarantee actual job growth.
Through a review of modern computer systems and the social and economic issues related to their use, this course introduces the conceptual foundations for designing, developing, and deploying large-scale management information systems. It investigates the role of information technology in an organization—particularly the collection, storage, and distribution of information for operations, planning, and decision making.
Within this course, students can learn the concepts of computer operating systems, including the main functions, similarities, and differences. Students can explore a variety of topics, including configuration, file systems, security, administration, interfacing, multitasking, and performance analysis. In addition, they can further their understanding of computers through the study of computer networks by learning key networking concepts, components, and the design of information and communication infrastructure solutions.
Data is the lifeblood of nearly every business enterprise. Through careful planning and management, the organization can ensure that its critical data remains consistent, correct, secure, and available. This theoretical and practical introduction to relational database systems presents students with accepted practices for data modeling, database design, and implementation in a range of application contexts.
The discipline of software development demands a variety of skills. Students in this course assess the fundamental practices and principles of designing and constructing object-oriented programs. They engage in substantial hands-on practice, reinforcing algorithmic thinking, logical design, precise coding, and careful attention to quality.
The infrastructures of operating systems and networks are the fundamental technologies that support enterprise information systems. Students in this course examine the components of computer systems, their underlying operating systems, and their data communications networks. They critically investigate the services these components provide and draw implications for the large-scale enterprise. Students sharpen communication and critical-thinking skills through weekly discussions on related topics, such as modularity, abstraction, threading, virtual memory, internet protocol, atomicity, and concurrency control.
The principles of confidentiality, integrity, and availability of data while it is being stored, processed, or communicated guide the policies and practices of information assurance. In this course, students investigate the theory of information security and data protection, study common system risks and vulnerabilities, and follow best practices to protect computer and data assets. These practices address organizational policies, access controls, software and network design, and logging and auditing.
This course covers the security governance structure that organizations employ to manage risks. Various laws, regulations, and organizational objectives are typically mapped to organizational policies and translated into procedures, practices, standards, and guidelines. Students examine appropriate organizational structures for providing oversight and managing security throughout the enterprise.
This course provides an in-depth study of techniques for defending IT infrastructure against attack. Students explore tools for configuring and testing system and network security and examine administrative and operational countermeasures. Students discuss a range of active responses to a security breach.
Security professionals need to understand the legal context of their work: Many laws apply to IT crimes, and botched investigations can have serious consequences. This course presents the types of offenses and their consequences under the law. Investigations of breaches must be conducted methodically and with great care. Students examine the various types of cyber offenses and techniques for investigating them as well as ethical uses of information and computing resources in organizations.
Individual, group, and organizational behavior can have an enormous effect on safety and security. Because security professionals often observe that security is more dependent on people than on technology, they must have a clear understanding of human factors. This course examines advanced topics in the practice of information assurance, such as using social psychology to implement security.
Apply Now | Live Chat | Call Us
© 2016 Walden University