Prepare to confidently address the IT challenges of today—and tomorrow. Build next-level skills and forge a rewarding future in an ever-changing field.
From ensuring the privacy of our healthcare information to defending financial institutions from breach, information security professionals are in growing demand.*
In this specialization, you will learn techniques for detecting threats and protecting and defending resources against attacks, the security governance structures organizations use to manage IT-related risks, and legally sound methods for investigating and responding to security breaches. You will also explore ethical considerations and the organizational and human factors that affect cyber security.
This sequence represents the minimum time to completion. Time to completion will vary by student, depending on individual progress and credits transferred, if applicable. For a personalized estimate of your time to completion, call an enrollment advisor at 855-646-5286.
*According to the Bureau of Labor Statistics, “Employment of information security analysts is projected to grow 37% from 2012 to 2022, much faster than the average for all occupations.” On the Internet at http://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm (viewed online February 16, 2014). National long-term projections may not reflect local and/or short-term economic or job conditions and do not guarantee actual job growth.
|Course Code||ITEC 6111||Course||Information Technology in the Organization||Credits||(3 sem. cr.)|
|Course Code||ITEC 6115||Course||Computer Networking and Operating Systems||Credits||(3 sem. cr.)|
|Course Code||ITEC 6145||Course||Enterprise Database Design||Credits||(3 sem. cr.)|
|Course Code||ITEC 6030||Course||Principles of Programming||Credits||(3 sem. cr.)|
Through a review of modern computer systems and the social and economic issues related to their use, students in this course are introduced to the conceptual foundations for designing, developing, and deploying large-scale management information systems. Students investigate the role of information technology in an organization—particularly the collection, storage, and distribution of information for operations, planning, and decision making.
Within this course, students can learn the concepts of computer operating systems, including the main functions, similarities, and differences. Students can explore a variety of topics, including configuration, file systems, security, administration, interfacing, multitasking, and performance analysis. In addition, they can further their understanding of computers through the study of computer networks by learning key networking concepts, components, and the design of information and communication infrastructure solutions.
In this course, students discuss the design, implementation, and operation of databases using a principal relational database management system (DBMS). Many fundamental topics are covered in this course including: data modeling using entity-relationship diagrams; data storage, manipulation, and queries using structured query language (SQL); functional dependencies, normalization concepts, data warehouse architectures, data warehouse modeling, and data analytics.
The discipline of software development demands a variety of skills. Students in this course assess the fundamental practices and principles of designing and constructing object-oriented programs. They engage in substantial hands-on practice, reinforcing algorithmic thinking, logical design, precise coding, and careful attention to quality.
|Course Code||ITEC 6120||Course||Operating System and Network Architecture||Credits||(3 sem. cr.)|
|Course Code||ITEC 6170||Course||Fundamentals of Information Assurance||Credits||(3 sem. cr.)|
|Course Code||ITEC 6610||Course||Information Assurance and Risk Management||Credits||(3 sem. cr.)|
|Course Code||ITEC 6620||Course||Information and Systems Security||Credits||(3 sem. cr.)|
|Course Code||ITEC 6630||Course||Computer Law, Crime, and Investigation||Credits||(3 sem. cr.)|
|Course Code||ITEC 6640||Course||Topics in High-Assurance Computing||Credits||(3 sem. cr.)|
The infrastructures of operating systems and networks are the fundamental technologies that support enterprise information systems. Students in this course examine the components of computer systems, their underlying operating systems, and their data communications networks. They critically investigate the services these components provide and draw implications for the large-scale enterprise. Students sharpen communication and critical-thinking skills through weekly discussions on related topics, such as modularity, abstraction, threading, virtual memory, Internet protocol, atomicity, and concurrency control.
The principles of confidentiality, integrity, and availability of data while it is being stored, processed, or communicated guide the policies and practices of information assurance. In this course, students investigate the theory of information security and data protection, study common system risks and vulnerabilities, and follow best practices to protect computer and data assets. These practices address organizational policies, access controls, software and network design, and logging and auditing.
Students in this course learn about the security governance structure that organizations employ to manage risks. Various laws, regulations, and organizational objectives are typically mapped to organizational policies and translated into procedures, practices, standards, and guidelines. Students examine appropriate organizational structures for providing oversight and managing security throughout the enterprise.
Participants in this course study in-depth techniques for defending IT infrastructure against attack. Students explore tools for configuring and testing system and network security, and they examine administrative and operational countermeasures. Students discuss a range of active responses to a security breach.
Security professionals need to understand the legal context of their work: Many laws apply to IT crimes, and botched investigations can have serious consequences. Students learn about the types of offenses and their consequences under the law. Investigations of breaches must be conducted methodically and with great care. Students examine the various types of cyber offenses and techniques for investigating them, as well as ethical uses of information and computing resources in organizations.
Individual, group, and organizational behavior can have an enormous effect on safety and security. Because security professionals often observe that security is more dependent on people than on technology, they must have a clear understanding of human factors. Students examine advanced topics in the practice of information assurance, such as using social psychology to implement security.