Undergraduate Certificate in Information Security Planning

 

DEGREE AT A GLANCE:

    • Number of Credits
    • 18
    • Cost Per Credit
    • $ 250
    • Total Tuition*
    • $ 4,500
  • *(Before Transfer Credit)
 

Program Description

This certificate assesses the principles of information systems attack and defense and applies that knowledge to protect the information assets of an organization. Any undergraduate student, regardless of major, may enroll in the Certificate in Information Security Planning. This Certificate prepares the adult learner to seek entry-level career positions such as: Information Assurance Analyst, Information Assurance Manager, Security Policy Analyst, Security Planner, and Security Auditor. Program graduates will know how to design secure networks, develop security policies, use cryptography, and perform business continuity planning.

Read More
 
 
 

Program Objectives

  • Assess the laws (national and federal), policies (including the Sarbanes-Oxley Act), issues (social, psychological, legal, and management), risks, and controls related to information assurance and network security.
  • Appraise the principles and concepts behind computer network defense (CND) methodology, robust codes, cryptography, authentication, authorization, non-repudiation, and commercially available security packages (PKI, PGP, Kerberos, SSL, VPN).
  • Examine the processes, roles, and responsibilities of management and security professionals in risk assessment, risk mitigation, security validation, policy enforcement, and personnel indoctrination.
  • Assess the key components of the Physical Security Policy, Internet Security Policy, E-Mail Security Policy, Encryption Security Policy, Software Development Security Policy, Authentication Security Policy, Network Security Policy, Acceptable Use Policy, and the policy that addresses viruses, worms, and Trojan horses.
  • Assess the engineering discipline, process, techniques, tools, and technologies used by hackers to gain unauthorized access to the systems and appraise counter measures to mitigate this risk.
  • Examine the plans, procedures, practices, and tools to ensure business continuity and to recover rapidly after an incident.

Undergraduate Certificate in Information Security Planning

American Public University is part of American Public University System, an accredited university offering more than 180 degree and certificate programs at the undergraduate and graduate level. All courses are online, so students have the flexibility of taking classes any time or any place that fits their schedule. Our degree programs are designed to be challenging and relevant to working adults in both the public and private sectors and can help enhance their current career or prepare them for a career change.

Students come to our university from across the globe with varying educational backgrounds and diverse educational and career goals. Choose the category below that best describes you:

Our 5-step admissions process will allow you to apply for admission, complete your new student orientation, request a transfer credit evaluation, apply for Federal Student Aid, and register for classes. Get started today!

Have Questions?
Our admissions staff is available Monday - Thursday from 8:00 a.m. - 7:00 p.m. and Friday from 9:00 a.m. - 4:00 p.m. ET to answer your questions and provide assistance with the admissions process. You can reach us by phone at 877-777-9081, e-mail us at info@apus.edu, or connect with us via Live Chat.

 
Certificate Requirements
18 Hours
NAME
DESCRIPTION
CREDITS
ISSC361
Information Assurance
3 hours

This course is a study of the discipline of Information Assurance that focuses on protecting information assets by ensuring availability, confidentiality, integrity, authenticity, and non-repudiation. This course delves into the deliberate engineering, planning and implementation of the five major areas in any enterprise: hardware, software, networks, people, and policies. This course meets the topical requirements of the DoD Directive 8570.1M Information Assurance Management (IAM) Technical III, Management II and Management III categories. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC362
IT Security: Attack & Defense
3 hours

This course examines the techniques and technologies for penetration of networks, detection of attacks, and prevention of attacks. This course addresses the techniques, the technologies, and the methodologies used by cyber intruders (hackers) to select a target and launch an attack. An understanding into the mind and psyche of the hacker is essential to anticipating the moves of the hacker and to design effective countermeasures. This course focuses on techniques and technologies to detect such attacks even while the attack is in progress; early detection enables the administrator to track the movements of the hacker and to discover the intent and goals of the hacker. This course assesses the various countermeasures to keep the system out of the “sights” of the hacker and to keep the hacker out of the perimeter of the target network. This course also explores the laws and the legal considerations in prosecuting computer crime. Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC422
Information Security
3 hours

This course allows students to examine a broad range of computer security issues and provides the student with technical knowledge not normally addressed in traditional training. It explores the protection of proprietary information and security planning with an emphasis on networked computer vulnerabilities. It also focuses on detection (e.g. viruses, hackers, types of computer crime, computer forensic examination, etc.), as well as disaster recovery and technology law. A primary focus is put on security of systems and computer crime prevention. Also addressed is the maturing criminal population with increased computer literacy, whose tendency is to move from violent actions to more profitable computer crime. Finally, issues of privacy and freedom of information are examined. This course meets the topical requirements of the DoD Directive 8570.1M Information Assurance Management (IAM) Technical II and Management I categories. Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC471
IT Security: Auditing
3 hours

Security is one of the most important concerns in the world of Information Technology. This course examines the technical issues and the administrative practices to implement and manage security; in particular, this course focuses on the principles of security auditing. This course explores the various technologies and tools to assist with discovery and auditing in the world of security management. This course also assesses the audit practices, audit processes, audit plans, discovery process, discovery software, penetration strategies, identification of potential attacks, log analysis, user baseline analysis, activity analysis, risk assessment, roles and responsibilities, and the roles and responsibilities of security auditing professionals. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC481
IT Security: Planning and Policy
3 hours

This course examines the principles of security planning and policy. It focuses on a variety of security guidelines, policies and plans (security requirements, internal users, external users, operational costs, geography, capacity plan, growth plan, business organization, business scenarios, business factors, business processes, business functions, business products, product life cycle, technical factors, roles and responsibilities, and organizational authority). This course addresses physical security, authentication, network security, encryption, software development, email, Internet, acceptable use, acceptable speech, and viruses/worms. It also covers the need for actionable and maintainable policies and the need for periodic audits of policies and configurations. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ITMG381
Cyberlaw and Privacy in a Digital Age
3 hours

This course examines how laws have had to change to account for the expanded realm of crimes in the digital age. Despite legislation intended to combat the problem of identity theft, it continues to be one of the most common crimes associated with the Internet. Sexual harassment complaints can now be triggered simply by an employee forwarding questionable email to fellow employees. Some regard intellectual property rights violations to be innocent flattery, while others consider them to be violations that must be stamped out by force of law. Plagiarism by students who pull content from the Internet is a growing problem. Stalkers can log into their victims lives and gain access to highly confidential medical and financial information, and even sabotage their victim's reputations. This course examines current literature on such topics.


Program Completion Rates, Median Debt and More

View more details regarding our graduation rates, the median debt of students who completed the program, and other important information.

 

American Public University System, American Public University, and American Military University are not affiliated with American University or the U.S. Military. American Public University System (APUS) is accredited by the Higher Learning Commission (HLC) and a member of the North Central Association. © 2013 American Public University System | 111 W. Congress Street, Charles Town, WV 25414 | Toll Free: 1-877-755-2787 | Privacy Policy | Terms