Graduate Certificate in Information Systems Security

 

DEGREE AT A GLANCE:

    • Number of Credits
    • 18
    • Cost Per Credit
    • $ 325
    • Total Tuition*
    • $ 5,850
  • *(Before Transfer Credit)
 

Program Description

This certificate assesses and demonstrates competence in 10 information security domains: Access Control, Application Security, Business Continuity and Disaster Recovery Planning, Cryptography, Information Security and Risk Management, Legal, Regulations, Compliance and Investigations, Operations Security, Physical (Environmental) Security, Security Architecture and Design, and Telecommunications and Network Security based on the principles of proven and universally-accepted information security models. These domains are the common knowledge areas for testing for the international information security gold standard certification: Certified Information Systems Security Professional (CISSP).

This certificate prepares an IT professional to seek higher level career positions such as Information Systems Analyst, Information Systems Manager, Security Policy Analyst, Security Planner, Security Auditor, and Chief Security or Technology Officer. Program graduates will know how to design secure networks, develop security policies, use cryptography, and create business continuity and information security plans.

Read More
 
 
 

Program Objectives

Upon completion of this certificate, students will be able to:

  • Compare and contrast the differences between the various network topologies (both physical and logical) and appraise the various types of Security Architecture and Design models.
  • Examine the seven-layer OSI networking model and its relation to common protocol stacks and inspect the components of a packet (header, body, CRC, etc.).
  • Examine the principles of network security and assess cellular architecture.
  • Evaluate the process for securing current and next generation telecommunications networks.
  • Examine the principles of intrusion detection and intrusion prevention.
  • Differentiate between the different types of cryptographic algorithms.

Graduate Certificate in Information Systems Security

Students enrolling in our Master of Science in Information Technology must provide an official transcript of their previously-completed Bachelor’s or Master’s degree and meet one of the following:

  • Associate or Bachelor's degree in Information Technology or a related field (ex: Computer Science, Information Systems, Database Development, etc.)
  • Completion of one of our Undergraduate IT Certificates
  • Completion of 6 upper-level (300-400) Undergraduate credits in IT-related courses
  • Completion of an IT-related minor of concentration in student's Undergraduate program

If the IT-specific requirements are not noted in their official Bachelor's or Master's transcript, the student must provide official copies of their university transcripts which show the appropriate coursework.

Graduate Certificate in Information Technology

Students enrolling in one of our Graduate Certificates in Information Technology (Cybercrime, Digital Forensics, IT Project Management, Information Assurance, Information Systems Security, or Object Oriented Application Development) must provide an official transcript of their previously-completed Bachelor's or Master's degree and meet one of the following:

  • Associate or Bachelor's degree in Information Technology or a related field (ex: Computer Science, Information Systems, Database Development, etc.)
  • Two years of work experience in the specific sub-field for their Certificate
  • Completion of six upper-division credits (300-400 level) in IT-related courses at the undergraduate level
  • Completion of an IT-related minor or concentration during their Bachelor's degree
  • Completion of one of our Undergraduate IT Certificates

If the IT-specific requirements are not noted in their official Bachelor’s or Master’s transcript, the student must provide official copies of their university transcripts which show the appropriate coursework. Verification of two years work experience for the Graduate Certificates in IT need to be sent to the university from the student’s current/previous employer on company letterhead.

Admissions Process for Graduate IT Students

  1. Apply for admission
  2. Complete the online orientation
  3. Contact the institution where you earned your undergraduate degree and have an official copy of your undergraduate transcript sent to us at:

    American Public University System
    Attn: Document Services
    10110 Battleview Parkway, Suite 114
    Manassas, VA 20109

  4. An Admissions Representative will be assigned to work with you and will contact you via email or phone to assist you with the enrollment process. Your Admissions Representative will also be reviewing documents verifying your previous education or work experience and will notify you when you have been admitted and can register for classes.

*Preadmission courses completed at the Undergraduate level must be graded C or better; B or better at the Graduate level.

Have Questions?
Our admissions staff is available Monday - Thursday from 8:00 a.m. - 7:00 p.m. and Friday from 9:00 a.m. - 4:00 p.m. ET to answer your questions and provide assistance with the admissions process. You can reach us by phone at 877-777-9081, e-mail us at info@apus.edu, or connect with us via Live Chat.

 
Certificate Requirements
18 Hours
NAME
DESCRIPTION
CREDITS
ISSC621
Computer Forensics
3 hours

This course examines information concealment techniques, technologies, hardware, software, and relevant legislation for cyber forensics to reveal and track legal and illegal activity. The course examines the process for investigation and introduces the tools and procedures required to legally seize and forensically evaluate a suspect machine. Also covered are the rules of evidence, chain of custody, standard operating procedures, and the manipulation of technology to conceal illegal activities, and revealing concealed information using cyber forensics.

ISSC640
Computer Networks and Data Systems
3 hours

This course is a study of computer networks and the evolution of modern communication systems. It examines the various layers of the basic reference models such as the five-layer IP model or the seven-layer OSI model, by scale, connection method, network architecture, or topology. This course also includes an in-depth analysis of transmission protocols, communications systems, and networks. A prior knowledge of networks and networking is recommended.

ISSC641
Telecommunications and Network Security
3 hours

Telecommunications networks are a critical component of the global economic and social infrastructures. Securing critical infrastructure is an established priority within Information Security Management. This course examines the field of secure telecommunications networks, including emerging threats, system vulnerability, network evolution, and network defense mechanisms.

ISSC642
Intrusion Detection and Incident Handling
3 hours

This course examines the tenets of Intrusion Detection, Intrusion Prevention, and Incident Handling. Intrusion Detection focuses on the methods to detect attempts (attacks or intrusions) to compromise the confidentiality, integrity or availability of an information system. Also included is an analysis of the principles and practices of intrusion detection, intrusion prevention, and incident handling; network-based, host-based, and hybrid intrusion detection; identifying attack patterns; deployment of resources and responses to handle the incident, surveillance, damage assessment, risk assessment, data forensics, data mining, attack tracing, system recovery, and continuity of operation.

ISSC660
Information Assurance
3 hours

The course analyzes computer and systems security measures by examining a model for information assurance; it also examines the components of a comprehensive Information Assurance plan. Topics included are: asset identification, human factors, compliance with regulations, personnel security, risk assessment and ethical considerations, IA policy, as well as computer and network security tools.

ISSC680
Information Security Management
3 hours

Information Security includes an evaluation of the techniques, policies and strategies to ensure that data stored in an organization's computers cannot be accessed or processed without the consent of the organization. Also included, is an analysis of Information Security & Risk Management, Access Control, Physical Security, Security Architecture & Design, Business Continuity & Disaster Recovery Planning, Telecommunications & Network Security, Application Security, Operations Security, Law, Compliance & Investigations. This course also reviews the building blocks of information systems and cryptography is provided to reinforce the scope of security management.


Program Completion Rates, Median Debt and More

View more details regarding our graduation rates, the median debt of students who completed the program, and other important information.

 

American Public University System, American Public University, and American Military University are not affiliated with American University or the U.S. Military. American Public University System (APUS) is accredited by the Higher Learning Commission (HLC) and a member of the North Central Association. © 2013 American Public University System | 111 W. Congress Street, Charles Town, WV 25414 | Toll Free: 1-877-755-2787 | Privacy Policy | Terms