- General Information
- Application Process
- Program Requirements
DEGREE AT A GLANCE:
This certificate assesses and demonstrates competence in 10 information security domains: Access Control, Application Security, Business Continuity and Disaster Recovery Planning, Cryptography, Information Security and Risk Management, Legal, Regulations, Compliance and Investigations, Operations Security, Physical (Environmental) Security, Security Architecture and Design, and Telecommunications and Network Security based on the principles of proven and universally-accepted information security models. These domains are the common knowledge areas for testing for the international information security gold standard certification: Certified Information Systems Security Professional (CISSP).
This certificate prepares an IT professional to seek higher level career positions such as Information Systems Analyst, Information Systems Manager, Security Policy Analyst, Security Planner, Security Auditor, and Chief Security or Technology Officer. Program graduates will know how to design secure networks, develop security policies, use cryptography, and create business continuity and information security plans.
Upon completion of this certificate, students will be able to:
Graduate Certificate in Information Systems Security
Students enrolling in our Master of Science in Information Technology must provide an official transcript of their previously-completed Bachelor’s or Master’s degree and meet one of the following:
If the IT-specific requirements are not noted in their official Bachelor's or Master's transcript, the student must provide official copies of their university transcripts which show the appropriate coursework.
Graduate Certificate in Information Technology
Students enrolling in one of our Graduate Certificates in Information Technology (Cybercrime, Digital Forensics, IT Project Management, Information Assurance, Information Systems Security, or Object Oriented Application Development) must provide an official transcript of their previously-completed Bachelor's or Master's degree and meet one of the following:
If the IT-specific requirements are not noted in their official Bachelor’s or Master’s transcript, the student must provide official copies of their university transcripts which show the appropriate coursework. Verification of two years work experience for the Graduate Certificates in IT need to be sent to the university from the student’s current/previous employer on company letterhead.
Admissions Process for Graduate IT Students
*Preadmission courses completed at the Undergraduate level must be graded C or better; B or better at the Graduate level.
This course examines information concealment techniques, technologies, hardware, software, and relevant legislation for cyber forensics to reveal and track legal and illegal activity. The course examines the process for investigation and introduces the tools and procedures required to legally seize and forensically evaluate a suspect machine. Also covered are the rules of evidence, chain of custody, standard operating procedures, and the manipulation of technology to conceal illegal activities, and revealing concealed information using cyber forensics.
Computer Networks and Data Systems
This course is a study of computer networks and the evolution of modern communication systems. It examines the various layers of the basic reference models such as the five-layer IP model or the seven-layer OSI model, by scale, connection method, network architecture, or topology. This course also includes an in-depth analysis of transmission protocols, communications systems, and networks. A prior knowledge of networks and networking is recommended.
Telecommunications and Network Security
Telecommunications networks are a critical component of the global economic and social infrastructures. Securing critical infrastructure is an established priority within Information Security Management. This course examines the field of secure telecommunications networks, including emerging threats, system vulnerability, network evolution, and network defense mechanisms.
Intrusion Detection and Incident Handling
This course examines the tenets of Intrusion Detection, Intrusion Prevention, and Incident Handling. Intrusion Detection focuses on the methods to detect attempts (attacks or intrusions) to compromise the confidentiality, integrity or availability of an information system. Also included is an analysis of the principles and practices of intrusion detection, intrusion prevention, and incident handling; network-based, host-based, and hybrid intrusion detection; identifying attack patterns; deployment of resources and responses to handle the incident, surveillance, damage assessment, risk assessment, data forensics, data mining, attack tracing, system recovery, and continuity of operation.
The course analyzes computer and systems security measures by examining a model for information assurance; it also examines the components of a comprehensive Information Assurance plan. Topics included are: asset identification, human factors, compliance with regulations, personnel security, risk assessment and ethical considerations, IA policy, as well as computer and network security tools.
Information Security Management
Information Security includes an evaluation of the techniques, policies and strategies to ensure that data stored in an organization's computers cannot be accessed or processed without the consent of the organization. Also included, is an analysis of Information Security & Risk Management, Access Control, Physical Security, Security Architecture & Design, Business Continuity & Disaster Recovery Planning, Telecommunications & Network Security, Application Security, Operations Security, Law, Compliance & Investigations. This course also reviews the building blocks of information systems and cryptography is provided to reinforce the scope of security management.
|Program Completion Rates, Median Debt and More|
View more details regarding our graduation rates, the median debt of students who completed the program, and other important information.