Bachelor of Arts in Security Management



    • Number of Credits
    • 121
    • Cost Per Credit
    • $ 250
    • Total Tuition*
    • $ 30,250
  • *(Before Transfer Credit)

Program Description

The Bachelor of Arts in Security Management offers students the opportunity to learn about the principles and theories associated with various types of security, from international security to information security that focus on protection of assets. Graduates of this program are inclined toward professions that involve general public or private management, federal or local government civil service, military service, law enforcement, and private security.

Read More

Program Objectives

In addition to the institutional and general education level learning objectives, the Bachelor of Arts in Security Management also seeks the following specific learning outcomes of its graduates. Graduates in this degree program will be able to:

  • Identify organizational security risk exposure; identify cost-effective mitigation strategies; and prepare for recovery strategies.
  • Employ the use of risk analysis and vulnerability assessment processes.
  • Critically examine the variety and extent of losses from criminal acts, natural disasters, and security breaches facing society.
  • Analyze concepts of information security, personnel security, and physical security and determine the planning approaches to prevent business losses.
  • Analyze the trends affecting security and loss prevention and determine the approaches to reduce losses facing businesses and institutions.
  • Evaluate, from a multi-disciplinary approach, non-traditional approaches to crime prevention.
  • Distinguish between traditional criminal justice roles, functions, and concepts as a reactive institution to the security roles as a preventive societal institution.

Explore Concentrations

Information Security Total Credits - 121 Hours
Core Requirements
24 Hours
Research Methods of Criminal Justice & Security
3 hours

This is an introductory criminal justice research methods course that will provide students with an understanding of the research process, allowing students to develop the skills, knowledge and strategies needed to read, interpret, and evaluate published research. The course will explore quantitative, qualitative, and combined research approaches. Students will prepare work requiring critical analysis of recent published research in the criminal justice field. Students will examine the importance of theory as it relates to criminal justice research and differentiate between major research approaches, designs, and data collection techniques in recently published research in the criminal justice field. Students shall be introduced to social science academic writing and documentation styles.

Global Terrorism
3 hours

This course examines various elements and aspects of International and Domestic Terrorism. Students explore the cultural and ideological philosophies, as well as the social, economic, political, and religious conditions of select states, groups, and individuals that comprise the phenomena of terrorism. By examining the historical and contemporary aspects of terrorism students develop a working knowledge of the current Global War on Terror and are better prepared to comprehend terrorist motives and ideologies. Topics include: History and Development, Types of Terrorism, Conventional and Unconventional terrorist tactics, the Media’s impact on terrorism including the US Counterterrorism Policies. Particular attention is addressed to the Al-Qaeda terrorist network.

Principles and Theory of Security Issues
3 hours

This course is an overview of the principles and issues in business and organizational security management. It reviews the classical management functions including the role of the Chief Security Officer and the principles of organizing the security function. It assesses the traditional management theories and concepts of planning, staffing, span of control as they are applied to the organization. Students examine the challenges embodied in various aspects of physical, personnel, and information security. Principles of loss prevention and the protection of assets are also considered. The history, legal foundations, functions, operations, processes, and tools of security management are explored to ensure the student has a broad understanding of security management and its current role in government and business operations.

Legal and Ethical Issues in Security Management
3 hours

This course assesses legal and ethical issues that inevitably affect security managers. It examines dimensions of security management including pertinent points of civil and criminal law, personnel law and obligations, negotiations, contract management, constitutional rights of individuals, legal compliance, liability, ethical standards and dilemmas, and decision-making.

Evaluation of Security Programs
3 hours

This course explores industry standards, practices and methods of determining the adequacy of security management programs. It reviews the interplay of management structures, functions and processes as well as proper procedures for conducting physical security analyses and evaluations. The course examines the principles of operating technology-centered programs for the protection of assets.

Contemporary Issues in Security Management
3 hours

This course focuses on the contemporary issues of security management such as substance abuse, violence, ideologies, adjudication and reconsideration reviews, security countermeasures, case management, use of examinations such as polygraphs, report writing, international commercial sales, and media relations. It also addresses the security manager’s role in personnel management, security planning, organizational communication, recruitment, retention, training and development, and management of contracts, as well as examines techniques and tools that help security managers understand bias, educate, and shift attitudes of employees towards more proactive security practices.

Security Administration
3 hours

This course focuses on principles and practices that security managers can put to immediate use. The bedrock requirements of effective organization, staff selection, and daily operating procedures are emphasized over abstract concepts. Topics include guard operations, plans, policies, and procedures, workplace violence, managing change, bomb threat management, security awareness training, physical security, securing information systems, investigations, and employee screening.

Physical Security
3 hours

Effective physical security is based on an accurate threat assessment followed by the implementation of an overlapping system of physical and electronic safeguards designed for the specific needs of the client. Topics covered include threat assessment, the security survey, architectural design for security, physical and electronic security methodologies, security lighting, perimeter protection and the guard force, clear zones, wall materials, signage, and the importance of effective and continuous local, state, and federal governmental liaison.

Concentration Requirements
15 Hours
Law Enforcement Intelligence Applications
3 hours

The course will prepare students to use intelligence methodologies and templates to assist in case support or investigations, security and counterintelligence, trend development and forecasting, and efficient use of open source information to maximize resources. The course will examine the current use of intelligence in law enforcement (federal, state, and local) and its applications in support of investigations and operational planning. The methods examined in this course will be applicable in the private sector.

IT Security: Attack & Defense
3 hours

This course examines the techniques and technologies for penetration of networks, detection of attacks, and prevention of attacks. This course addresses the techniques, the technologies, and the methodologies used by cyber intruders (hackers) to select a target and launch an attack. An understanding into the mind and psyche of the hacker is essential to anticipating the moves of the hacker and to design effective countermeasures. This course focuses on techniques and technologies to detect such attacks even while the attack is in progress; early detection enables the administrator to track the movements of the hacker and to discover the intent and goals of the hacker. This course assesses the various countermeasures to keep the system out of the “sights” of the hacker and to keep the hacker out of the perimeter of the target network. This course also explores the laws and the legal considerations in prosecuting computer crime. Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

Computer and Network Security
3 hours

This course will discuss both computer and network security, from the wetware (human), software, and hardware perspectives. The "wetware" component will deal with identification of potential risk situations, establishing policies for avoidance, recovery, and prosecution, and proactive measures to reduce causal factors for security breaches in an organization. The "software" perspective will examine types of inappropriate software activity, as well as asset protection issues (recognizing software assets). This component will also address software tools available to assist in reducing administrative costs due to both malicious and accidental loss. The "hardware" component will address hardware approaches to protecting assets, as well as hardware techniques used to compromise assets. Specific technologies discussed include firewalls, symmetric key encryption, public key encryption, digital certificates, and cryptographic systems (SSL/TLS, VPNs, and Kerberos). Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

Information Security
3 hours

This course allows students to examine a broad range of computer security issues and provides the student with technical knowledge not normally addressed in traditional training. It explores the protection of proprietary information and security planning with an emphasis on networked computer vulnerabilities. It also focuses on detection (e.g. viruses, hackers, types of computer crime, computer forensic examination, etc.), as well as disaster recovery and technology law. A primary focus is put on security of systems and computer crime prevention. Also addressed is the maturing criminal population with increased computer literacy, whose tendency is to move from violent actions to more profitable computer crime. Finally, issues of privacy and freedom of information are examined. This course meets the topical requirements of the DoD Directive 8570.1M Information Assurance Management (IAM) Technical II and Management I categories. Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

IT Security: Auditing
3 hours

Security is one of the most important concerns in the world of Information Technology. This course examines the technical issues and the administrative practices to implement and manage security; in particular, this course focuses on the principles of security auditing. This course explores the various technologies and tools to assist with discovery and auditing in the world of security management. This course also assesses the audit practices, audit processes, audit plans, discovery process, discovery software, penetration strategies, identification of potential attacks, log analysis, user baseline analysis, activity analysis, risk assessment, roles and responsibilities, and the roles and responsibilities of security auditing professionals. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

IT Security: Planning and Policy
3 hours

This course examines the principles of security planning and policy. It focuses on a variety of security guidelines, policies and plans (security requirements, internal users, external users, operational costs, geography, capacity plan, growth plan, business organization, business scenarios, business factors, business processes, business functions, business products, product life cycle, technical factors, roles and responsibilities, and organizational authority). This course addresses physical security, authentication, network security, encryption, software development, email, Internet, acceptable use, acceptable speech, and viruses/worms. It also covers the need for actionable and maintainable policies and the need for periodic audits of policies and configurations. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

Cyberlaw and Privacy in a Digital Age
3 hours

This course examines how laws have had to change to account for the expanded realm of crimes in the digital age. Despite legislation intended to combat the problem of identity theft, it continues to be one of the most common crimes associated with the Internet. Sexual harassment complaints can now be triggered simply by an employee forwarding questionable email to fellow employees. Some regard intellectual property rights violations to be innocent flattery, while others consider them to be violations that must be stamped out by force of law. Plagiarism by students who pull content from the Internet is a growing problem. Stalkers can log into their victims lives and gain access to highly confidential medical and financial information, and even sabotage their victim's reputations. This course examines current literature on such topics.

Industrial Espionage
3 hours

Industrial espionage results in millions of dollars in lost revenue each year. This course provides a brief history of espionage and examines the World Wide Web as an enabler of espionage, the role of governments in industrial espionage, the rise of the competitive intelligence professional, tensions between openness and security, and the Economic Espionage Act of 1996.

Institutional Requirements
3 Hours
Foundations of Online Learning
3 hours

This course is designed to provide a solid foundation for undergraduate study in the online environment. Students will be introduced to learning theory, the tools available in the online classroom and campus, and online research. Identification of personal learning style allows students to improve their study/learning techniques and prepares them to succeed in college level courses. Students will be introduced to formatting and citation styles. APUS policy and procedure is addressed. There is an emphasis on written communication to assist students in the transition to the online environment.

General Education
34 Hours

Final Program Requirement
3 Hours
Senior Seminar in Security Management
3 hours

The Capstone course is a senior level course designed to allow the student to review, analyze and integrate the work the student has completed toward a degree in Security Management. The student will complete an approved academic project or paper that demonstrates mastery of their program of study in a meaningful culmination of their learning and to assess their level of mastery of the stated outcomes of their degree requirements. NOTE: All required, core, and major courses must be completed prior to enrollment in this course. Student must have SENIOR standing to register.

General Electives
42 Hours
Electives are typically courses available at your degree level that are not currently required as a part of your degree program/academic plan. Please visit the catalog to view a complete listing of courses.

Program Completion Rates, Median Debt and More

View more details regarding our graduation rates, the median debt of students who completed the program, and other important information.


American Public University System, American Public University, and American Military University are not affiliated with American University or the U.S. Military. American Public University System (APUS) is accredited by the Higher Learning Commission (HLC). © 2015 American Public University System | 111 W. Congress Street, Charles Town, WV 25414 | Toll Free: 1-877-755-2787 | Privacy Policy | Terms