Skip Navigation
 

Information Systems Security

Bachelor of Science

The Bachelor of Science in Information Systems Security combines educational theory with the technical skills required to meet information security needs across the enterprise. This online bachelor’s degree brings you coursework in information assurance, information security, network design and engineering, business continuity, and more. Learning the technological skills required to protect organizational assets from unscrupulous business competitors or unfriendly combatants is paramount to the credibility and survival of businesses, government agencies, and military operations. This online degree program helps to prepare you for careers such as information security manager, analyst, auditor, consultant, or risk assessor.

Courses in this program meet the topical requirements of the DoD Directive 8570.1M Information Assurance Management (IAM) Technical I, Technical II, Technical III, Management I, Management II, and Management III categories. Additionally, the National Security Agency (NSA) Information Assurance Courseware Evaluation (IACE) has certified some courses for this degree program.

Software and/or lab equipment required for some courses in this program are not provided through the undergraduate book grant and will need to be purchased by any student registering in those courses. Please see the course materials section of those courses for more information prior to registration.

Program Courses

The curriculum for this program follows industry trends to help ensure relevancy to today's marketplace. View all courses.

Note: Some courses in this program have additional laboratory course materials that are not covered by our undergraduate book grant. View the Materials Cost information below for details.

Program Objectives

In addition to the institutional and degree level learning objectives, graduates of this program are expected to achieve these learning outcomes:

  • Use analytical, logical, and critical thinking to analyze user requirements and to design, develop, and deploy effective information systems security solutions.
  • Analyze network designs, topologies, architectures, protocols, communications, administration, operations, and resource management for wired, wireless, and web-based networks.
  • Prescribe information assurance initiatives to protect an organization’s information assets by ensuring availability, confidentiality, integrity, authenticity, and non-repudiation.
  • Develop a security architecture consisting of tools, techniques, and technologies to prevent the penetration of networks, to detect attacks, and to design effective countermeasures.
  • Generate a risk assessment and risk mitigation methodology to analyze and manage risks in the context of network security.
  • Apply the discipline of network attack and defense to develop effective countermeasures to keeping hackers outside the perimeter of the network.
  • Develop network security audit practices, processes, and plans, and specify the roles and responsibilities of the staff on the audit team.
  • Develop actionable and maintainable network and information security plans and policies that address physical security, authentication, network security, encryption, software development, email, Internet, acceptable use, acceptable speech, and viruses/worms.

Degree at a Glance

Concentrations

Concentrations are designed to help you group courses together so you can further specialize in your field and pursue a more focused path to degree completion. You will be asked to select a concentration when you enroll in this program.

Explore the concentrations available for this program.

x

Cloud Computing

Explores cloud computing’s key principles, security, and privacy. Examines how to use resources for service specifications and contracts for proper management of cloud services, decision making and management techniques for best practices and organizational growth, and green IT.

Sample Courses

  • ISSC326 - Cloud Computing
  • ISSC345 - Service Oriented Architecture
  • ISSC386 - Green Computing: Foundations and Strategies
  • ISSC424 - Virtualization Security
  • ISSC426 - Cloud Security and Privacy
x

Cyber Intelligence

Prepares you to protect systems targeted at multiple levels based on various laws, regulations, and directives. Through information collection, social engineering, and reverse engineering of applications and processes, cyber intelligence provides the necessary tools for protecting an organization's systems.

Sample Courses

  • INTL410 - Counterintelligence
  • INTL434 - Threat Analysis
  • HLSS320 - Intelligence and Homeland Security
  • INTL421 - Signals Intelligence and Security
  • ISSC452 - Cybersecurity
x

Cybercrime Investigations

Focuses heavily on criminal justice, including: criminal behavior; crime detection and solution; use of intelligence in law enforcement; analysis and measurement of crime using GIS; and the various roles and functions within the cybersecurity practice.

Sample Courses

  • CMRJ303 - Criminology
  • CMRJ306 - Criminal Investigation
  • CMRJ320 - Law Enforcement Intelligence Applications
  • CMRJ335 - Crime Analysis
  • ISSC452 - Cybersecurity
x

Cybersecurity

Covers the processes and goals of cyber forensics investigations, and explores federal and state laws and legal concepts affecting how governments and organizations think about information security. Teaches the importance of search warrants and chain of custody in forensic investigations. Examines cybersecurity regulatory standards and compliance requirements, and explores technologies needed to detect, investigate, and prevent computer-related crimes.

Sample Courses

  • ITMG381 - Cyberlaw and Privacy in a Digital Age
  • ISSC325 - Biometrics
  • ISSC343 - Wireless Networks
  • ISSC452 - Cybersecurity
  • ISSC457 - Digital Forensics: Investigating Network Intrusions and Cybercrime Security
x

Digital Forensics

Explores common incident response procedures and the forensics of wireless network attacks caused by mobile and wireless peripheral devices. Examines security and access procedures and how search warrants, chains of custody, and investigation logs impact digital investigations. Topics include basic tracking techniques and computer-related crimes, image file analysis, crime prevention techniques, and password cracking on various operating systems.

Sample Courses

  • ISSC455 - Digital Forensics: Investigation Procedures and Response
  • ISSC458 - Digital Forensics: Investigating Data and Image Files
  • ISSC459 - Digital Forensics: Hard Disc and Operating Systems
  • ISSC456 - Digital Forensics: Investigating Wireless Networks and Devices
  • ISSC457 - Digital Forensics: Investigating Network Intrusions and Cybercrime Security
x

General

This general concentration allows you to select from dozens of different concentration courses offered within this program, enabling you to create your own focused area of study. View course catalog for details.

Sample Courses

  • ISSC461 - IT Security: Countermeasures
  • ISSC471 - IT Security: Auditing
  • ISSC490 - IT Security: Business Continuity
  • ISSC342 - Operating Systems: Hardening and Security
  • ISSC362 - IT Security: Attack & Defense
  • ITMG381 - Cyberlaw and Privacy in a Digital Age
x

Homeland Security

Expands on a holistic approach to cybersecurity and cyber operations to help you assess vulnerabilities and threats, levels of protection and prevention against such threats, and cyber operational processes.

Sample Courses

  • HLSS302 - Introduction to Homeland Security and Defense
  • HLSS303 - Homeland Security Risk, Threats and Consequences
  • HLSS320 - Intelligence and Homeland Security
  • INTL421 - Signals Intelligence and Security
  • ISSC452 - Cybersecurity
x

Wireless and Mobile Security

Provides specialization in the methodologies used in mobile and wireless network infrastructure security. Also covers the regulations, policies, procedures, and ethical responsibilities for privacy and security of mobile devices.

Sample Courses

  • ITMG381 - Cyberlaw and Privacy in a Digital Age
  • ISSC412 - Mobile Application Security
  • ISSC415 - Mobile Device Security
  • ISSC442 - Wireless and Mobile Network Security
  • ISSC343 - Wireless Networks

Admission Requirements

  • All APU undergraduate programs require a minimum of a high school diploma or equivalent (i.e. GED).
  • Please read all undergraduate admission requirements before applying to this program and be prepared to submit the required documentation.
  • There is no fee to complete the APU admission application. View steps to apply.

Need help?

Selecting the right program to meet your educational goals is a key step in ensuring a successful outcome. If you are unsure of which program to choose, or need more information, please contact an APU admissions representative at 877-777-9081 or info@apus.edu.

Materials Cost

Software and/or lab equipment required for some courses in this program must be purchased at the student’s expense, and are not included in the undergraduate book grant.

Estimated course materials for this program are $229. You can view the materials required for individual courses in the ecampus under your Academic Plan.


Undergraduate Tuition Rates 

Per credit hour: $270 | $250 with military grant*

View Tuition and Fees Details  

*To help minimize out-of-pocket costs, APU offers a tuition grant for U.S. active-duty servicemembers, Guard, Reserve, military spouses and dependents, and veterans that caps undergraduate tuition at the military TA limit. See all military-affiliated student benefits.

Paying for School

Because our university is accredited by the Higher Learning Commission (HLC), (the same as the Ohio State University, Univ. of Chicago, and U.S. Air Force Academy, to name a few), we can accept the following forms of financial aid and payments:

Ways to Save

Undergraduate Book Grant

Ebooks are provided at no cost if you are enrolled in undergraduate courses for credit. The undergraduate book grant is estimated to save $250 per academic semester if you are registered as a full-time student.

Transfer Credits

Accelerate your degree completion by taking full advantage of our transfer credit options, including credit for your previous college courses, military service schools, American Council on Education (ACE) and College Level Examination Program (CLEP) tests, and prior learning experiences.  

Employer Contributions

APU has educational partnerships with many employers and associations. Be sure to accurately enter your employer information when you complete our admissions application. Your employer might also offer a tuition reimbursement plan as one of your benefits.

School of Science, Technology, Engineering & Math


School of Science, Technology, Engineering & Math

This program resides in the School of Science, Technology, Engineering, and Math (STEM) where more than 57 degree and certificate programs are available for students to find their area of interest ranging from space studies to environmental studies to IT and cybersecurity. American Public University is one of the few online colleges where you can work fully online to earn science and math bachelor’s degrees. Two of our bachelor’s programs (Natural Science and BSEE) are set up with full lab kits that are mailed to you to use at home. You won’t sacrifice hands-on experience with our online science programs! In addition, many of our STEM professors work to innovate their classroom, including Danny Welsch who uses video for you to learn from his virtual field trips.

The APU STEM program directors work with industry advisory councils to ensure that our students are prepared for the real world. APU also works with industry certifying bodies to ensure that our courseware meets the requirements of agencies such as the National Security Agency (NSA) Information Assurance Courseware Evaluation (IACE) and the DoD Directive 8570.1M Information Assurance Management (IAM).

At APU, we understand your need for flexibility because most of our students are working adult learners who balance school around work and other life commitments. This is why we offer 8-week or 16-week online courses that start monthly. Through an online virtual classroom, you’ll communicate with students and professors in forum communities as you work to complete your weekly written assignments on your own schedule from anywhere in the world. And with our mobile application, you can even work offline and upload your assignments when you reconnect.

We encourage you to browse the School of Science, Technology, Engineering and Math webpage to learn more about our what’s happening in the school and to find a program that’s right for you