Information Systems Security

Bachelor of Science

The Bachelor of Science in Information Systems Security combines educational theory with the technical skills required to meet information security needs across the enterprise. This online bachelor’s degree brings you coursework in information assurance, information security, network design and engineering, business continuity, and more. Learning the technological skills required to protect organizational assets from unscrupulous business competitors or unfriendly combatants is paramount to the credibility and survival of businesses, government agencies, and military operations. This online degree program helps to prepare you for careers such as information security manager, analyst, auditor, consultant, or risk assessor.  

Program Courses

Courses in this program meet the topical requirements of the DoD Directive 8570.1M Information Assurance Management (IAM) Technical I, Technical II, Technical III, Management I, Management II, and Management III categories. Additionally, the National Security Agency (NSA) Information Assurance Courseware Evaluation (IACE) has certified courses for this degree program.

The curriculum for this online certificate is reviewed by an advisory panel of industry experts for relevancy to today’s marketplace. Course topics include:

  • Computer and network security
  • Operating systems hardening and security
  • Local area network (LAN) design, implementation, and maintenance
  • Network attacks, cybercrime, and cyber laws
  • IT security risk management, and countermeasures
  • Business continuity and disaster recovery planning
  • Information assurance and information security
  • IT security auditing, planning, and policy
  • Cyberlaw and privacy in a digital age
  • Digital forensics

Note: Some courses in this program have additional laboratory course materials that are not covered by our undergraduate book grant. View the Materials Cost information below for details.

View all courses.

Program Objectives

In addition to the institutional and degree level learning objectives, graduates of this program are expected to achieve these learning outcomes:

  • Use analytical, logical, and critical thinking to analyze user requirements and to design, develop, and deploy effective information systems security solutions.
  • Analyze network designs, topologies, architectures, protocols, communications, administration, operations, and resource management for wired, wireless, and web-based networks.
  • Prescribe information assurance initiatives to protect an organization’s information assets by ensuring availability, confidentiality, integrity, authenticity, and non-repudiation.
  • Develop a security architecture consisting of tools, techniques, and technologies to prevent the penetration of networks, to detect attacks, and to design effective countermeasures.
  • Generate a risk assessment and risk mitigation methodology to analyze and manage risks in the context of network security.
  • Apply the discipline of network attack and defense to develop effective countermeasures to keeping hackers outside the perimeter of the network.
  • Develop network security audit practices, processes, and plans, and specify the roles and responsibilities of the staff on the audit team.
  • Develop actionable and maintainable network and information security plans and policies that address physical security, authentication, network security, encryption, software development, email, Internet, acceptable use, acceptable speech, and viruses/worms.

Degree at a Glance


Concentrations are designed to help you group courses together so you can further specialize in your field and pursue a more focused path to degree completion. You will be asked to select a concentration when you enroll in this program.

Explore the concentrations available for this program.


Application Security

Examines how access control systems prevent unauthorized access and security breaches. Teaches the planning, design, and development of security strategies and solutions to protect organizational databases. Cryptographic techniques for the encryption and decryption of data, files, and networks and how to properly secure applications in compliance with certain standards, requirements, and objectives are also covered.

Sample Courses

  • ENTD381 - Object Oriented Programming With Java
  • ISSC364 - IT Security: Access Control and Authentication
  • ISSC366 - IT Security: Cryptography
  • ISSC411 - Application Security
  • ISSC431 - Database Systems Security

Cloud Computing

Explores cloud computing’s key principles, security, and privacy. Examines how to use resources for service specifications and contracts for proper management of cloud services, decision making and management techniques for best practices and organizational growth, and green IT.

Sample Courses

  • ISSC326 - Cloud Computing
  • ISSC345 - Service Oriented Architecture
  • ISSC386 - Green Computing: Foundations and Strategies
  • ISSC424 - Virtualization Security
  • ISSC426 - Cloud Security and Privacy


Covers the processes and goals of cyber forensics investigations, and explores federal and state laws and legal concepts affecting how governments and organizations think about information security. Teaches the importance of search warrants and chain of custody in forensic investigations. Examines cybersecurity regulatory standards and compliance requirements, and explores technologies needed to detect, investigate, and prevent computer-related crimes.

Sample Courses

  • ISSC457 - Digital Forensics: Investigating Network Intrusions and Cybercrime Security
  • ISSC351 - Computer Forensics
  • ISSC331 - Legal Issues in Information Security
  • ISSC451 - Cybercrime
  • ISSC452 - Cybersecurity

Digital Forensics

Explores common incident response procedures and the forensics of wireless network attacks caused by mobile and wireless peripheral devices. Examines security and access procedures and how search warrants, chains of custody, and investigation logs impact digital investigations. Topics include basic tracking techniques and computer-related crimes, image file analysis, crime prevention techniques, and password cracking on various operating systems.

Sample Courses

  • ISSC455 - Digital Forensics: Investigation Procedures and Response
  • ISSC458 - Digital Forensics: Investigating Data and Image Files
  • ISSC459 - Digital Forensics: Hard Disc and Operating Systems
  • ISSC456 - Digital Forensics: Investigating Wireless Networks and Devices
  • ISSC457 - Digital Forensics: Investigating Network Intrusions and Cybercrime Security

Enterprise Security

Covers security plan creation for organizations and their internal and external users. Examines best practices in emerging technologies for Linux systems, networks, firewalls, and applications. Provides knowledge of security strategies and solutions for organizational databases. Teaches best practices for physical penetration testing and defense techniques to repel physical attacks.  

Sample Courses

  • ISSC331 - Legal Issues in Information Security
  • ISSC344 - Open Source System Security
  • ISSC368 - IT Security: Physical and Peripheral Defense
  • ISSC411 - Application Security
  • ISSC431 - Database Systems Security


This general concentration allows you to select from dozens of different concentration courses offered within this program, enabling you to create your own focused area of study. View course catalog for details.

View other concentrations in this program to see sample courses.

Admission Requirements

  • All undergraduate programs require a minimum of a high school diploma or equivalent (i.e. GED).
  • New undergraduate students may be asked to complete our College Readiness Assessment (ADMN100). If you have successfully completed 9 or more hours of college credit, you may reach out to your admission representative to inquire about waiving this requirement.
  • If you have previous college experience, you will be asked to submit your transcripts from previous schools where you earned academic credit.
  • There is no fee to complete our admission application. View steps to apply.

Need help?

Selecting the right program to meet your educational goals is a key step in ensuring a successful outcome. If you are unsure of which program to choose, or need more information, please contact an admission representative at 877-777-9081 or

Materials Cost

Software and/or lab equipment required for some courses in this program must be purchased at the student’s expense, and are not included in the undergraduate book grant.

Estimated course materials for this program are $229. You can view the materials required for individual courses in the ecampus under your Academic Plan.

Undergraduate Tuition Rates  

Military-Affiliated Students* = $250/credit hour

All Other Students = $270/credit hour

View Tuition and Fees Details  

*To help minimize out-of-pocket costs, we offer a tuition grant for U.S. active-duty servicemembers, Guard, Reserve, military spouses and dependents, and veterans that caps undergraduate tuition at the military TA limit. See all military-affiliated student benefits.

Paying for School

As an accredited university, we accept the following forms of financial aid and payments:

Ways to Save

Undergraduate Book Grant

Ebooks are provided at no cost if you are enrolled in undergraduate courses for credit. The undergraduate book grant is estimated to save $500 per academic semester if you are registered as a full-time student.

Transfer Credits

Accelerate your degree completion by taking full advantage of our transfer credit options, including credit for your previous college courses, military service schools, American Council on Education (ACE) and College Level Examination Program (CLEP) tests, and prior learning experiences.  

Employer Contributions

The university has educational partnerships with many employers and associations. Be sure to accurately enter your employer information when you complete our admissions application. Your employer might also offer a tuition reimbursement plan as one of your benefits.