Information Security Planning

Undergraduate Certificate

The undergraduate certificate in Information Security Planning examines the principles of information systems attack and defense, and applies that knowledge to protect the information assets of an organization. You’ll be taught how to design secure networks, develop security policies, use cryptography, and perform business continuity planning.  

Courses in this program meet the topical requirements of the DoD Directive 8570.1M Information Assurance Management (IAM) Technical II, Technical III, Management I, Management II, and Management III categories.

The curriculum for this online program is reviewed by an advisory council of industry experts for relevancy to today’s marketplace. Course topics include:

  • Information assurance engineering
  • Network attack detection and prevention
  • Information security issues
  • Security planning and vulnerabilities
  • IT security auditing, planning, and policies
  • Cyber laws and digital privacy

This online certificate is intended for undergraduate students who want to expand their knowledge of hazardous waste management without committing to a degree program.

Program Objectives

In addition to the institutional and degree level learning objectives, graduates of this program are expected to achieve these learning outcomes:


  • Assess the laws (national and federal), policies (including the Sarbanes-Oxley Act), issues (social, psychological, legal, and management), risks, and controls related to information assurance and network security.
  • Appraise the principles and concepts behind computer network defense (CND) methodology, robust codes, cryptography, authentication, authorization, non-repudiation, and commercially available security packages (PKI, PGP, Kerberos, SSL, VPN).
  • Examine the processes, roles, and responsibilities of management and security professionals in risk assessment, risk mitigation, security validation, policy enforcement, and personnel indoctrination.
  • Assess the key components of the Physical Security Policy, Internet Security Policy, E-Mail Security Policy, Encryption Security Policy, Software Development Security Policy, Authentication Security Policy, Network Security Policy, Acceptable Use Policy, and the policy that addresses viruses, worms, and Trojan horses.
  • Assess the engineering discipline, process, techniques, tools, and technologies used by hackers to gain unauthorized access to the systems and appraise counter measures to mitigate this risk.
  • Examine the plans, procedures, practices, and tools to ensure business continuity and to recover rapidly after an incident.



Degree at a Glance

Admission Requirements

  • All undergraduate programs require a minimum of a high school diploma or equivalent (i.e. GED).
  • Undergraduate students with less than 9 transferable credit hours may be asked to complete our College Readiness Assessment to determine current math and writing skill levels.
  • If you have previous college experience, you will be asked to submit your transcripts from previous schools where you earned academic credit.
  • There is no fee to complete our admission application. View steps to apply.

Selecting the right program to meet your educational goals is a key step in ensuring a successful outcome. If you are unsure of which program to choose, or need more information, please contact an admission representative at 877-777-9081 or