Bachelor of Science in Information Assurance Security - Computer Science Concentration

Information assurance and security professionals design, install, configure, manage, and troubleshoot an organization’s security policies, processes, network, hardware, and software infrastructure. They apply tools and technologies to ensure that the organization is secure. The Bachelors of Science in Information Assurance and Security degree allows undergraduate learners to acquire and apply various processes, tools, technologies, and methods of securing an enterprise; including security policies, social engineering, access control, authentication, perimeter security, disaster recovery and business continuity, risk management, incident response, viruses, malware, spam, encryption, and other infrastructure security techniques that include governance and strategic alignment of IT and business. In addition to information assurance and security expertise, learners in this concentration demonstrate the business, interpersonal, and communication skills required to influence internal decision making and overall organizational effectiveness. Successful graduates of this concentration are prepared to pursue careers as information security consultants, managers, or security administrators.

Outcomes:

  • Explain how security can be implemented through network communication protocols and supporting network hardware.
  • Demonstrate the ability to incorporate secure practices into the design and development of software programs, database architecture and web-based applications using a security development lifecycle model.
  • Describe how the interaction of computer architecture, operating systems, networking components and databases result in the achievement of an organization’s mission.
  • Demonstrate the proficiency of both a current programming language and scripting language. Examine and explain the benefits of a Computer Incident Response Team and demonstrate the use of tools to audit, detect and investigate the elements of an attack.
  • Recognize, explain and analyze regulations, statutes and laws regarding computer systems security compliance issues.
  • Employ techniques for the collection, analyzing and reporting of digital evidence captured from computers, mobile devices and storage systems to support criminal investigations.
  • Describe and plan the formation of security polices resulting from a comprehensive risk assessment analysis.
  • Explain how an organization’s digital assets are protected by the development of both a Business Continuity Plan and Disaster Recovery Plan.
  • Apply and demonstrate critical thinking skills in areas of advanced research through the design of research papers that could benefit the industry.

Degree Requirements

Courses: General Education

ECON210Principles of Macroeconomics

4.5

ENGL101Composition and Critical Thinking

4.5

ENGL103Composition: Writing and Research

4.5

COMS201Technical and Professional Writing

4.5

HIST101Modern American History: 1950 to the 21st Century

4.5

LITR201Literature: A Reflection of Life

4.5

MATH112Analytic College Algebra

4.5

MATH203Applications of Discrete Mathematics

4.5

MATH301Data Driven Statistics

4.5

 

PHIL301Ethics for Professionals

4.5

or

PHIL306Ethics for the Information Age

4.5

 

PSYC102Introductory Psychology

4.5

or

SOCL102Introductory Sociology

4.5

 

SCI101Introduction to the Sciences

4.5

SCI103Science and Technology- Laboratory Course

1.5

SCI201Environmental Science and Sustainability

4.5

SCI203Environmental Science and Sustainability- Laboratory Course

1.5

UNIV104Academic and Career Success

4.5

Total Credit Hours:66

Courses: Core

CSS150Introduction to Computer Security

4

CSS200Principles of Network Security

4

CSS250Security Risk Management

4

CSS260Scripting with Perl

4

CSS280Ethical Hacking

4

CSS300Vulnerability Assessment and Management

4

CSS321Software Assurance

4

CSS332Database and Web Vulnerabilities and Security

4

CSS340Operating System Security

4

CSS350Computer Forensics I

4

CSS351Computer Forensics II

4

CSS370Security Architecture

4

CSS380Business Continuity and Disaster Recovery Planning

4

CSS410Cloud Computing, Privacy and Security

4

CSS430Advanced Research in IAS and IT Management

4

CSS441Security Compliance

4

CSS450Security Capstone

4

IT254Spreadsheet Applications

4

Total Credit Hours:72

Courses: Concentration

CS104Problem Solving Concepts With C++

4

 

CS115Programming With C++

4

or

CS116C# Programming

4

 

CS146Introduction to UNIX

4

 

CS215Intermediate C++ Programming

4

or

CS216Intermediate C# Programming

4

 

CS230Data Structures

4

CS246Structured Query Language

4

CS250Fundamentals of Database Systems

4

CS340Operating Systems

4

CS345UNIX Systems Programming

4

CS352Advanced Database Systems

4

IT205Fundamentals of Networking

4

IT375IT Management Strategy

4

Total Credit Hours:48

Total Credit Hours: 186

Committee on National Security Systems (CNSS)

The University curriculum for this program has been certified by the Committee on National Security Systems (CNSS) for education standards in computer systems security as follows:

NSTISSI-4011

National Training Standard for Information Systems Security (INFOSEC) Professionals, dated 20 June 1994

CNSSI-4012

National Information Assurance Training Standard for Senior Systems Managers, dated June 2004; Supersedes NSTISSI No. 4012, dated August 1997

CNSSI-4013

National Information Assurance Training Standard For System Administrators (SA), dated March 2004

CNSSI-4014

Information Assurance Training Standard for Information Systems Security Officers, dated April 2004; Supersedes

NSTISSI No. 4014, dated August 1997

CNSSI-4016

National Information Assurance Training Standard For Risk Analysts, dated November 2005