Bachelor of Science in Information Assurance Security - Management Concentration

Information assurance and security professionals design, install, configure, manage, and troubleshoot an organization’s security policies, processes, network, hardware, and software infrastructure. They apply tools and technologies to ensure that the organization is secure. The Bachelors of Science in Information Assurance and Security degree allows undergraduate learners to acquire and apply various processes, tools, technologies, and methods of securing an enterprise; including security policies, social engineering, access control, authentication, perimeter security, disaster recovery and business continuity, risk management, incident response, viruses, malware, spam, encryption, and other infrastructure security techniques that include governance and strategic alignment of IT and business. In addition to information assurance and security expertise, learners in this concentration demonstrate the business, interpersonal, and communication skills required to influence internal decision making and overall organizational effectiveness. Successful graduates of this concentration are prepared to pursue careers as information security consultants, managers, or security administrators.

Outcomes:

  • Explain how security can be implemented through network communication protocols and supporting network hardware.
  • Demonstrate the ability to incorporate secure practices into the design and development of software programs, database architecture and web-based applications using a security development lifecycle model.
  • Describe how the interaction of computer architecture, operating systems, networking components and databases result in the achievement of an organization’s mission.
  • Demonstrate the proficiency of both a current programming language and scripting language. Examine and explain the benefits of a Computer Incident Response Team and demonstrate the use of tools to audit, detect and investigate the elements of an attack.
  • Recognize, explain and analyze regulations, statutes and laws regarding computer systems security compliance issues.
  • Employ techniques for the collection, analyzing and reporting of digital evidence captured from computers, mobile devices and storage systems to support criminal investigations.
  • Describe and plan the formation of security polices resulting from a comprehensive risk assessment analysis.
  • Explain how an organization’s digital assets are protected by the development of both a Business Continuity Plan and Disaster Recovery Plan.
  • Apply and demonstrate critical thinking skills in areas of advanced research through the design of research papers that could benefit the industry.

Degree Requirements

Courses: General Education

ECON210Principles of Macroeconomics

4.5

ENGL101Composition and Critical Thinking

4.5

ENGL103Composition: Writing and Research

4.5

COMS201Technical and Professional Writing

4.5

HIST101Modern American History: 1950 to the 21st Century

4.5

LITR201Literature: A Reflection of Life

4.5

UNIV104Academic and Career Success

4.5

MATH112Analytic College Algebra

4.5

MATH203Applications of Discrete Mathematics

4.5

MATH301Data Driven Statistics

4.5

 

PHIL301Ethics for Professionals

4.5

or

PHIL306Ethics for the Information Age

4.5

 

PSYC102Introductory Psychology

4.5

or

SOCL102Introductory Sociology

4.5

 

SCI101Introduction to the Sciences

4.5

SCI103Science and Technology- Laboratory Course

1.5

SCI201Environmental Science and Sustainability

4.5

SCI203Environmental Science and Sustainability - Laboratory Course

1.5

Total Credit Hours:66

Courses: Core

CSS150Introduction to Computer Security

4

CSS200Principles of Network Security

4

CSS250Security Risk Management

4

CSS260Scripting with Perl

4

CSS280Ethical Hacking

4

CSS300Vulnerability Assessment and Management

4

CSS321Software Assurance

4

CSS332Database and Web Vulnerabilities and Security

4

CSS340Operating System Security

4

CSS350Computer Forensics I

4

CSS351Computer Forensics II

4

CSS370Security Architecture

4

CSS380Business Continuity and Disaster Recovery Planning

4

CSS410Cloud Computing, Privacy and Security

4

CSS430Advanced Research in IAS and IT Management

4

CSS441Security Compliance

4

CSS450Security Capstone

4

IT254Spreadsheet Applications

4

Total Credit Hours:72

Courses: Concentration

BADM150Contemporary Business Trends

4

CS104Problem Solving Concepts With C++

4

 

CS115Programming With C++

4

or

CS116C# Programming

4

 

CS215Intermediate C++ Programming

4

or

CS216Intermediate C# Programming

4

 

CS250Fundamentals of Database Systems

4

IT205Fundamentals of Networking

4

IT375IT Management Strategy

4

MGM335Organizational Behavior Principles

4

MGMT235Business Law I

4

MGMT345Operations Management

4

MPM332Organizational Leadership

4

BADM370Quality Management

4

Total Credit Hours:48

Total Credit Hours: 186