The Bachelor of Science in Information Systems Security combines educational theory with the technical skills required to meet information security needs across the enterprise. This online bachelor’s degree brings you coursework in information assurance, information security, network design and engineering, business continuity, and more. Learning the technological skills required to protect organizational assets from unscrupulous business competitors or unfriendly combatants is paramount to the credibility and survival of businesses, government agencies, and military operations. This online degree program helps to prepare you for careers such as information security manager, analyst, auditor, consultant, or risk assessor.

Degree Program Objectives

In addition to the institutional and general education level learning objectives, this degree also seeks the following specific learning outcomes of its graduates:

  • Use analytical, logical, and critical thinking to analyze user requirements and to design, develop, and deploy effective Information Systems Security solutions.
  • Analyze network designs, topologies, architectures, protocols, communications, administration, operations, and resource management for wired, wireless, and web-based networks.
  • Prescribe Information Assurance initiatives to protect an organization’s information assets by ensuring availability, confidentiality, integrity, authenticity, and non-repudiation.
  • Develop a security architecture consisting of tools, techniques, and technologies to prevent the penetration of networks, to detect attacks, and to design effective countermeasures.
  • Generate a risk assessment and risk mitigation methodology to analyze and manage risks in the context of Network Security.
  • Apply the discipline of network attack and defense to develop effective countermeasures to keeping hackers outside the perimeter of the network.
  • Develop Network Security audit practices, processes, and plans, and specify the roles and responsibilities of the staff on the audit team.
  • Develop actionable and maintainable network and information security plans and policies that address physical security, authentication, network security, encryption, software development, email, internet, acceptable use, acceptable speech, and viruses/worms.

Degree at a Glance

General Education Requirements30
Major Required42
Select one of the following concentrations:15
Final Program Requirements3
Electives30
Total Semester Hours120

Degree Program Requirements

General Education Requirements (30 semester hours)

Arts and Humanities (6 semester hours) 1
Select 2 courses from the following:6
Art Appreciation
Film and Literature
Image Enhancement using Adobe Photoshop
World Literature through the Renaissance
World Literature since the Renaissance
English Literature: Beowulf to18th Century
English Literature: 18th Century to Present
American Literature before The Civil War
American Literature from The Civil War to Present
Arabic I
Arabic II
French I
French II
German I
German II
Introduction to Japanese
Music Appreciation
Introduction to Philosophy
Critical Thinking
Introduction to Ethics
Philosophy of Science
Introduction to Brazilian Portuguese
Introduction to World Religions
Russian I
Spanish I
Spanish II
Civics, Political and Social Sciences (6 semester hours) 1
Select 2 courses from the following:6
Introduction to Anthropology
Introduction to Cultural Anthropology
Human Sexuality
Social Media and Society
Intercultural Communication
Microeconomics
Macroeconomics
Humane Education: A Global Interdisciplinary Perspective
Introduction to Geography
Practical Food Safety and Awareness
International Relations I
Contemporary World Culture Through Literature
Cultural Diversity in Contemporary American Literature
American Government I
Introduction to Psychology
Introduction to Sociology
Social Problems
American Popular Culture
Communication: Writing, Oral, and Multimedia (8 semester hours)
COMM110Information & Digital Literacy2
ENGL110Making Writing Relevant3
Select 1 course from the following:3
Public Speaking
Effectiveness in Writing
Composition and Literature
Technical Writing
Scientific Writing
Business Writing
Human Relations Communication
Information Literacy and Global Citizenship
Introduction to Information Technology Writing
Human Relations
History (3 semester hours)
Select 1 course from the following:3
American History to 1877
American History since 1877
World Civilization before 1650
World Civilization since 1650
Western Civilization before The Thirty Years War
Western Civilization since The Thirty Years War
African-American History before 1877
African-American History since 1877
History of the American Indian
History of Science
Mathematics and Applied Reasoning (3 semester hours)
Select 1 course from the following:3
Accounting for Non Accounting Majors
Fundamentals of Programming
College Algebra
College Trigonometry
Introduction to Statistics
Math for Liberal Arts Majors
Calculus
Natural Sciences with Lab (4 semester hours)
Select 1 course from the following:4
Habitable Worlds Are We Alone with Lab
Introduction to Biology with Lab
Introduction to Chemistry with Lab
Introduction to Human Anatomy & Physiology with Lab
Introduction to Physics with Lab
Introduction to Astronomy with Lab
Introduction to Meteorology with Lab
Introduction to Environmental Science with Lab
Total Semester Hours30
1

All literature courses require successful completion of ENGL101 - Proficiency in Writing or ENGL110 - Making Writing Relevant.

Major Required (42 semester hours)

ENTD261Scripting Languages for the Administrator3
ISSC422Information Security3
ISSC421Computer and Network Security3
INTL440Cyber Warfare3
ISSC342Operating Systems: Hardening and Security3
ISSC351Computer Forensics3
ISSC361Information Assurance3
ISSC362IT Security: Attack & Defense3
ISSC363IT Security: Risk Management3
ISSC471IT Security: Auditing3
ISSC481IT Security: Planning and Policy3
ITMG381Cyberlaw and Privacy in a Digital Age3
ISSC451Cybercrime3
ISSC431Database Systems Security3
Total Semester Hours42

Students must choose a concentration for this degree program and may select from a General Concentration, Concentration in Cloud Computing, Concentration in Cyber Intelligence, Concentration in Cybercrime Investigations, Concentration in Cybersecurity, Concentration in Digital Forensics, Concentration in Homeland Security, or a Concentration in Wireless and Mobile Security.

General Concentration Requirements (15 semester hours)

A general concentration allows you to take courses across a number of areas of study within your program based on your own interests.

Concentration Requirements (15 semester hours)

Select 5 courses from the following:15
Object Oriented Programming With Java
Legal Issues in Information Security
Open Source System Security
IT Security: Access Control and Authentication
Application Security
Statistics
Biometrics
Introduction to Networking
Wireless Networks
IT Security: Cryptography
Virtualization Security
Cloud Security and Privacy
Cybersecurity
Digital Forensics: Investigation Procedures and Response
Digital Forensics: Investigating Wireless Networks and Devices
Digital Forensics: Investigating Network Intrusions and Cybercrime Security
Digital Forensics: Investigating Data and Image Files
Digital Forensics: Hard Disc and Operating Systems
IT Security: Countermeasures
IT Security: Business Continuity
Total Semester Hours15

Concentration in Cloud Computing (15 semester hours)

Explores cloud computing’s key principles, security, and privacy. Examines how to use resources for service specifications and contracts for proper management of cloud services, decision making and management techniques for best practices and organizational growth, and green IT.

Concentration Requirements (15 semester hours)

ISSC326Cloud Computing3
ISSC345Service Oriented Architecture3
ISSC386Green Computing: Foundations and Strategies3
ISSC424Virtualization Security3
ISSC426Cloud Security and Privacy3
Total Semester Hours15

Concentration in Cyber Intelligence (15 semester hours)

Infiltration in an organization’s systems may have already been targeted covertly and waiting for an appropriate moment for a beneficial attack by the adversary. Through information collection, social engineering, and reverse engineering of applications, cyber intelligence gives the tools necessary not only for an organization to protect its systems but also for the adversary to attack them with the same means. A complete vulnerability and threat analysis of all systems, cyber operational processes and policies in place, and revamping to build more resilient systems is key to stopping the adversary her path to approaching, attacking, or damaging the organization’s systems. This concentration prepares the student to protecting systems targeted at multiple levels based on various laws, regulations, and Presidential directives. Possible target careers include: Cyber Intelligence Analyst, Cyber Threat Intelligence Analyst, Cyber Threat Analyst, and Cybersecurity Intelligence Analyst.

Objectives

Upon completion of this concentration, students will be able to:

  • Examine the homeland security threat landscape through risks, threats, and consequences facing critical homeland security infrastructure.
  • Demonstrate comprehensive knowledge of counterintelligence through its role of supporting the United States counterterrorism and cyberspace activities, functions, and cyberspace operations for guarding and protecting the nation.
  • Examine the history, collections platforms, doctrinal employment, and the application of Signals Intelligence against current and future threats and challenges to national security.
  • Demonstrate a solid understanding of assessment of threats to states through vulnerabilities of non-state actors.
  • Through the use of various tools identify problems with confidentiality, integrity, and availability arising from the increased use of cyber technology and its devices.

Concentration Requirements (15 semester hours)

HLSS320Intelligence and Homeland Security3
INTL410Counterintelligence3
INTL421Signals Intelligence and Security3
INTL434Threat Analysis3
ISSC452Cybersecurity3
Total Semester Hours15

Concentration in Cybercrime Investigations (15 semester hours)

 Cybercrime is on the rise resulting in billions of dollars in loss annually. The Federal Bureau of Investigation, the lead federal agency for investigating cyberattacks is working around the clock, on finding the targeting adversaries. Understanding how the adversary designs, plans, and attacks is a skill highly sought after in multiple sectors across the job market. Possible target careers include: Cyber Investigator, Cyber Action Team, Investigative Specialist, and Evidence Response Team.

Objectives

Upon completion of this concentration, students will be able to:

  • Demonstrate the role of the courts in the reformation of the U.S. criminal justice system and its relationship between the law and theories of crime to the justice policies and processes.
  • Analyze the procedures for conducting a criminal investigation, interview and interrogation, and the process of preserving the integrity and chain of custody for a crime scene.
  • Examine the current use of intelligence in law enforcement and its applications in support of investigations and operational planning.
  • Utilize various crime analysis tools to effectively reduce crime and improve policy efficiency in preventing criminal activity relative to societal interdependencies.
  • Through the use of various tools identify problems with confidentiality, integrity, and availability arising from the increased use of cyber technology and its devices.

Concentration Requirements (15 semester hours)

CMRJ303Criminology3
CMRJ306Criminal Investigation3
CMRJ320Law Enforcement Intelligence Applications3
CMRJ335Crime Analysis3
ISSC452Cybersecurity3
Total Semester Hours15

Concentration in Cybersecurity (15 semester hours)

Covers the processes and goals of cyber forensics investigations, and explores federal and state laws and legal concepts affecting how governments and organizations think about information security. Teaches the importance of search warrants and chain of custody in forensic investigations. Examines cybersecurity regulatory standards and compliance requirements, and explores technologies needed to detect, investigate, and prevent computer-related crimes.

Concentration Requirements (15 semester hours)

ISSC331Legal Issues in Information Security3
ISSC325Biometrics3
ISSC343Wireless Networks3
ISSC452Cybersecurity3
ISSC457Digital Forensics: Investigating Network Intrusions and Cybercrime Security3
Total Semester Hours15

Concentration in Digital Forensics (15 semester hours)

Explores common incident response procedures and the forensics of wireless network attacks caused by mobile and wireless peripheral devices. Examines security and access procedures and how search warrants, chains of custody, and investigation logs impact digital investigations. Topics include basic tracking techniques and computer-related crimes, image file analysis, crime prevention techniques, and password cracking on various operating systems.

Concentration Requirements (15 semester hours)

ISSC455Digital Forensics: Investigation Procedures and Response3
ISSC456Digital Forensics: Investigating Wireless Networks and Devices3
ISSC457Digital Forensics: Investigating Network Intrusions and Cybercrime Security3
ISSC458Digital Forensics: Investigating Data and Image Files3
ISSC459Digital Forensics: Hard Disc and Operating Systems3
Total Semester Hours15

Concentration in Homeland Security (15 semester hours)

Critical infrastructures at the national level are continually targeted by the adversary through cyberattacks, cyberespionage, and cyber hacktivism. Assessing vulnerabilities and threats, increasing levels of protection and prevention against such threats, addressing cyber operational processes, and mitigating and building more resilient systems is key to the prevention of future cyberattacks of the nation’s infrastructure and systems. This concentration expands on a holistic approach to cybersecurity and cyber operations. Possible target careers include: Cyber Incident Prevention and Response Team, Cyber Risk and Strategic Analyst, Cyber Intelligence Analyst, Cyber Threat Intelligence Analyst, Cyber Threat Analyst, and Homeland Security Cyber Intelligence Analyst.

Objectives

Upon completion of this concentration, students will be able to:

  • Examine risk management in homeland security operations, its capabilities and limitations for homeland security support through assessments of United States critical infrastructure protection programs.
  • Examine the roles and responsibilities of U.S. intelligence community members at the federal, state, and local levels, which support homeland security strategic process and operations.
  • Examine the homeland security threat landscape through risks, threats, and consequences facing critical homeland security infrastructure.
  • Examine the history, collections platforms, doctrinal employment, and the application of Signals Intelligence against current and future threats and challenges to national security.
  • Through the use of various tools identify problems with confidentiality, integrity, and availability arising from the increased use of cyber technology and its devices.

Concentration Requirements (15 semester hours)

HLSS302Introduction to Homeland Security and Defense3
HLSS303Homeland Security Risk, Threats and Consequences3
HLSS320Intelligence and Homeland Security3
INTL421Signals Intelligence and Security3
ISSC452Cybersecurity3
Total Semester Hours15

Concentration in Wireless and Mobile Security (15 semester hours)

Mobile devices have become very common with everyone in everyday use – often using multiple mobile devices, cellular, Tablets, e-Readers, wearables and implantable electronics, etc., in addition to laptops and notebooks, simultaneously. These devices use wireless and mobile networks and downloadable applications and software, opening a wide array of security and privacy issues unsuspected by the user. This concentration for the Bachelors of Science in Information Systems Security will allow students to specialize in the methodologies used to secure the networks, hardware – devices, software – apps, and the laws and regulations, policies and procedures, and ethical responsibilities for privacy and security of mobile devices using mobile and wireless network infrastructures. The concentration will emphasize countermeasures taken to harden the security of various aspects of mobile technologies associated to government, military, industry, educational, and private enterprises.

Objectives

Upon successful completion of this concentration, students will be able to:

  • Examine current mobile and wireless networks, their architecture, infrastructure, and various utilized components.
  • Extrapolate threats and vulnerabilities introduced into the network infrastructures of wireless, mobile, cellular, and satellite technologies.
  • Examine current mobile application models, their security framework, and methodologies on hardening the security to safeguard the devices running them.
  • Appraise security hardening techniques for wireless or mobile device technologies based on wireless security principles and current industry standards.
  • Compare and contrast the needs of law-enforcement versus individual right-to-privacy in wireless infrastructures.
  • Prepare a group presentation or individual written assignment on a relevant wireless or mobile security topic.

Concentration Requirements (15 semester hours)

ISSC343Wireless Networks3
ISSC412Mobile Application Security3
ISSC415Mobile Device Security3
ISSC442Wireless and Mobile Network Security3
ITMG381Cyberlaw and Privacy in a Digital Age3
Total Semester Hours15

Final Program Requirements (3 semester hours)

ISSC498IT Security: Implementation Plan: Capstone (to be taken as the last course before graduation) 13
Total Semester Hours3
1

Prerequisite: ENGL101 - Proficiency in Writing or ENGL110 - Making Writing Relevant and Senior Standing and completion of all major courses prior to enrollment.

Electives (30 semester hours)

Select any courses that have not been used to fulfill major requirements. Credits applied toward a minor or certificate in an unrelated field may be used to fulfill elective credit for the major.