2025 Undergraduate Catalog

Undergraduate Certificate - Information Systems Security Essentials

The undergraduate certificate in Information Systems Security Essentials focuses on protecting information assets by ensuring availability, confidentiality, integrity, authenticity, and non-repudiation of information systems. This program concentrates on five key aspects of information security: hardware, software, networks, people, and policies. Security threats increase in number and severity at a faster rate than qualified security professionals can fill the necessary gap. Knowledgeable security professionals are needed even in a troubled economy, as businesses are forced to prioritize to invest in a secure digital environment.

Courseware in this online program is designed to prepare you for the CompTIA Security+® certification. It meets the topical requirements of the DoD Directive 8570.1M Information Assurance Management (IAM) Technical III, Management II and Management III categories. Additionally, the National Security Agency (NSA) Information Assurance Courseware Evaluation (IACE) has certified some courses for this program.

CompTIA Security+® is a registered trademark of the Computing Technology Industry Association, Inc.

Certificate Objectives

Upon successful completion of this certificate, the student will be able to:

  • Evaluate information security strategies, architectures, and plans to counteract intruders in an information system.
  • Appraise national and federal laws, policies, and guidance related to information assurance; also develop an awareness of the social, psychological, ethical, and legal policies and requirements in the field of information assurance.
  • Examine and profile the various types of security attacks and exploits; also appraise various security technologies, such as: packet filtering, Stateful Packet Inspection (SPI), proxy technology, Network Address Translation (NAT), Public Key Infrastructure (PKI) authentication, and encryption.
  • Analyze the concept and the functionality of firewalls, routers, Virtual Private Networks (VPN), and Intrusion Detection Systems (IDS).
  • Appraise the role of security assessments, penetration testing, and security plans in establishing network security; also evaluate the components of a network security assessment methodology.
  • Investigate methods to mitigate risk by minimizing the exposure of information to hackers, and the techniques hackers use to avoid detection and to cover their electronic footprints.
  • Develop an assessment methodology that identifies, attacks, and penetrates IP based network systems.
  • Define public key cryptography, the purpose of digital certificates, and risk analysis & explain ways to securely manage operations.

Certificate Requirements (18 semester hours)

Overview

If you're ready to move forward, we're ready to take you there.

APPLY TO AMU APPLY TO APU