2025 Undergraduate Catalog

Undergraduate Course Descriptions

Information Technology (ISSC)

ISSC221 Intermediate Computer Systems (3 semester hours)

This course is a study of computer systems, computer organization, computer subsystems, and operating systems. This course examines CPUs, motherboards, basic input/output systems, memory subsystems, bus structures, expansion cards, ports, connectivity, interfaces, data storage subsystems, and multimedia interface devices. This course also evaluates computer monitoring, computer systems management, operating systems, networking, and security. This course covers the CompTIA A+® Certification Essentials curriculum. CompTIA A+® is a registered trademark of the Computing Technology Industry Association, Inc.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC231 Networking Concepts (3 semester hours)

This course is a study of the evolution, the concepts, and the principles of local, distributed and enterprise networking. This course examines Network design, topologies, architecture, media, interface cards, protocols, problem resolution, communications, administration, operations, and resources. It introduces the student to the concepts of wireless networking, and web-based networks. This course also explores the Open Systems Interconnection (OSI) and the Transmission Control Protocol/ Internet Packet (TCP/IP) reference models. This course also examines internetworking servers, and hardware and operating systems maintenance.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC242 Hardening Operating Systems (3 semester hours)

This course is a study of the principles and concepts of Network Security from various aspects including but not limited to hardware, software, and other critical elements relating to the CIA Triad. There is an emphasis on standard Operating System (OS) functions and discovering vulnerabilities. Upon completion of this course, students will be able to demonstrate an understating of methodologies and measures necessary to take a preventive stance to address security vulnerabilities. Students will examine the principles, practices, and policies related to hardening and securing Operating Systems. This course focuses on vulnerabilities and related countermeasures of various Windows components

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC262 Red and Blue Team Security (3 semester hours)

This course examines the techniques and technologies for penetration of networks, detection of attacks, and prevention of attacks. This course addresses the techniques, the technologies, and the methodologies used by cyber intruders (hackers) to select a target and launch an attack. Students will gain insight into the motives and desired goals of hackers as well as effective tools and techniques used as countermeasures ensuring data assets remain secure. This course focuses on techniques and technologies to detect such attacks even while the attack is in progress; early detection enables the administrator to track the movements of the hacker and to discover the intent and goals of the hacker. This course assesses the various countermeasures to keep the system out of the “sights” of the hacker and to keep the hacker out of the perimeter of the target network. This course also explores the laws and the legal considerations in prosecuting computer crime.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC266 Cryptography Concepts (3 semester hours)

This course will provide an extensive overview of the field of cryptography, which includes but not limited to a historical perspective on early systems, building to the number theoretic foundations of modern day cryptosystems. Upon completion of this course students will have the ability to demonstrate a knowledge of how cryptosystems are designed, and to match cryptosystems to the needs of an application. Students will also study basic cryptanalysis and will be presented with real life breaches of common cryptosystems so that they better understand the dangers within cryptosystem design and in the design of systems that rely on cryptography. Students will also gain an understanding of the various methods of encryption and analyze the strength and weaknesses of various techniques to ensure data assets are protected and secure.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC290 Securing Databases (3 semester hours)

This course is an introductory study of the principles, practices, procedures, and methodologies to ensure security of data at rest within databases. It appraises the convergence between database security and associated threat vectors and attack methods. It examines database types, security architecture, platform fundamentals, user administration, password management, security models, virtual private databases, and auditing models. It reviews database security processes, security configuration techniques, and auditing checklists. Course topics include: Secure Architecture, Privilege Management, and Auditing Processes.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC297 Securing Applications (3 semester hours)

This course is an introductory study of the principles, practices, procedures, and methodologies to ensure security of data within web-based applications. It examines secure coding practices and processes, web application security configuration management techniques, and web application security standards. It appraises the convergence between web application security and associated threat vectors/attack methods. It appraises secure development processes, web application secure configuration techniques, and legal issues related to securing vital digital assets. Course topics include: Secure Configuration & Development, Vulnerability & Risk Mitigation, Vulnerability Assessments & QA Testing, and PCI DSS Compliance. Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC298 Cybersecurity Capstone Portfolio (3 semester hours)

This Capstone course provides a comprehensive overview of major components of Information Systems Security. The course explores various security-related plans and policies that demonstrate mastery of the program of study and results in a meaningful culmination of the student’s learning; these plans and policies will be used to assess one’s level of mastery of the stated outcomes of the degree requirements. This is a capstone course to be taken after all other Information Systems Security courses have been satisfactorily completed. (Prerequisite: Completion of a minimum of 57 hours towards the degree program)

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC322 Computer Systems Organization: Advanced (3 semester hours)

This course is an advanced study of computer systems with a focus on operating systems, system administration, networking and security. Design, configuration techniques and troubleshooting skills techniques are covered utilizing a variety of hardware scenarios including: processor design, CPU architecture, number systems used in computing, storage subsystems, and memory subsystems, This course also examines the OSI model, networking, security, performance management, and capacity planning. This course covers the CompTIA A+® Certification curriculum. (Prerequisite: ISSC321) CompTIA A+® is a registered trademark of the Computing Technology Industry Association, Inc.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC323 Computer Hardware Systems (3 semester hours)

This course is a technical study of the hardware systems and architectures in a computer system; it appraises expansion cards, storage subsystems, IO interface subsystems, operating system, Local Area Networking (LAN), Internet connectivity, and security. This course also examines the processes for analyzing problems and for synthesizing solutions related to computer hardware systems.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC325 Biometrics (3 semester hours)

This course presents an introduction to biometrics, the study of recognizing individuals based on their unique physical or behavioral traits related to computer and information security. Authentication, authorization, identification, and access control through biometric perspective are emphasized. The course orients practical applications of biometrics in the real world, providing a realistic view of the use of biometrics within the emerging threats in information security.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC326 Cloud Computing (3 semester hours)

This course will delve into all aspects of a Cloud Computing implementation, starting from a definition of what it actually means and assessment of whether it is suitable for a given company to the strategy alignment, implementation and operation of a working solution. It will cover Infrastructure-as-a-Service, Platform-as-a-Service, and Software-as-a-Service as the many integration and management components that are necessary to make this work together to fulfill business requirements.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC331 Legal Issues in Information Security (3 semester hours)

This course examines information security issues and the law. The rapid growth of technology has given rise to legal issues surrounding technology. Information security is the practice of protecting information to ensure the goals of confidentiality, integrity and availability are met. Information security makes sure that accurate information is available to authorized individuals when it is needed. When governments, private organizations, and individuals do a poor job of protecting the information entrusted to them, legislatures respond with new laws. The course will examine key conflicts involving technology and the legal system to include: privacy issues, civil, criminal, and administrative law, Children’s Online Privacy Protection Act (COPPA), Sarbanes Oxley, and information security governance. This course examines current literature on such topics.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC343 Wireless Networks (3 semester hours)

This course offers a framework for learning the latest developments and trends in ad-hoc wireless and mobile communications. The course provides a complete coverage of the wireless ad-hoc networks: principles, protocols and applications. The course will look at the characteristics and operations of contemporary ad-hoc wireless network technologies. Students will study the impact of wireless transmission and user mobility with an emphasis on the design and management of ad-hoc wireless mobile systems. Students must have access to MS Visio software. Course software requirements with the appropriate versions are listed under the course materials site. This course meets the topical requirements of the DoD Directive 8570.1M Information Assurance Management (IAM) Technical I category.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC344 Open Source System Security (3 semester hours)

This course is an introductory study of the principles, practices, procedures, and methodologies to provide security on Linux systems. It assesses the security risks, threats and vulnerabilities related to individual and enterprise Linux environments. Course topics include: user privileges and permissions, file systems volumes and encryption and kernel security risk mitigation. Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC345 Service Oriented Architecture (3 semester hours)

This course examines the various aspects of a Service-oriented Architecture (SOA). It explores the comprehensive plan to interrelate business with technology. It displays how SOA combines the talents and skills of an entire organization, with its requisite needs and computing know-how. It focuses on the necessary tools—processes, best practices, and standards—for developing a sound SOA, Service-Oriented Modeling: Service Analysis, Design, and Architecture. It also introduces a service-oriented modeling framework that employs an agile and universal business and technology language to facilitate analysis, design, and architecture initiatives.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC351 Computer Forensics (3 semester hours)

The explosion in the use of the Internet and the ensuing growth in cybercrime have given rise to the field of computer forensics (also called digital forensics). Digital forensics is used to assemble digital evidence to prosecute cybercrime, analyze intrusions, mitigate risk, and for data recovery. This course examines the theory, best practices, and methodologies to conduct computer forensics investigations; it includes the ethical issues, data presentation, and chain-of-evidence procedures. It also appraises current tools and technologies to analyze, acquire, and organize digital evidence. This course maps to the general objectives of the International Association of Computer Investigative Specialists (IACIS) certification. Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC361 Information Assurance (3 semester hours)

This course is a study of the discipline of Information Assurance that focuses on protecting information assets by ensuring availability, confidentiality, integrity, authenticity, and non- repudiation. This course delves into the deliberate engineering, planning and implementation of the five major areas in any enterprise: hardware, software, networks, people, and policies. This course meets the topical requirements of the DoD Directive 8570.1M Information Assurance Management (IAM) Technical III, Management II and Management III categories.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC363 IT Security: Risk Management (3 semester hours)

This course explores Networking Security from the perspective of risk management and confirms that assessment of IP based Network systems is critical to developing strategies to mitigate and manage risks. This course focuses on effective assessment strategies that ultimately help the student to implement effective and proactive risk mitigation measures and risk management practices. It exposes the vulnerabilities of TCP/IP; and appraises risk assessment, risk analysis, risk mitigation, risk management, networking components and Virtual Private Networks (VPN). This course examines the tools and techniques used to attack, test and assure the security of the remote information, maintenance, FTP, database, email, UNIX RPC, and IP VPN services. The student will apply this knowledge to develop an assessment methodology that identifies, attacks, and penetrates IP based network systems.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC364 IT Security: Access Control and Authentication (3 semester hours)

This course examines a broad range of network security issues. It explores how access controls protect resources against unauthorized viewing, tampering, or destruction and serves as a primary means of ensuring privacy, confidentiality, and prevention of unauthorized access and disclosure. It focuses on access control, such as components, processes, controls, and authentication, as well as security breaches, organizational behavior and social engineering, physical security, remote access control, public key infrastructure and encryption, cryptography, testing, and information assurance. Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC368 IT Security: Physical and Peripheral Defense (3 semester hours)

The course covers physical security requirements in a network enterprise on varying levels including physical protection against internal and external threats that may impact people, property, and other data and networked assets. Students will learn how to assess and protect these assets via multiple layers of physical security.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC412 Mobile Application Security (3 semester hours)

This course explores security strengths and weaknesses of applications on various mobile operating systems running on PDAs and mobile devices. It identifies, analyzes and explores vulnerabilities, attacks, exploits, and insecurities of mobile applications running on operating systems such as iOS, Android, Windows®, and BlackBerry® OS. What constitutes designing secure code for apps on these operating systems will also be covered. BlackBerry® is a registered trademark of BlackBerry Limited.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC415 Mobile Device Security (3 semester hours)

This course explores security strengths and weaknesses of devices running various mobile operating systems. It identifies, analyzes and explores vulnerabilities, attacks, exploits, and insecurities of mobile applications running on operating systems such as iOS, Android, Windows, and Blackberry OS. A comparative study of current mobile devices with respect to security and privacy capabilities will be covered.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC421 Computer and Network Security (3 semester hours)

This course allows the student to obtain the knowledge required to analyze and mitigate threats in the organizational network environment. Upon completion of this course, students will be able to demonstrate a knowledge of both computer and network security, from the wetware (human), software, and hardware perspectives. The "wetware" component will deal with identification of potential risk situations, establishing policies for avoidance, recovery, and prosecution, and proactive measures to reduce causal factors for security breaches in an organization. The "software" perspective will examine types of inappropriate software activity, as well as asset protection issues (recognizing software assets). This component will also address software tools available to assist in reducing administrative costs due to both malicious and accidental loss. The "hardware" component will address hardware approaches to protecting assets, as well as hardware techniques used to compromise assets. Specific technologies discussed include firewalls, symmetric key encryption, public key encryption, digital certificates, and cryptographic systems (SSL/TLS, VPNs, and Kerberos).

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC422 Information Security (3 semester hours)

This course allows students to examine a broad range of computer security issues and provides the student with technical knowledge not normally addressed in traditional training. It explores the protection of proprietary information and security planning with an emphasis on networked computer vulnerabilities. It also focuses on detection (e.g. viruses, hackers, types of computer crime, computer forensic examination, etc.), as well as disaster recovery and technology law. A primary focus is put on security of systems and computer crime prevention. Also addressed is the maturing criminal population with increased computer literacy, whose tendency is to move from violent actions to more profitable computer crime. Finally, issues of privacy and freedom of information are examined. This course meets the topical requirements of the DoD Directive 8570.1M Information Assurance Management (IAM) Technical II and Management I categories. Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC426 Cloud Security and Privacy (3 semester hours)

This course will provide necessary guidance to build a proper audit to ensure that operational integrity and customer data protection, among other aspects, are addressed for cloud based resources. This course will serve as a cloud computing reference for auditors and IT Security Professionals. It will also provide information to assist in preparing for an audit addressing cloud computing.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC442 Wireless and Mobile Network Security (3 semester hours)

The mobile communication market has grown so rapidly keeping up security in wireless networks has become a challenge. Maintaining secure connectivity on mobile devices as well as retaining flexibility, mobility, and resilience are critical to keeping files, data, and information secure and private. This course explores security issues surrounding mobile cellular communication technologies. Hands-on labs are also included as practical examples of wireless network security. (Prerequisite: ISSC343)

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC451 Cybercrime (3 semester hours)

The rapid change in technology and the exponential growth in the use of the Internet have resulted in an increase in the number of computer and technology related crimes. This course is designed to provide students with the foundational knowledge and technologies needed to detect, investigate, and prevent computer related crimes. Topics to be covered include: cybercrime classification (hacking, denial of service attacks, cyberstalking, cyberbullying, virus dissemination, identity theft, electronic funds transfers, phishing, spoofing, Internet fraud, access device fraud and salami attacks), vulnerability of computer systems and computer applications, computer intrusions and attacks, the impact of cybercrime (social, economic, and legal), investigation of digital evidence, computer forensics, and the prevention of cybercrime.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC452 Cybersecurity (3 semester hours)

This course examines the practices for assuring information security. The various roles and functions within the Cybersecurity practice will be combined and leveraged to produce a secure organization. Case studies will be used to examine theories and practices drawn from real world situations. The numerous pitfalls of Cybersecurity will be presented with everyday practices of securing companies resources from attack. This course will examine the frameworks, roles, and competencies involved with information security. The fundamentals of Cybersecurity will be examined to include: network and security concepts, attacker techniques, data security, system and applications security and incident response techniques. Current literature will be examined on such topics.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC455 Digital Forensics: Investigation Procedures and Response (3 semester hours)

This course is an introduction to Computer Forensics Investigation Procedures and Response. It provides a basic understanding of the importance of computer forensics, how to set up a secure lab, the process for forensic investigation including first responder responsibilities, how to handle various incidents and information on the various reports used by computer forensic investigators.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC456 Digital Forensics: Investigating Wireless Networks and Devices (3 semester hours)

The growth of wireless networking technologies has given rise to many security issues. Wireless technology has become popular because of its convenience and low cost. This course pertains to the study of Computer Forensics Students will be introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. An overview of cybercrime and security will be addressed by explaining the basic security procedures and will include discussions of the various security threats that today’s users face. This course will prepare students to gather all necessary information and evidence to support prosecution in a court of law. This course will examine wireless networks and devices and will discuss how to investigate wireless attacks, as well as PDA, iPod®, iPhone®, iPad®, and BlackBerry® forensics. Current literature will be examined on such topics. iPod®, iPhone® and iPad® are registered trademarks of Apple, Inc. BlackBerry® is a registered trademark of BlackBerry Limited.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC457 Digital Forensics: Investigating Network Intrusions and Cybercrime Security (3 semester hours)

The increase in the use of the Internet and ensuing growth in cybercrime have given rise to the field of digital forensics. Students will be introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. This course examines computer related crime and abuse cases in order to gather all necessary information and evidence to support prosecution in a court of law. Collection of evidence, investigating information hiding, and intrusion response techniques will be explored. This course will examine network intrusions, network traffic, web attacks, DoS attacks and corporate espionage. Current literature will be examined on such topics.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC458 Digital Forensics: Investigating Data and Image Files (3 semester hours)

This course is designed to expose the student to the process of detecting attacks and collecting evidence in a forensically sound manner with the intent to report crime and prevent future attacks. Learners are introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. The course provides a basic understanding of steganography, data acquisition and duplication. It examines how to recover deleted files and partitions and image file forensics.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC459 Digital Forensics: Hard Disc and Operating Systems (3 semester hours)

This course is designed to expose the student to the process of detecting attacks and collecting evidence in a forensically sound manner with the intent to report crime and prevent future attacks. Learners are introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. The course provides a basic understanding of file systems, hard disks and digital media devices. Boot processes, Windows and Linux Forensics and application of password crackers.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC461 IT Security: Countermeasures (3 semester hours)

This course is a study of Network Security attacks and countermeasures. This course examines various security technologies, such as: intrusion detection, authentication, session hijacking, sniffing, spoofing, denial of service, buffer overflow attack, port scanning, encryption, IPSec, DES encryption, triple DES encryption, message digest 5 algorithm, point-to-point tunneling protocol (PPTP), layer 2 tunneling protocol (L2TP), Kerberos, RSA Pretty Good Privacy(PGP), Secure Shell (SSH), Secure Sockets Layer (SSL), Stateful Packet Inspection (SPI), Network Address Translation (NAT), proxies, content filters, public/private keys, Public Key Infrastructure (PKI), Virtual Private Networks (VPN), security policies, security tokens, digital certificates, viruses, worms, Trojan horses, virus scanners, virus protection, vulnerability assessment, and vulnerability scanners.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC471 IT Security: Auditing (3 semester hours)

Security is one of the most important concerns in the world of Information Technology. This course examines the technical issues and the administrative practices to implement and manage security; in particular, this course focuses on the principles of security auditing. This course explores the various technologies and tools to assist with discovery and auditing in the world of security management. This course also assesses the audit practices, audit processes, audit plans, discovery process, discovery software, penetration strategies, identification of potential attacks, log analysis, user baseline analysis, activity analysis, risk assessment, roles and responsibilities, and the roles and responsibilities of security auditing professionals.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC473 IoT Surveillance (3 semester hours)

As technology continues to integrate in diverse areas of our daily environment the possibility of being monitored via an Internet of Things (IoT) device drastically increases. This course will look at how technologies including medical devices, vehicles, wearable tech, and smart homes can be used as a surveillance tools.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC474 Networking Surveillance (3 semester hours)

The course focuses on the tools and methods that are used to remotely monitor and analyze network traffic. Students will exposed to various surveillance techniques including cellular, video, and cloud. The ability to use social media as a means to monitor individuals remotely will be addressed. Network Intrusion and Detection Systems as a mitigation method will be reviewed.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC475 Bias in Surveillance (3 semester hours)

Digital Surveillance in conjunction with Artificial Intelligence creates innovative opportunities to increase the effectiveness of remote monitoring however there are concerns that widespread surveillance can have unforeseen consequences. This course will address potential biases of electronic monitoring including the color of surveillance phenomenon, governmental authority, and religious concerns.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC476 Surveillance Legislation and Policy (3 semester hours)

This course examines legislative and policy areas related to surveillance and privacy. The ability for organizations and governments to remotely monitor and track individuals has given rise to legal and ethical concerns which are addressed. This course will examine how laws have had to change to account for the new possibilities of privacy violations.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC477 ICS and SCADA Security Architecture (3 semester hours)

This course provides an overview of the architecture of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems and how these system can be secured. Students will explore issues such as planning and developing an ICS/SCADA network, learn about PLC devices and their role in these systems, diagraming and ensuring secure communications and operations, and implementing security standards.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC478 SCADA Risk Management (3 semester hours)

This course provides an overview into risk management techniques used in securing Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems. Students will explore how the unique equipment in these systems affect an otherwise standard risk assessment and risk management strategy for the average enterprise network. Students will also learn the different mitigation techniques that can be implemented to mitigate the identified risks. (Prerequisite: ISSC477)

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC479 SCADA Security Standards (3 semester hours)

This course provides an overview into the security standards and policies involved in Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems. Students will explore the standards laid out in federal, state, and local laws, as well as those developed by the Federal Government via the National Institute of Standards and Technology (NIST) and the Department of Homeland Security (DHS). Students will also explore other potential external authorities that may play a role in certain critical infrastructure sectors as well as various industry groups focusing on information sharing. (Prerequisite: ISSC478)

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC480 Threats to SCADA Networks (3 semester hours)

This course provides a peek into the latest threats to Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems. Students will explore historical attacks against critical infrastructures across the world to develop an understanding of the challenges faced in securing these systems. Key topics such as malware threats, insider attacks, denial of service, hacker attacks, and terrorism will be reviewed. (Prerequisite: ISSC479)

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC481 IT Security: Planning and Policy (3 semester hours)

This course examines the principles of security planning and policy; it offers a holistic approach to cybersecurity for an organization. It focuses on a variety of security guidelines, policies and plans (security requirements, internal users, external users, operational costs, geography, capacity plan, growth plan, business organization, business scenarios, business factors, business processes, business functions, business products, product life cycle, technical factors, roles and responsibilities, and organizational authority). This course addresses physical security, authentication, network security, encryption, software development, email, Internet, acceptable use, acceptable speech, and viruses/worms. It also covers the need for actionable and maintainable policies and the need for periodic audits of policies and configurations.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC483 Privacy and Cyberethics in Mobile and Wireless Networks (3 semester hours)

The Internet’s explosive growth and the availability of a myriad of devices that connect each of us with one another using a various mobile network technologies empowering us to great capabilities, has given rise to questioning if any limitations do exist. The manners by which we use our devices for the purposes we desire to accomplish, may also disarm us with what is still unknown to us. Concerning ethical issues, cyber governance, and cyber and privacy policies are eminent to keeping order for a chaotic realm of cyber communications. In this course you will explore some of these policies, the ethical approach and our moral duties in cyber obligations.

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC498 IT Security: Implementation Plan: Capstone (3 semester hours)

This Capstone course is a senior level course designed to allow the student to review, analyze and integrate the work the student has completed toward a degree in Information Systems Security. Students will complete various security related plans and policies that demonstrate mastery of their program of study and results in a meaningful culmination of their learning; these plans and policies will be used to assess their level of mastery of the stated outcomes of their degree requirements. This is a capstone course to be taken after all other Information Systems Security courses have been satisfactorily completed. (Prerequisite: Completion of a minimum of 106 hours towards your program including ENGL101 or ENGL110)

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

ISSC499 Senior Seminar in Cybersecurity (3 semester hours)

This Capstone course is a senior level course designed to allow the student to review, analyze, and integrate the work the student has completed toward the Bachelors of Science in Cybersecurity degree. Students will examine a number of real-world scenario cases related to various aspects of Cybersecurity to complete various cybersecurity related plans and policies that demonstrate mastery of their program of study in a meaningful culmination of their learning and to assess their level of mastery of the stated outcomes of their degree requirements. (Prerequisite: Completion of a minimum of 105 hours towards your program including ENGL101 or ENGL110)

View the course schedule AMU or APU to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.

Overview

If you're ready to move forward, we're ready to take you there.

APPLY TO AMU APPLY TO APU