The Information Assurance and Security specialization program is designed for students looking to pursue career opportunities in the growing fields of digital security, information collection and preservation and security system creation. Students can learn to work with security software, administer security systems and identify potential security threats organizations may face in a variety of real-world situations.
You Can Learn How to:
- Summarize details of essential computer concepts.
- Use an operating system interface to access, add, troubleshoot and configure hardware and manage files.
- Implement a relational database management system utilizing the concepts of database design and data modeling.
- Develop business applications using programming languages, tools and software development methodologies.
- Manage security threats and risks by applying industry-best practices to assure information integrity, confidentiality, availability, non-repudiation and authenticity.
- Apply best practices and effective procedures to current and relevant information security and assurance problems and challenges
- Create and implement computer and system network defense, both in basic forms and in detail
- Evaluate existing security programs and systems for threats and learn how to fix those threats
- Develop solutions and practices that can be applied to network security maintenance and integrity
- Understand the components and requirements of system security procedures, as well as professional industry expectations
At AIU, more of the courses you take, on average, are devoted to your field of interest than at other similar schools. Your classes may include:
Information Systems Control and Auditing
The course covers the essential subjects and topics in information systems control, including types of audits, types of audit risks, frameworks for management and application controls, audit software and tools, concurrent auditing techniques, data integrity, system effectiveness, IT services delivery, life cycle management, information asset protection, IT governance, business continuity, and system efficiency. Also covered are processes for creating information systems audit and reviewing audit reports.
Principles and Methods in Cryptographic Security
This course covers the mathematical background to cryptography as well as providing a comprehensive review of contemporary cryptographic technologies, as applied to computer and network operations. Topics include determining the appropriate cryptographic targets and methods, digital key management, cryptographic vulnerabilities, and implementation of effective cryptographic methodologies to secure enterprise-wide information systems.