Program Details

Program Outline

From mission-critical business systems to e-commerce and the Internet, IT is not only an industry in its own right but also a fundamental building block of all other industries. AIU offers an industry-current BSIT program with an in-depth specialization in Information Assurance and Security designed to help students learn about the types of information technology security used in business today, as well as the practices that should be in place in any organization to ensure security.

Students can learn to work with security software, administer security systems and identify potential security threats organizations may face in a variety of real-world situations. The program also addresses issues of physical and operations security. The Information Assurance and Security specialization program is designed for students looking to pursue career opportunities in the fields of digital security, information collection and preservation, and security-system creation.

We can help you learn how to:

  • Summarize details of essential computer concepts
  • Use an operating system interface to access, add, troubleshoot and configure hardware and manage files
  • Implement a relational database management system utilizing the concepts of database design and data modeling
  • Develop business applications using programming languages, tools and software development methodologies
  • Manage security threats and risks by applying industry-best practices to assure information integrity, confidentiality, availability, non-repudiation and authenticity

Requirements

General Education

ENG 106 English Composition I

4.5

ENG 107 English Composition II

1.5

HIST 105 U.S. History

4.5

HUMA 205 Art Appreciation

4.5

MATH 133 College Algebra

4.5

MATH 233 Survey of Calculus

4.5

PRES 111 Presentation Essentials

4.5

SSCI 206 Aspects of Psychology

4.5

SCIE 206 Biology

4.5

SCIE 207 Biology Lab

4.5

SCIE 210 Environmental Science

4.5

SCIE 211 Environmental Science Lab

4.5

General Education Electives (1)

4.5

Total Credit Hours: 52.5

 

General Electives

General Electives -Upper and Lower Division
Total Credit Hours: 22.5

 

Lower Division Core

COMP 101 Introduction to Computers

4.5

COMP 102 Introduction to Computers Lab

1.5

ITCO 101 Discovering Information Technology

4.5

ITCO 103 Introduction to Computer and Network Hardware

4.5

ITCO 105 Information Technology and Society

4.5

ITCO 211 Introduction to Operating Systems

4.5

ITCO 221 Fundamentals of Programming and Logic

4.5

ITCO 231 Introduction to Databases

4.5

ITCO 251 Network Infrastructure Basics

4.5

Total Credit Hours: 37.5

Upper Division Core

ITCO 321 Data Structures and Implementation

4.5

ITCO 361 Information Technology Security

4.5

ITCO 381 Introduction to Web Systems and Media

4.5

ITCO 391 Human/Computer Interfaces and Interactions

4.5

ITSD 322 Object Oriented Application Development I

4.5

Total Credit Hours: 22.5

Information Assurance and Security 

ITCO 299 Comprehensive IT Project

4.5

ITCO 341 Applications of Discrete Mathematics and Statistics in IT

4.5

ITCO 425 System Architecture and Integration

4.5

ITCO 498 Program Capstone for IT

4.5

ITAS 362 Introduction to Information Assurance and Information Security

4.5

ITAS 363 Telecommunications and Network Infrastructure Security

4.5

ITAS 365 Information Systems Control and Auditing

4.5

ITAS 367 Principles and Methods in Cryptographic Security

4.5

ITAS 465 Ethical Hacking and Penetration Testing

4.5

ITAS 469 IT Governance for Information Security Managers

4.5

Classes Overview

At AIU, more of the courses you take, on average, are devoted to your program of interest than at other similar schools. For a Bachelor of Science in Information Technology degree with a specialization in Information Assurance and Security, your classes can include:

Introduction to Information Assurance and Information Security

This class provides students with an overview of network security principles and implementation techniques. Topics covered include authentication issues; examples of attacks and malicious code that may be used against networks, and the countermeasures against these; examples of perimeter and interior attacks; and protecting network services. Additional topics may include risk management and assessment, understanding and developing security policy, and  protective technologies, such as firewall, intrusion detection systems and the use of encryption.

Telecommunications and Network Infrastructure Security

This course covers network security principles and implementation techniques. Topics covered include examples of attacks and countermeasures for securing e-mail, definitions and principles underpinning all IT security, security management, and security architectures. Fundamental concepts, principles, and practical networking and internetworking issues relevant to the design, analysis, and implementation of enterprise-level trusted networked information systems are also covered.

Information Systems Control and Auditing

The course covers the essential subjects and topics in information systems control, including types of audits, types of audit risks, frameworks for management and application controls, audit software and tools, concurrent auditing techniques, data integrity, system effectiveness, IT services delivery, life cycle management, information asset protection, IT governance, business continuity, and system efficiency. Also covered are processes for creating information systems audit and reviewing audit reports.

Principles and Methods in Cryptographic Security

This course covers the mathematical background to cryptography as well as providing a comprehensive review of contemporary cryptographic technologies, as applied to computer and network operations. Topics include determining the appropriate cryptographic targets and methods, digital key management, cryptographic vulnerabilities, and implementation of effective cryptographic methodologies to secure enterprise-wide information systems.

Ethical Hacking and Penetration Testing

This course covers techniques that hackers use to circumvent security and penetrate computers and computer networks. Topics covered include legal framework for conduction penetration testing, foot-printing, social engineering, host reconnaissance, session hijacking methods, denial of service, exploits of web server vulnerabilities, breach of database security, password crackers, Intrusion Prevention Systems (IPS) and firewalls circumvention, routers and switches services disruption, scanning and penetration of wireless networks, and overflow attacks methods and prevention. Other topics covered include creating, using, and preventing Trojan Horses, viruses, and other backdoor hostile codes.

IT Governance for Information Security Managers

This course covers enterprise IT governance framework, enterprise security governance framework, business-based investment decisions, maturity practices, compliance issues, IT security strategies, privacy regulations, computer misuse, and incident investigation procedures.

Applications of Discrete Mathematics and Statistics in IT

In this course, students will examine the essential mathematics and logic skills required in Information Technology areas such as networking, systems administration, security, programming, database management, and computer hardware. Students will build on their mathematical proficiency to prepare for the challenges they are likely to encounter as an IT professional. This course discusses the importance of discrete mathematics, probability and statistics in IT. Students in this course will further their understanding of discrete mathematics and statistics necessary for application development and systems analysis. Students will also learn how to apply statistical techniques to improve the performance of IT systems. Real-world scenarios and problems from the IT industry are included throughout this course.

System Architecture and Integration

In this course, students will analyze the system integration requirements and apply appropriate frameworks, methodologies, and techniques that are used to manage, administer, acquire, develop, implement, and integrate enterprise systems.

Comprehensive IT Project

In this lower division capstone course, students will examine IT project management and systems architecture. Topics covered include project management concepts of time, scope, and costs, as well as systems architecture, sourcing, acquisition, development, and deployment processes.

Information Technology Security

This survey course covers information security concepts and mechanisms. Information security concepts reviewed may include data protection techniques, software security, information assurance process, enterprise network security, and attack types/countermeasures.

Data Structures and Implementation

This course will introduce students to basic data structures and algorithms which are to be used as tools in designing solutions to real-life problems. Students will become familiar with the specification, usage, implementation and analysis of basic data structures and algorithms.

Program Capstone for IT

This course offers students the opportunity to demonstrate their level of understanding regarding the application of information technology concepts, technologies, and methodologies. Students are expected to employ their knowledge about hardware, systems, applications, and security management.


View the Course Catalog

Course content subject to change.

Tuition and Fees

Don't let tuition worries stop you from pursuing a degree. AIU offers a variety of grants, scholarships, financial aid as well as straightforward pricing with no hidden costs to help make college more affordable for our students.

Tuition and Fees Schedule

Find more information on Tuition and Financial Aid for AIU Campuses and Military.

AIU Online

AIU Atlanta

AIU Houston

Military

What is financial aid?

Financial aid is the name used for federal, state and private resources that may help pay for college costs.  Typically financial aid consists of grants, scholarships, loans and student employment.  At American InterContinental University, we strive to take as much stress out of the financial aid process as possible for our students.

How do I apply for financial aid?

The Free Application for Federal Student Aid, more commonly known as the FAFSA, is the single application needed to apply for all sources of federal aid. The FAFSA can be completed online at www.fafsa.ed.gov 

Tuition and Financial Aid Resources

For more information on tuition and financial aid and how you can save money on tuition, click the links below:

Tuition and Financial Aid Guide: Find out how you can save money on tuition.

Transfer Credit Guide: You can transfer in up to 75% of your qualifying credits towards your degree.

Grants Guide: Find out if you qualify for one of AIU’s grants and scholarships.

Net Price Calculator: Get an estimate of your tuition and fees including financial aid, grants, scholarships, loans and military benefits.

Ways to Save

From grants to military service to transfer credit, see the variety of ways you can save time and money on your degree at AIU.

  • Scholarships & Grants - AIU offers a number of institutional scholarships and grants that can help eligible students offset the program cost and help reduce out of pocket costs
  • Military Discounts– AIU Online offers a 45% tuition discount to active military undergraduate students and a 20% tuition discount to active military graduate students, including members of the Reserves and National Guard
  • Transfer Credit – AIU’s transfer-friendly policy lets you transfer in up to 75% of the qualifying credits you need toward your degree
  • Prior Learning Credit – You can receive credits for past college courses, military service, or work experience

For more information, download AIU guides below:

  • Financial Aid Guide: Our guide to financial aid can answer your initial questions and help you prepare to apply for financial aid
  • Scholarships and Grants Guide: Learn about the scholarships and grants offered by AIU along with details about eligibility
  • Transfer Credits Guide: This guide explores how to transfer your credits from other schools—and earn college credit for your past work and military experience

Career Paths

What can you do with a bachelor’s degree in Information Assurance and Security?

With our increasing reliance on technology, specialists in keeping corporate and personal data secure will be needed. An information security analyst implements and carries out security measures to contain and repair breaches while constantly staying on their toes looking for potential threats and vulnerabilities before the hackers and viruses exploit them.

To combat the loss of sensitive data and to ensure customer protection, companies are investing more in information security than ever before.

Roles in Information Security

It can be helpful to think about information security as an industry where roles are, in a sense, divided into three categories:

●     Creating security, such as security software development or cryptology

●     Maintaining security, like security administration

●     Testing security, such as breach testing

 

While security administration focuses on keeping out unauthorized users or malware, breach testing and vulnerability assessment are devoted to troubleshooting weak spots by hacking—or attempting to hack—a system.

Common roles in information security include:

●     Information security analysis

●     Web penetration testing

●     Security engineering

●     Security architecture

●     Source code auditing

●     Security consulting

 

With 18% growth projected through 2024—much faster than average, per the BLS1—information security analysts can pursue jobs in nearly every sector, but the most common jobs are found in finance, consulting firms and computer-based businesses.


1 Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, 2016-17 Edition, Information Security Analysts, on the Internet at http://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm (visited July 27, 2016).

Related Degrees

Explore Similar Programs

Bachelor of Science in Information Technology (BSIT) Degree: Specialization in Digital Investigations

Organizations across every industry need skilled information technology professionals who can combat the growing threat of web-based crime. Learn essential IT skills with special emphasis on cyber security systems, digital laws and their enforcement.

Bachelor of Science in Information Technology (BSIT) Degree: Specialization in Network Administration

Today’s businesses are increasingly connected and reliant upon tech solutions, including wireless and enterprise networks. By combining core IT skills with an in-depth study of network administration, you can be prepared to analyze, build and maintain diverse computer networks across industries.

Bachelor of Science in Information Technology (BSIT) Degree: Specialization in Software Analysis and Development

Software development can offer IT professionals both creative and analytical challenges. In this program, you can learn to write, test, debug and analyze software applications while also covering the fundamentals of information technology and industry-standard development processes.

Bachelor of Business Administration (BBA) Degree: Specialization in Technology Management

Having an IT background isn’t just helpful; it’s essential for effective business management. With a BBA degree in Technology Management from AIU, you can learn to manage the business side of information technology — including the people, the processes and the resources it takes to succeed.

Request Information

By clicking the button below you agree to be contacted by AIU about education services (including through automated and/or pre-recorded means, e.g. dialing and text messaging) via telephone, mobile device (including SMS and MMS), and/or email, even if your telephone number or email address is on a corporate, state or the National Do Not Call Registry, and you agree to our Terms of Use and Privacy Policy. You understand that your consent is not required as a condition to purchase a good or service.

Gainful Employment and Other Student Disclosures

Below you can find placement rates and other information tailored to your chosen campus and program. Certain disclosures are published on this website to assist students in understanding the facts about their programs.

Program Disclosure Information for:
-- Select Campus above --

Employment Rates:

Select a campus for rate information.

- Graduation Rate

Select a campus for rate information.

Don't forget:
Classes Start January 11, 2017