Program Details

Program Outline

Program Outline

From mission-critical business systems to e-commerce and the Internet, IT is not only an industry in its own right but also a fundamental building block of all other industries. AIU offers an industry-current BSIT program with an in-depth specialization in Information Assurance and Security designed to help students learn about the types of information technology security used in business today, as well as the practices that should be in place in any organization to ensure security.

Students can learn to work with security software, administer security systems and identify potential security threats organizations may face in a variety of real-world situations. The program also addresses issues of physical and operations security. The Information Assurance and Security specialization program is designed for students looking to pursue career opportunities in the fields of digital security, information collection and preservation, and security-system creation.

We can help you learn how to:

  • Summarize details of essential computer concepts
  • Use an operating system interface to access, add, troubleshoot and configure hardware and manage files
  • Implement a relational database management system utilizing the concepts of database design and data modeling
  • Develop business applications using programming languages, tools and software development methodologies
  • Manage security threats and risks by applying industry-best practices to assure information integrity, confidentiality, availability, non-repudiation and authenticity

Download program detail PDF



Degree Requirements

Lower Division Core
COMP101Introduction to Computers4.5
COMP102Introduction to Computers Lab1.5
ITCO101Discovering Information Technology4.5
ITCO103Introduction to Computer and Network Hardware4.5
ITCO 105Information Technology and Society4.5
ITCO211Introduction to Operating Systems4.5
ITCO221Fundamentals of Programming and Logic4.5
ITCO231Introduction to Databases4.5
ITCO251Network Infrastructure Basics4.5
Total Credit Hours:37.5
Upper Division Core
ITCO321Data Structures and Implementation4.5
ITCO361Information Technology Security4.5
ITCO381Introduction to Web Systems and Media4.5
ITCO391Human/Computer Interfaces and Interactions4.5
ITSD322Object Oriented Application Development I4.5
Total Credit Hours:22.5
General Education
ENGL106English Composition I4.5
ENGL107English Composition II4.5
HIST105U.S. History4.5
HUMA205Art Appreciation4.5
MATH133College Algebra4.5
MATH233Survey of Calculus4.5
PRES111Presentation Essentials4.5
SSCI206Aspects of Psychology4.5
SCIE207Biology Lab1.5
SCIE210Environmental Science4.5
SCIE211Environmental Science Lab1.5
General Education Elective (1)4.5
Total Credit Hours:52.5
General Electives
General Electives -Upper and Lower Division
Total Credit Hours:22.5

Specialization Options

Information Assurance and Security
ITCO299Comprehensive IT Project4.5
ITCO341Applications of Discrete Mathematics and Statistics in IT4.5
ITCO 425System Architecture and Integration4.5
ITCO 498 Program Capstone for IT4.5
ITAS362Introduction to Information Assurance and Information Security4.5
ITAS363Telecommunications and Network Infrastructure Security4.5
ITAS365Information Systems Control and Auditing4.5
ITAS367Principles and Methods in Cryptographic Security4.5
ITAS465Ethical Hacking and Penetration Testing4.5
ITAS469IT Governance for Information Security Managers4.5
Total Credit Hours:45

Total Credit Hours: 180

This program includes a series of courses that correlate to the respective content and competencies of the A+, Security+ and Network+ Certification exams offered by CompTIA¹. This credential can serve as independent validation of the knowledge and skills required to be successful and useful in the fields of information technology, cyber security and computer networking.

AIU B.S.I.T. students will be eligible to receive a discounted rate for the CompTIA examination fee² once all of the following courses have been successfully completed in residence with the universityᶟ:

CompTIA A+ Certification 
CompTIA Network+ Certification  CompTIA Security+ Certification 
ITCO 101 - Discovering Information Technology ITCO 251 - Network Infrastructure Basics ITCO 361 - Information Technology Security
ITCO 103 - Introduction to Computer and Network Hardware ITNA 353 - Routing and Switching ITAS 362 - Introduction to Information Assurance and Information Security
ITCO 211 - Operating Systems ITNA 355 - Advanced Routing and Switching ITAS 363 - Telecommunications and Network Infrastructure Security 
  ITNA 357 - Network Security Management  
  ITNA 457 - Specialized Network Administration  

For more information on the A+, Security+ and Network+ Certifications, including exam objectives, sample questions, and certification information, please visit

¹American InterContinental University does not prepare students to take the exam necessary to receive the A+, Security+ or Network+ credential. AIU does not guarantee third-party certifications. Certification requirements for taking and passing certification examinations are not controlled by AIU but by outside agencies and are subject to change by the agencies without notice to AIU. Therefore, AIU cannot guarantee that students and graduates will be eligible to take certification examinations, regardless of eligibility status upon enrollment and/or graduation.

²Students must contact the office of the Registrar in order to receive the promo code for the discounted exam rate.

ᶟIn order to receive the discounted CompTIA exam rate, the listed courses must be completed in residence at American InterContinental University.

Classes Overview

Classes Overview

At AIU, more of the courses you take, on average, are devoted to your program of interest than at other similar schools. For a Bachelor of Science in Information Technology degree with a specialization in Information Assurance and Security, your classes can include:

Introduction to Information Assurance and Information Security

This class provides students with an overview of network security principles and implementation techniques. Topics covered include authentication issues; examples of attacks and malicious code that may be used against networks, and the countermeasures against these; examples of perimeter and interior attacks; and protecting network services. Additional topics may include risk management and assessment, understanding and developing security policy, and  protective technologies, such as firewall, intrusion detection systems and the use of encryption.

Telecommunications and Network Infrastructure Security

This course covers network security principles and implementation techniques. Topics covered include examples of attacks and countermeasures for securing e-mail, definitions and principles underpinning all IT security, security management, and security architectures. Fundamental concepts, principles, and practical networking and internetworking issues relevant to the design, analysis, and implementation of enterprise-level trusted networked information systems are also covered.

Information Systems Control and Auditing

The course covers the essential subjects and topics in information systems control, including types of audits, types of audit risks, frameworks for management and application controls, audit software and tools, concurrent auditing techniques, data integrity, system effectiveness, IT services delivery, life cycle management, information asset protection, IT governance, business continuity, and system efficiency. Also covered are processes for creating information systems audit and reviewing audit reports.

Principles and Methods in Cryptographic Security

This course covers the mathematical background to cryptography as well as providing a comprehensive review of contemporary cryptographic technologies, as applied to computer and network operations. Topics include determining the appropriate cryptographic targets and methods, digital key management, cryptographic vulnerabilities, and implementation of effective cryptographic methodologies to secure enterprise-wide information systems.

Ethical Hacking and Penetration Testing

This course covers techniques that hackers use to circumvent security and penetrate computers and computer networks. Topics covered include legal framework for conduction penetration testing, foot-printing, social engineering, host reconnaissance, session hijacking methods, denial of service, exploits of web server vulnerabilities, breach of database security, password crackers, Intrusion Prevention Systems (IPS) and firewalls circumvention, routers and switches services disruption, scanning and penetration of wireless networks, and overflow attacks methods and prevention. Other topics covered include creating, using, and preventing Trojan Horses, viruses, and other backdoor hostile codes.

IT Governance for Information Security Managers

This course covers enterprise IT governance framework, enterprise security governance framework, business-based investment decisions, maturity practices, compliance issues, IT security strategies, privacy regulations, computer misuse, and incident investigation procedures.

Applications of Discrete Mathematics and Statistics in IT

In this course, students will examine the essential mathematics and logic skills required in Information Technology areas such as networking, systems administration, security, programming, database management, and computer hardware. Students will build on their mathematical proficiency to prepare for the challenges they are likely to encounter as an IT professional. This course discusses the importance of discrete mathematics, probability and statistics in IT. Students in this course will further their understanding of discrete mathematics and statistics necessary for application development and systems analysis. Students will also learn how to apply statistical techniques to improve the performance of IT systems. Real-world scenarios and problems from the IT industry are included throughout this course.

System Architecture and Integration

In this course, students will analyze the system integration requirements and apply appropriate frameworks, methodologies, and techniques that are used to manage, administer, acquire, develop, implement, and integrate enterprise systems.

Comprehensive IT Project

In this lower division capstone course, students will examine IT project management and systems architecture. Topics covered include project management concepts of time, scope, and costs, as well as systems architecture, sourcing, acquisition, development, and deployment processes.

Information Technology Security

This survey course covers information security concepts and mechanisms. Information security concepts reviewed may include data protection techniques, software security, information assurance process, enterprise network security, and attack types/countermeasures.

Data Structures and Implementation

This course will introduce students to basic data structures and algorithms which are to be used as tools in designing solutions to real-life problems. Students will become familiar with the specification, usage, implementation and analysis of basic data structures and algorithms.

Program Capstone for IT

This course offers students the opportunity to demonstrate their level of understanding regarding the application of information technology concepts, technologies, and methodologies. Students are expected to employ their knowledge about hardware, systems, applications, and security management.

View the Course Catalog

Course content subject to change.

Tuition and Fees

Tuition and Fees

Total tuition for this degree program may vary depending on your educational needs, existing experience, and other factors.

Estimate your costs, potential savings and graduation date.

Ways to Save

Ways to Save

From grants to military service to transfer credit, see the variety of ways you can save time and money on your degree at AIU.

  • Scholarships & Grants - AIU offers a number of institutional scholarships and grants that can help eligible students offset the program cost and help reduce out of pocket costs
  • Military Discounts– AIU Online offers a 45% tuition discount to active military undergraduate students and a 20% tuition discount to active military graduate students, including members of the Reserves and National Guard
  • Transfer Credit – AIU’s transfer-friendly policy lets you transfer in up to 75% of the qualifying credits you need toward your degree
  • Prior Learning Credit – You can receive credits for past college courses, military service, or work experience

For more information, download AIU guides below:

  • Financial Aid Guide: Our guide to financial aid can answer your initial questions and help you prepare to apply for financial aid
  • Scholarships and Grants Guide: Learn about the scholarships and grants offered by AIU along with details about eligibility
  • Transfer Credits Guide: This guide explores how to transfer your credits from other schools—and earn college credit for your past work and military experience
Career Paths

Career Paths

What can you do with a bachelor’s degree in Information Assurance and Security?

With our increasing reliance on technology, specialists in keeping corporate and personal data secure will be needed. An information security analyst implements and carries out security measures to contain and repair breaches while constantly staying on their toes looking for potential threats and vulnerabilities before the hackers and viruses exploit them.

To combat the loss of sensitive data and to ensure customer protection, companies are investing more in information security than ever before.

Roles in Information Security

It can be helpful to think about information security as an industry where roles are, in a sense, divided into three categories:

●     Creating security, such as security software development or cryptology

●     Maintaining security, like security administration

●     Testing security, such as breach testing


While security administration focuses on keeping out unauthorized users or malware, breach testing and vulnerability assessment are devoted to troubleshooting weak spots by hacking—or attempting to hack—a system.

Common roles in information security include:

●     Information security analysis

●     Web penetration testing

●     Security engineering

●     Security architecture

●     Source code auditing

●     Security consulting


With 18% growth projected through 2024—much faster than average, per the BLS1—information security analysts can pursue jobs in nearly every sector, but the most common jobs are found in finance, consulting firms and computer-based businesses.

1 Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, 2016-17 Edition, Information Security Analysts, on the Internet at (visited July 27, 2016).

Related Degrees

Related Degrees

Bachelor of Science in Information Technology (BSIT) Degree: Specialization in Digital Investigations

Organizations across every industry need skilled information technology professionals who can combat the growing threat of web-based crime. Learn essential IT skills with special emphasis on cyber security systems, digital laws and their enforcement.

Bachelor of Science in Information Technology (BSIT) Degree: Specialization in Network Administration

Today’s businesses are increasingly connected and reliant upon tech solutions, including wireless and enterprise networks. By combining core IT skills with an in-depth study of network administration, you can be prepared to analyze, build and maintain diverse computer networks across industries.

Bachelor of Science in Information Technology (BSIT) Degree: Specialization in Software Analysis and Development

Software development can offer IT professionals both creative and analytical challenges. In this program, you can learn to write, test, debug and analyze software applications while also covering the fundamentals of information technology and industry-standard development processes.

Bachelor of Business Administration (BBA) Degree: Specialization in Technology Management

Having an IT background isn’t just helpful; it’s essential for effective business management. With a BBA degree in Technology Management from AIU, you can learn to manage the business side of information technology — including the people, the processes and the resources it takes to succeed.

Take the next step. Classes Start !


Fill out this brief form and an admissions
advisor will contact you within the next day.

By clicking the button below you agree to be contacted by AIU about education services (including through automated and/or pre-recorded means, e.g. dialing and text messaging) via telephone, mobile device (including SMS and MMS), and/or email, even if your telephone number or email address is on a corporate, state or the National Do Not Call Registry, and you agree to our Terms of Use and Privacy Policy. You understand that your consent is not required as a condition to purchase a good or service.

Request Information

By clicking the button below you agree to be contacted by AIU about education services (including through automated and/or pre-recorded means, e.g. dialing and text messaging) via telephone, mobile device (including SMS and MMS), and/or email, even if your telephone number or email address is on a corporate, state or the National Do Not Call Registry, and you agree to our Terms of Use and Privacy Policy. You understand that your consent is not required as a condition to purchase a good or service.

Request Information

By clicking the button below you agree to be contacted by AIU about education services (including through automated and/or pre-recorded means, e.g. dialing and text messaging) via telephone, mobile device (including SMS and MMS), and/or email, even if your telephone number or email address is on a corporate, state or the National Do Not Call Registry, and you agree to our Terms of Use and Privacy Policy. You understand that your consent is not required as a condition to purchase a good or service.

Gainful Employment and Other Student Disclosures

Below you can find placement rates and other information tailored to your chosen campus and program. Certain disclosures are published on this website to assist students in understanding the facts about their programs.

Program Disclosure Information for:
-- Select Campus above --

Employment Rates:

Select a campus for rate information.

- Graduation Rate

Select a campus for rate information.

Classes Start