The Master of Science in Information Technology degree with a specialization in Information Assurance and Security is designed for students looking to become leaders in the fields of digital security, information collection and preservation, and security system creation.
You Can Learn How to:
- Identify the physical and logical threats and vulnerabilities present in new and an existing information system infrastructure
- Identify relevant security technologies and techniques needed to secure an information infrastructure.
- Implement technical and administrative control measures to protect information assets and comply with regulatory standards
- Conduct an analysis of an existing and new information systems infrastructure
- Conduct information systems audit
- Apply best practices and effective procedures to current and relevant information security and assurance problems and challenges
- Create and implement computer and system network defense, both in basic forms and in detail
- Evaluate existing security programs and systems for threats and learn how to fix those threats
- Develop solutions and practices that can be applied to network security maintenance and integrity
- Understand the components and requirements of system security procedures, as well as professional industry expectations
At AIU, more of the courses you take, on average, are devoted to your field of interest than at other similar schools. Your classes may include:
In this course students examine computer networking concepts, which enable them to translate business objectives into a physical network design. Students will be expected to collect and analyze appropriate information to make context-appropriate, network-related, business decisions.
Principles of Information Systems
In this course students examine management skills as they relate to the information technology industry, taking into account the relationship between networking, databases, and programming.
Principles of Information Security
This course covers information security technologies as applied to operating systems, database management systems, and computer networks. The three major goals of information security, confidentiality, integrity and availability, are introduced. Threats, vulnerability, exposure, risks, identity management, incidents response, the state machine model and disaster recovery are also covered.
Applied Cryptography and Network Security
In this course, students learn to apply secure protocols over networked systems using cryptography. Symmetric and asymmetric encryption is covered. Other topics that are also covered include one way function, hash, cryptography arithmetic, public key infrastructure, Digital Signature Algorithm and Internet security issues.
Legal Issues in Information Security and Incident Response
In this course, students explore current issues in network security and apply security concepts. The class focuses on technical topics as well as privacy and policy issues. Computer crimes, evidence presentation, chain of custody and introduction to the United States criminal justice system are also covered.
IT Auditing and Security Risk Management
The course covers information systems control, application audit, security threats, security risk types, computer attacks, countermeasures, and risk management. Risk assessment methodologies, certification, accreditation, information systems auditing and metrics for measuring an organization's information security program are also covered in this course.