Total tuition for this degree program may vary depending on your educational needs, existing experience, and other factors.
From mission-critical business systems to e-commerce and the Internet, IT is not only an industry in its own right but also a fundamental building block of all other industries. AIU offers an industry-current BSIT program with an in-depth specialization in Information Assurance and Security designed to help students learn about the types of information technology security used in business today, as well as the practices that should be in place in any organization to ensure security.
Students can learn to work with security software, administer security systems and identify potential security threats organizations may face in a variety of real-world situations. The program also addresses issues of physical and operations security. The Information Assurance and Security specialization program is designed for students looking to pursue career opportunities in the fields of digital security, information collection and preservation, and security-system creation.
We can help you learn how to:
- Summarize details of essential computer concepts
- Use an operating system interface to access, add, troubleshoot and configure hardware and manage files
- Implement a relational database management system utilizing the concepts of database design and data modeling
- Develop business applications using programming languages, tools and software development methodologies
- Manage security threats and risks by applying industry-best practices to assure information integrity, confidentiality, availability, non-repudiation and authenticity
Download program detail PDF
|ENGL 106||English Composition I||4.5|
|ENGL 107||English Composition II||4.5|
|MATH 125||General College Mathematics||4.5|
|MATH 133||College Algebra||4.5|
|UNIV 103||Academic and Professional Success||4.5|
|UNIV 106||Technology and Information Literacy||4.5|
|UNIV 109||Interpersonal Communication||4.5|
|Humanities (2 Courses)||9|
|Natural Sciences (2 Courses)||9|
|Social and Behavorial Sciences (2 Courses)||9|
|Total Credit Hours:||58.5|
|ITCO 101||Discovering Information Technology||4.5|
|ITCO 103||Introduction to Computer and Network Hardware||4.5|
|ITCO 107||Developing Professional Communications||4.5|
|ITCO 211||Introduction to Operating Systems||4.5|
|ITCO 221||Fundamentals of Programming and Logic||4.5|
|ITCO 231||Introduction to Databases||4.5|
|ITCO 251||Network Infrastructure Basics||4.5|
|ITCO 361||Information Technology Security||4.5|
|ITCO 381||Introduction to Web Systems and Media||4.5|
|ITCO 391||Human/Computer Interfaces and Interactions||4.5|
|ITCO 427||Mobile Technology||4.5|
|ITCO 498||Program Capstone for IT||4.5|
|MGMT 412||Project Management||4.5|
|Total Credit Hours:||58.5|
Information Assurance Security Track
|ITAS 362||Introduction to Information Assurance and Information Security||4.5|
|ITAS 363||Telecommunications and Network Infrastructure Security||4.5|
|ITAS 365||Information Systems Control and Auditing||4.5|
|ITAS 367||Principles and Methods in Cryptographic Security||4.5|
|ITAS 465||Ethical Hacking and Penetration Testing||4.5|
|ITAS 469||IT Governance for Information Security Managers||4.5|
|ITCO 299||Comprehensive IT Project||4.5|
|ITCO 341||Applications of Discrete Mathematics and Statistics in IT||4.5|
|ITCO 425||System Architecture and Integration||4.5|
|Total Credit Hours:||63|
Total Credit Hours: 180
|CompTIA A+ Certification||CompTIA Network+ Certification||CompTIA Security+ Certification|
|ITCO 101 - Discovering Information Technology||ITCO 251 - Network Infrastructure Basics||ITCO 361 - Information Technology Security|
|ITCO 103 - Introduction to Computer and Network Hardware||ITNA 353 - Routing and Switching||ITAS 362 - Introduction to Information Assurance and Information Security|
|ITCO 211 - Operating Systems||ITNA 355 - Advanced Routing and Switching||ITAS 363 - Telecommunications and Network Infrastructure Security|
|ITNA 357 - Network Security Management|
|ITNA 457 - Specialized Network Administration|
For more information on the A+, Security+ and Network+ Certifications, including exam objectives, sample questions, and certification information, please visit http://certification.comptia.org/getCertified/certifications.aspx.
1American InterContinental University does not prepare students to take the exam necessary to receive the A+, Security+ or Network+ credential. AIU does not guarantee third-party certifications. Certification requirements for taking and passing certification examinations are not controlled by AIU but by outside agencies and are subject to change by the agencies without notice to AIU. Therefore, AIU cannot guarantee that students and graduates will be eligible to take certification examinations, regardless of eligibility status upon enrollment and/or graduation.
2Students must contact the office of the Registrar in order to receive the promo code for the discounted exam rate.
3In order to receive the discounted CompTIA exam rate, the listed courses must be completed in residence at American InterContinental University.
For a Bachelor of Science in Information Technology degree with a specialization in Information Assurance and Security, your classes may include:
Introduction to Information Assurance and Information Security
This class provides students with an overview of network security principles and implementation techniques. Topics covered include authentication issues; examples of attacks and malicious code that may be used against networks, and the countermeasures against these; examples of perimeter and interior attacks; and protecting network services. Additional topics may include risk management and assessment, understanding and developing security policy, and protective technologies, such as firewall, intrusion detection systems and the use of encryption.
Telecommunications and Network Infrastructure Security
This course covers network security principles and implementation techniques. Topics covered include examples of attacks and countermeasures for securing e-mail, definitions and principles underpinning all IT security, security management, and security architectures. Fundamental concepts, principles, and practical networking and internetworking issues relevant to the design, analysis, and implementation of enterprise-level trusted networked information systems are also covered.
Information Systems Control and Auditing
The course covers the essential subjects and topics in information systems control, including types of audits, types of audit risks, frameworks for management and application controls, audit software and tools, concurrent auditing techniques, data integrity, system effectiveness, IT services delivery, life cycle management, information asset protection, IT governance, business continuity, and system efficiency. Also covered are processes for creating information systems audit and reviewing audit reports.
Principles and Methods in Cryptographic Security
This course covers the mathematical background to cryptography as well as providing a comprehensive review of contemporary cryptographic technologies, as applied to computer and network operations. Topics include determining the appropriate cryptographic targets and methods, digital key management, cryptographic vulnerabilities, and implementation of effective cryptographic methodologies to secure enterprise-wide information systems.
Ethical Hacking and Penetration Testing
This course covers techniques that hackers use to circumvent security and penetrate computers and computer networks. Topics covered include legal framework for conduction penetration testing, foot-printing, social engineering, host reconnaissance, session hijacking methods, denial of service, exploits of web server vulnerabilities, breach of database security, password crackers, Intrusion Prevention Systems (IPS) and firewalls circumvention, routers and switches services disruption, scanning and penetration of wireless networks, and overflow attacks methods and prevention. Other topics covered include creating, using, and preventing Trojan Horses, viruses, and other backdoor hostile codes.
IT Governance for Information Security Managers
This course covers enterprise IT governance framework, enterprise security governance framework, business-based investment decisions, maturity practices, compliance issues, IT security strategies, privacy regulations, computer misuse, and incident investigation procedures.
Applications of Discrete Mathematics and Statistics in IT
In this course, students will examine the essential mathematics and logic skills required in Information Technology areas such as networking, systems administration, security, programming, database management, and computer hardware. Students will build on their mathematical proficiency to prepare for the challenges they are likely to encounter as an IT professional. This course discusses the importance of discrete mathematics, probability and statistics in IT. Students in this course will further their understanding of discrete mathematics and statistics necessary for application development and systems analysis. Students will also learn how to apply statistical techniques to improve the performance of IT systems. Real-world scenarios and problems from the IT industry are included throughout this course.
System Architecture and Integration
In this course, students will analyze the system integration requirements and apply appropriate frameworks, methodologies, and techniques that are used to manage, administer, acquire, develop, implement, and integrate enterprise systems.
Comprehensive IT Project
In this lower division capstone course, students will examine IT project management and systems architecture. Topics covered include project management concepts of time, scope, and costs, as well as systems architecture, sourcing, acquisition, development, and deployment processes.
Information Technology Security
This survey course covers information security concepts and mechanisms. Information security concepts reviewed may include data protection techniques, software security, information assurance process, enterprise network security, and attack types/countermeasures.
Data Structures and Implementation
This course will introduce students to basic data structures and algorithms which are to be used as tools in designing solutions to real-life problems. Students will become familiar with the specification, usage, implementation and analysis of basic data structures and algorithms.
Program Capstone for IT
This course offers students the opportunity to demonstrate their level of understanding regarding the application of information technology concepts, technologies, and methodologies. Students are expected to employ their knowledge about hardware, systems, applications, and security management.
View the Course Catalog
Course content subject to change.
From grants to military service to transfer credit, see the variety of opportunities available to save time and money on your degree at AIU.
- Scholarships & Grants - AIU offers a number of institutional scholarships and grants that can help eligible students offset the program cost and help reduce out of pocket costs
- Reduced Military Tuition Rate – AIU Online offers a 45% tuition reduction to active military undergraduate students and a 20% tuition reduction to active military graduate students, including members of the Reserves and National Guard
- Transfer Credit – AIU’s transfer-friendly credit policy lets you transfer in up to 75% of the qualifying credits needed toward your degree
- Prior Learning Credit – You can receive credits for past college courses, qualifying military service, or eligible work experience
For more information, review the AIU guides below:
- Financial Aid Guide: Our guide to financial aid can answer your initial questions and help you prepare to apply for financial aid
- Scholarships and Grants Guide: Learn about the scholarships and grants offered by AIU along with details about eligibility
- Transfer Credit Guide: This guide explores how to transfer your credits from other schools—and earn college credit for your eligible past work and qualifying military experience
Gainful Employment and Other Student Disclosures
Below you can find placement rates and other information tailored to your chosen campus and program. Certain disclosures are published on this website to assist students in understanding the facts about their programs.
Program Disclosure Information for:
-- Select Campus Above --
Program Disclosure Information for:
AIU Atlanta - Bachelor of Science in Information Technology
Program Disclosure Information for:
AIU Online - Bachelor of Science in Information Technology
Program Disclosure Information for:
AIU Houston - Bachelor of Science in Information Technology
Given the fact that all of the rates reflected below are based on historical data and were subject to varying levels of audit and re-interpretation, students should not rely on them as an implicit or explicit representation or promise of future outcomes or employability following completion of a program of study. Indeed, there are numerous factors that affect a student's ability to graduate and secure employment over which we have little or no control. Therefore, our school cannot and does not guarantee or estimate the likelihood of on-time completion, graduation, or employment for any student.
New York Attorney General
Date Submitted: 12/2017
The program rate shown corresponds to the Information Technology (BSIT) program
Classes Start May 30, 2018