Bachelor of Science in Information Technology (BSIT) Degree with a Specialization in
Information Assurance and Security

IT security gaps can put even the most successful businesses at risk. A degree in information assurance and security can help you learn to spot weaknesses, create security protocols and devise new ways to protect an organization’s digital assets.

Estimate tuition and fees with our Tuition and Graduation Calculator

CALCULATE
YOUR COST

Next Online Start Date:

January 31, 2018

Total Credits:

180

Offered:

Online
Houston

Program Details

From mission-critical business systems to e-commerce and the Internet, IT is not only an industry in its own right but also a fundamental building block of all other industries. AIU offers an industry-current BSIT program with an in-depth specialization in Information Assurance and Security designed to help students learn about the types of information technology security used in business today, as well as the practices that should be in place in any organization to ensure security.

Students can learn to work with security software, administer security systems and identify potential security threats organizations may face in a variety of real-world situations. The program also addresses issues of physical and operations security. The Information Assurance and Security specialization program is designed for students looking to pursue career opportunities in the fields of digital security, information collection and preservation, and security-system creation.

We can help you learn how to:

  • Summarize details of essential computer concepts
  • Use an operating system interface to access, add, troubleshoot and configure hardware and manage files
  • Implement a relational database management system utilizing the concepts of database design and data modeling
  • Develop business applications using programming languages, tools and software development methodologies
  • Manage security threats and risks by applying industry-best practices to assure information integrity, confidentiality, availability, non-repudiation and authenticity

Download program detail PDF

ACBSPUSNEWS-2017

For a Bachelor of Science in Information Technology degree with a specialization in Information Assurance and Security, your classes may include:

Introduction to Information Assurance and Information Security

This class provides students with an overview of network security principles and implementation techniques. Topics covered include authentication issues; examples of attacks and malicious code that may be used against networks, and the countermeasures against these; examples of perimeter and interior attacks; and protecting network services. Additional topics may include risk management and assessment, understanding and developing security policy, and protective technologies, such as firewall, intrusion detection systems and the use of encryption.

Telecommunications and Network Infrastructure Security

This course covers network security principles and implementation techniques. Topics covered include examples of attacks and countermeasures for securing e-mail, definitions and principles underpinning all IT security, security management, and security architectures. Fundamental concepts, principles, and practical networking and internetworking issues relevant to the design, analysis, and implementation of enterprise-level trusted networked information systems are also covered.

Information Systems Control and Auditing

The course covers the essential subjects and topics in information systems control, including types of audits, types of audit risks, frameworks for management and application controls, audit software and tools, concurrent auditing techniques, data integrity, system effectiveness, IT services delivery, life cycle management, information asset protection, IT governance, business continuity, and system efficiency. Also covered are processes for creating information systems audit and reviewing audit reports.

Principles and Methods in Cryptographic Security

This course covers the mathematical background to cryptography as well as providing a comprehensive review of contemporary cryptographic technologies, as applied to computer and network operations. Topics include determining the appropriate cryptographic targets and methods, digital key management, cryptographic vulnerabilities, and implementation of effective cryptographic methodologies to secure enterprise-wide information systems.

Ethical Hacking and Penetration Testing

This course covers techniques that hackers use to circumvent security and penetrate computers and computer networks. Topics covered include legal framework for conduction penetration testing, foot-printing, social engineering, host reconnaissance, session hijacking methods, denial of service, exploits of web server vulnerabilities, breach of database security, password crackers, Intrusion Prevention Systems (IPS) and firewalls circumvention, routers and switches services disruption, scanning and penetration of wireless networks, and overflow attacks methods and prevention. Other topics covered include creating, using, and preventing Trojan Horses, viruses, and other backdoor hostile codes.

IT Governance for Information Security Managers

This course covers enterprise IT governance framework, enterprise security governance framework, business-based investment decisions, maturity practices, compliance issues, IT security strategies, privacy regulations, computer misuse, and incident investigation procedures.

Applications of Discrete Mathematics and Statistics in IT

In this course, students will examine the essential mathematics and logic skills required in Information Technology areas such as networking, systems administration, security, programming, database management, and computer hardware. Students will build on their mathematical proficiency to prepare for the challenges they are likely to encounter as an IT professional. This course discusses the importance of discrete mathematics, probability and statistics in IT. Students in this course will further their understanding of discrete mathematics and statistics necessary for application development and systems analysis. Students will also learn how to apply statistical techniques to improve the performance of IT systems. Real-world scenarios and problems from the IT industry are included throughout this course.

System Architecture and Integration

In this course, students will analyze the system integration requirements and apply appropriate frameworks, methodologies, and techniques that are used to manage, administer, acquire, develop, implement, and integrate enterprise systems.

Comprehensive IT Project

In this lower division capstone course, students will examine IT project management and systems architecture. Topics covered include project management concepts of time, scope, and costs, as well as systems architecture, sourcing, acquisition, development, and deployment processes.

Information Technology Security

This survey course covers information security concepts and mechanisms. Information security concepts reviewed may include data protection techniques, software security, information assurance process, enterprise network security, and attack types/countermeasures.

Data Structures and Implementation

This course will introduce students to basic data structures and algorithms which are to be used as tools in designing solutions to real-life problems. Students will become familiar with the specification, usage, implementation and analysis of basic data structures and algorithms.

Program Capstone for IT

This course offers students the opportunity to demonstrate their level of understanding regarding the application of information technology concepts, technologies, and methodologies. Students are expected to employ their knowledge about hardware, systems, applications, and security management.


View the Course Catalog

Course content subject to change.

Total tuition for this degree program may vary depending on your educational needs, existing experience, and other factors.

Estimate your costs, potential savings and graduation date.

From grants to military service to transfer credit, see the variety of ways you can save time and money on your degree at AIU.

  • Scholarships & Grants - AIU offers a number of institutional scholarships and grants that can help eligible students offset the program cost and help reduce out of pocket costs
  • Military Discounts – AIU Online offers a 45% tuition reduction to active military undergraduate students and a 20% tuition reduction to active military graduate students, including members of the Reserves and National Guard
  • Transfer Credit – AIU’s transfer-friendly policy lets you transfer in up to 75% of the qualifying credits you need toward your degree
  • Prior Learning Credit – You can receive credits for past college courses, military service, or work experience

For more information, download AIU guides below:

  • Financial Aid Guide: Our guide to financial aid can answer your initial questions and help you prepare to apply for financial aid
  • Scholarships and Grants Guide: Learn about the scholarships and grants offered by AIU along with details about eligibility
  • Transfer Credits Guide: This guide explores how to transfer your credits from other schools—and earn college credit for your past work and military experience

Program Outline

From mission-critical business systems to e-commerce and the Internet, IT is not only an industry in its own right but also a fundamental building block of all other industries. AIU offers an industry-current BSIT program with an in-depth specialization in Information Assurance and Security designed to help students learn about the types of information technology security used in business today, as well as the practices that should be in place in any organization to ensure security.

Students can learn to work with security software, administer security systems and identify potential security threats organizations may face in a variety of real-world situations. The program also addresses issues of physical and operations security. The Information Assurance and Security specialization program is designed for students looking to pursue career opportunities in the fields of digital security, information collection and preservation, and security-system creation.

We can help you learn how to:

  • Summarize details of essential computer concepts
  • Use an operating system interface to access, add, troubleshoot and configure hardware and manage files
  • Implement a relational database management system utilizing the concepts of database design and data modeling
  • Develop business applications using programming languages, tools and software development methodologies
  • Manage security threats and risks by applying industry-best practices to assure information integrity, confidentiality, availability, non-repudiation and authenticity

Download program detail PDF

ACBSPUSNEWS-2017

Classes Overview

For a Bachelor of Science in Information Technology degree with a specialization in Information Assurance and Security, your classes may include:

Introduction to Information Assurance and Information Security

This class provides students with an overview of network security principles and implementation techniques. Topics covered include authentication issues; examples of attacks and malicious code that may be used against networks, and the countermeasures against these; examples of perimeter and interior attacks; and protecting network services. Additional topics may include risk management and assessment, understanding and developing security policy, and protective technologies, such as firewall, intrusion detection systems and the use of encryption.

Telecommunications and Network Infrastructure Security

This course covers network security principles and implementation techniques. Topics covered include examples of attacks and countermeasures for securing e-mail, definitions and principles underpinning all IT security, security management, and security architectures. Fundamental concepts, principles, and practical networking and internetworking issues relevant to the design, analysis, and implementation of enterprise-level trusted networked information systems are also covered.

Information Systems Control and Auditing

The course covers the essential subjects and topics in information systems control, including types of audits, types of audit risks, frameworks for management and application controls, audit software and tools, concurrent auditing techniques, data integrity, system effectiveness, IT services delivery, life cycle management, information asset protection, IT governance, business continuity, and system efficiency. Also covered are processes for creating information systems audit and reviewing audit reports.

Principles and Methods in Cryptographic Security

This course covers the mathematical background to cryptography as well as providing a comprehensive review of contemporary cryptographic technologies, as applied to computer and network operations. Topics include determining the appropriate cryptographic targets and methods, digital key management, cryptographic vulnerabilities, and implementation of effective cryptographic methodologies to secure enterprise-wide information systems.

Ethical Hacking and Penetration Testing

This course covers techniques that hackers use to circumvent security and penetrate computers and computer networks. Topics covered include legal framework for conduction penetration testing, foot-printing, social engineering, host reconnaissance, session hijacking methods, denial of service, exploits of web server vulnerabilities, breach of database security, password crackers, Intrusion Prevention Systems (IPS) and firewalls circumvention, routers and switches services disruption, scanning and penetration of wireless networks, and overflow attacks methods and prevention. Other topics covered include creating, using, and preventing Trojan Horses, viruses, and other backdoor hostile codes.

IT Governance for Information Security Managers

This course covers enterprise IT governance framework, enterprise security governance framework, business-based investment decisions, maturity practices, compliance issues, IT security strategies, privacy regulations, computer misuse, and incident investigation procedures.

Applications of Discrete Mathematics and Statistics in IT

In this course, students will examine the essential mathematics and logic skills required in Information Technology areas such as networking, systems administration, security, programming, database management, and computer hardware. Students will build on their mathematical proficiency to prepare for the challenges they are likely to encounter as an IT professional. This course discusses the importance of discrete mathematics, probability and statistics in IT. Students in this course will further their understanding of discrete mathematics and statistics necessary for application development and systems analysis. Students will also learn how to apply statistical techniques to improve the performance of IT systems. Real-world scenarios and problems from the IT industry are included throughout this course.

System Architecture and Integration

In this course, students will analyze the system integration requirements and apply appropriate frameworks, methodologies, and techniques that are used to manage, administer, acquire, develop, implement, and integrate enterprise systems.

Comprehensive IT Project

In this lower division capstone course, students will examine IT project management and systems architecture. Topics covered include project management concepts of time, scope, and costs, as well as systems architecture, sourcing, acquisition, development, and deployment processes.

Information Technology Security

This survey course covers information security concepts and mechanisms. Information security concepts reviewed may include data protection techniques, software security, information assurance process, enterprise network security, and attack types/countermeasures.

Data Structures and Implementation

This course will introduce students to basic data structures and algorithms which are to be used as tools in designing solutions to real-life problems. Students will become familiar with the specification, usage, implementation and analysis of basic data structures and algorithms.

Program Capstone for IT

This course offers students the opportunity to demonstrate their level of understanding regarding the application of information technology concepts, technologies, and methodologies. Students are expected to employ their knowledge about hardware, systems, applications, and security management.


View the Course Catalog

Course content subject to change.

Tuition and Fees

Total tuition for this degree program may vary depending on your educational needs, existing experience, and other factors.

Estimate your costs, potential savings and graduation date.

Ways to Save

From grants to military service to transfer credit, see the variety of ways you can save time and money on your degree at AIU.

  • Scholarships & Grants - AIU offers a number of institutional scholarships and grants that can help eligible students offset the program cost and help reduce out of pocket costs
  • Military Discounts – AIU Online offers a 45% tuition reduction to active military undergraduate students and a 20% tuition reduction to active military graduate students, including members of the Reserves and National Guard
  • Transfer Credit – AIU’s transfer-friendly policy lets you transfer in up to 75% of the qualifying credits you need toward your degree
  • Prior Learning Credit – You can receive credits for past college courses, military service, or work experience

For more information, download AIU guides below:

  • Financial Aid Guide: Our guide to financial aid can answer your initial questions and help you prepare to apply for financial aid
  • Scholarships and Grants Guide: Learn about the scholarships and grants offered by AIU along with details about eligibility
  • Transfer Credits Guide: This guide explores how to transfer your credits from other schools—and earn college credit for your past work and military experience

Take the next step. Classes Start January 31, 2018

Request Information

* Please correct the following errors:

By clicking the button below you agree to be contacted by AIU about education services (including through automated and/or pre-recorded means, e.g. dialing and text messaging) via telephone, mobile device (including SMS and MMS), and/or email, even if your telephone number or email address is on a corporate, state or the National Do Not Call Registry, and you agree to our Terms of Use and Privacy Policy. You understand that your consent is not required as a condition to purchase a good or service.

Gainful Employment and Other Student Disclosures

Below you can find placement rates and other information tailored to your chosen campus and program. Certain disclosures are published on this website to assist students in understanding the facts about their programs.

Program Disclosure Information for:
-- Select Campus Above --

Program Disclosure Information for:
AIU Atlanta - Bachelor of Science in Information Technology

Gainful Employment Disclosure Button

Program Disclosure Information for:
AIU Online - Bachelor of Science in Information Technology

Gainful Employment Disclosure Button

Program Disclosure Information for:
AIU Houston - Bachelor of Science in Information Technology

Gainful Employment Disclosure Button

Employment Rates:

Select a campus for rate information.

Employment Rates:

Given the fact that all of the rates reflected below are based on historical data and were subject to varying levels of audit and re-interpretation, students should not rely on them as an implicit or explicit representation or promise of future outcomes or employability following completion of a program of study. Indeed, there are numerous factors that affect a student's ability to graduate and secure employment over which we have little or no control. Therefore, our school cannot and does not guarantee or estimate the likelihood of on-time completion, graduation, or employment for any student.

New York Attorney General
Reporting Period: 7/1/2016 through 6/30/2017
Date Submitted: 12/2017

The program rate shown corresponds to the Information Technology (BSIT) program

Campus Rate
NA
Program Rate
66.7%


Graduation Rate

Select a campus for rate information.

AIU Atlanta - Graduation Rate

The percentage of first-time, full-time undergraduate students who started between
7/1/2010 and 10/15/2010 who completed within 150% of the normal time period:

21%
Learn more

AIU Online - Graduation Rate

The percentage of first-time, full-time undergraduate students who started between
7/1/2010 and 10/15/2010 who completed within 150% of the normal time period:

26%
Learn more

AIU Houston - Graduation Rate

The percentage of first-time, full-time undergraduate students who started between
7/1/2010 and 10/15/2010 who completed within 150% of the normal time period:

28%
Learn more

Classes Start January 31, 2018

Questions?

Fill out this brief form and an admissions
advisor will contact you within the next day.

By clicking the button below you agree to be contacted by AIU about education services (including through automated and/or pre-recorded means, e.g. dialing and text messaging) via telephone, mobile device (including SMS and MMS), and/or email, even if your telephone number or email address is on a corporate, state or the National Do Not Call Registry, and you agree to our Terms of Use and Privacy Policy. You understand that your consent is not required as a condition to purchase a good or service.

Accrediation Image