eduglopedia.org

Summary

Information security is the protection of the confidentiality, integrity, and availability of information while in transmission, storage, or processing. Information assurance concerns information operations that protect and defend information and information systems by ensuring availability, integrity, authentication, confidentiality, and nonrepudiation. This program spans both areas in its approach to the protection of information in the organization.

Information security and assurance is a fast growing industry, with a good employment outlook. If you enjoy critical thinking and problem solving, and can tolerate moments of stress, this may be a good career for you. Early career job titles include information technology specialist, data security administrator, information security analyst, information security specialist, information systems security analyst, and information technology security analyst.

"The National Security Agency and the Department of Homeland Security have designated Kennesaw State University as a National Center of Academic Excellence in Information Assurance/Cyber Defense Education with Focus Areas in 1) Security Policy Development and Compliance and 2) Systems Security Administration".

 

Required Courses

IS 3100 Information Systems Management 

ISA 3100 Principles of Information Security

ISA 3010 Security Script Programming

ISA 3200 Network Security

ISA 3210 Client Systems Security

ISA 3300 Management of Information Security in a Global Environment

ISA 4200 Perimeter Defense

ISA 4220 Server Systems Security

ISA 4810 Cyber Defense 

 

Optional Electives (Pick 2)

IS 3920 Application Development II

ISA 3710 International Issues in Information Security & Assurance

ISA 4330  Incident Response & Contingency Planning

ISA 4350 Management of Digital Forensics & eDiscovery

ISA 4700 Emerging Issues in Information Security

ISA 4805 Penetration Testing

ISA 4820 ISA Programs & Strategies

ISA 4400 Directed Study

ISA 4490 Special Topics in ISA 

Highlights

  • National Center of Academic Excellence in Information Assurance/Cyber Defense Education with Focus Areas in 1) Security Policy Development and Compliance and 2) Systems Security Administration

Majors

Information Security and Assurance
Information security is the protection of the confidentiality, integrity, and availability of information while in transmission, storage, or processing. Information assurance concerns information operations that protect and defend information and information systems by ensuring availability, integrity, authentication, confidentiality, and nonrepudiation. This program spans both areas in its approach to the protection of information in the organization.
Schedule Part-time and full-time
Duration 2 Years
Presence of students On-campus and on-line
Scholarships available Yes

Courses

Lecture

This course will provide an overview of fundamentals of information systems technologies and their applicability to real world scenarios. Topics may vary as technology changes but the students will learn the tools of productivity. The course aims to improve communications skills appropriate to the business setting.

 391
Lecture

This course provides a study of secure programming and security scripting techniques. The course examines aspects of developing traditional computer software, applying additional controls and measures to prevent the development of vulnerable and exploitable code. The course then examines scripting techniques used in support of ongoing technical security functions.

Notes: Offered as an online course.

 304
Lecture

An introduction to the various technical and administrative aspects of Information Security and Assurance. This course provides the foundation for understanding the key issues associated with protecting information assets, determining the levels of protection and response to security incidents, and designing a consistent, reasonable information security system, with appropriate intrusion detection and reporting features.

Notes: Offered as an online course.

 276
Lecture

This course provides a detailed examination of tools, techniques, and technologies used in the protection of information assets. This course is designed to provide a solid foundation in data communications and networking fundamentals and the security of networks and networking technologies.

Notes: Offered as an online course

 296
Lecture

This course is an exploration of client computer system security and vulnerabilities, including client computer architectures, and operating systems. It provides the detailed technical coverage necessary to protect computer information system clients by presenting the knowledge of client platform computer hardware components, client network devices and interfaces, as well as the structure and usage of common client operating system software from an information security perspective. Additional learning regarding ongoing maintenance and operational issues of client computing systems will also be included.

Notes: Offered as an online course.

 267
Lecture

This course provides a detailed examination of the administration of the information security function beginning with the strategic planning process and including an examination of the policies, procedures, and staffing functions necessary to organize and administrate ongoing security functions in the organization. Subjects include security practices, security architecture security in light of international regulation, competition, and operating environments is emphasized througout the course.

Notes: Offered as an online course.

 293
Lecture

This course is an interdisciplinary examination of detailed aspects of contingency planning and crisis management. It includes disaster recovery planning, business continuity planning, and a complete and detailed treatment of crisis management. Students will learn to develop and execute plans for implementing contingency operations when critical functions are disrupted.

 272
Course

A supervised work experience for a minimum of two semesters at a site in business, industry, or government, focusing on some aspect of information security and assurance. For junior- or senior-level students who wish to obtain on-the-job experience in Information Security and Assurance, in conjunction with their academic training. Students may take a cooperative study for multiple semesters, however only six credit hours are applicable toward the BBA in Information Security and Assurance as Business Electives. Contact the department office for additional information on the requirements and restrictions of the cooperative study.

Notes: Co-op credit can be used only in the “Business Electives” area of the BBA.

 292
Course

A supervised work experience for one semester at a site in business, industry or government, focusing on some aspect of information security and assurance. For sophomore-, junior-, or senior-level students who wish to obtain on-the-job training experience in Information Security and Assurance, in conjunction with their academic training. Students can earn between one and six credit hours toward their degree programs subject to the programs’ restrictions. Contact the department office for additional information on the requirements and restrictions for the internship.

Notes: Internship credit can be used only in the “Business Electives” area of the BBA.

 274
Lecture

This course explores emerging international issues in information security and assurance. It provides content about the interaction between the organization, society, and public agencies across national boundaries. It examines the role of people versus technical security as currently debated by contemporary organizations from multiple cultures and nations. Each semester, the specifics of this course will be developed to leverage the current international information security landscape and the context of the scheduled course offering.


 241
Lecture

A detailed examination of the techniques, tools, and technologies used to support the protection of an organization’s electronic perimeter. The course will examine the evaluation, selection, deployment, and administration of firewall, virtual private network, intrusion detection and prevention systems, and other applications used to guard organizational information from external attacks.

Notes: Offered as an online course.

 326
Lecture

This course is an exploration of server computer system security and vulnerabilities, including server computer architectures, and operating systems. It provides the detailed technical coverage necessary to protect computer information system servers by presenting the knowledge of server platform computer hardware components, server network devices and interfaces, as well as the structure and usage of common server operating system software from an information security perspective. Additional learning regarding ongoing maintenance and operational issues of server computing systems will also be included.

Notes: Offered as an online course.

 309
Lecture

An examination of the detailed aspects of incident response and contingency planning consisting of incident response planning, disaster recovery planning, and business continuity planning. Developing and executing plans to deal with incidents in the organization is a critical function in information security. This course focuses on the planning processes for all three areas of contingency planning incident response, disaster recovery, and business continuity, and the execution of response to human and non-human incidents in compliance with these policies.

Notes: Offered as an online course.

 269
Lecture

This course focuses on the detection, isolation and response to security breaches and attacks. It provides a detailed examination of the entire computer forensic process and presents specific procedures required to respond to a computer crime incident. Subjects include recognizing unauthorized access, identifying file anomalies, and traffic monitoring.

Notes: Offered as an online course.

 307
Lecture

This course explores emerging issues in information security and assurance, and the role of organizational information security in state, regional and national policy. It provides content about the interaction between the organization, society, and public agencies. It examines the role of people versus technical security ideals currently debated by contemporary organizations.

 310
Lecture

This course contains a detailed examination of real world information security knowledge, enabling recognition of vulnerabilities, exploitation of system weaknesses, and implementation of safeguards against threats. Through hands-on exercises and a final project students will learn the art of penetration testing. Students who complete this course will be equipped with the knowledge necessary to analyze and evaluate systems security.

 278
Lecture

This course discusses the hardware/software tools and techniques associated with the protection of computer systems and networks. Students learn how to protect network resources as deployed in a typical organization. Course topics include policy and practice associated with the protection of communication resources, intrusion detection systems, firewalls, and use of various tools for system and network protection.

 289
Lecture

The course integrates learning from all managerial ISA courses and encourages the student to develop skills in synthesis and communication (both written and oral) as well as teaching new material about the role of the CISO and the strategic and tactical planning and operation of the information security department in a variety of organizations. A research paper will be prepared and presented in the course. Outside speakers will supplement the course and provide the student additional, outside perspective on the information security industry.

 327

Ratings

Overall ratings for Information Security and Assurance
 
Comments
 
Feedback