The Master of Science in Information Assurance (MSIA) program at Oklahoma State University (OSU) offers a unique blend of managerial coursework and hands-on applications that enables graduates to understand information assurance in the business. Topics include telecommunications, risk, offensive and defensive practices, and legal issues.
OSU is a designated Center for Academic Excellence in Information Assurance Education and Research. Our IA curriculum is recognized and approved by the National Security Agency and the Department of Homeland Security. The university is also home to the Center for Telecommunications and Network Security.
- Experiential Hands-On Learning
- Recognized and Approved by Department of Homeland Security
- Recognized and Approved by NSA
Surveys the ways and means that voice, data and video are moved long distances. Covers computer networks (Ethernet LAN’s, Internet WAN’s); telephone systems (PSTN, VolP and cellular telephony); video (MPEG, H.323, and IPTV); and last mile delivery systems.
A broad investigation of the elements of information assurance and security with an emphasis on the management impact to corporations and businesses engaged in information Management Science and Information Systems (MSIS) services and electronic commerce. Students should come away from the course with the ability to advise management on the risks and mitigation for all types of threats to information and privacy.
An investigation into the various technical aspects of attacking, and of guarding against attacks and failures in various types of information systems. Course content may vary but includes computer, network, and data protection technologies (e.g., firewalls, packet filters, proxy servers, user authentication and validation techniques, encryption, backup methodologies, system and component redundancies, etc.). Various threats and attack methods examined.
Preparing information systems for operational status requires significant planning and sound execution. Covers the key components of the certification and accreditation process, including risk assessment and mitigation, system security analysis, controls and system documentation.
This course reviews the current status of information systems law in regard to rights of privacy, freedom of information, confidentiality, work product protection, copyright, security, legal liability, ethical issues and a range of additional legal and information policy topics.
Introduction to basic concepts and technologies relevant to secure information systems administration. The topics covered in this course include, but are not limited to, operating system (OS) hardening, securing servers, network protection, and various access control mechanisms.
This capstone course takes a strategic view of corporate information assurance. The goal is to provide an overarching view of an information assurance program to include physical, personnel, operational, and cyber security, including the underlying legislation and Federal and state regulations that drive corporate IA programs and policy.
Applied technical coverage of selected topics from the upper layers of the OSI model. Network and Transport layers using, TCP/IP, IPX/SPX, as well as security issues and other multi-layer protocol suites. Other topics include flow control, RSVP, encryption, compression, and LAN/WAN applications.