Information Systems Security Degree Specialization
Cyber crime threats affect nearly every company and organization. As a result, information systems security professionals are in high demand. This information systems security specialization will help you develop the skills you need to design an organization's security systems procedures and protocols, as well as ensure that operational security is compliant with standards, policies, and laws. With this high-demand skill set, you'll be prepared for growing cyber security careers such as information systems auditor, information security analyst, information systems security officer, information technology strategic planner, and disaster recovery analyst.
Follow a career track in Information Systems Security by choosing this specialization when you earn your bachelor's degree in Computer Information Systems (CIS) from DeVry University.
Learn more about DeVry's Information Systems Security degree specialization online.
Learn more about the advantages of studying at DeVry University. Request more information.
When you specialize your Computer Information Systems degree in Information Systems Security, your coursework at DeVry University may include these career-enhancing courses:
Data Privacy and Security
Information Systems Security Planning and Audit
This course focuses on preparing for, reacting to, and recovering from events that threaten the security of information and information resources, or that threaten to disrupt critical business functions. Similar to information security analysts, students will examine various levels of threats to an organization's information assets and critical business functions, as well as develop policies, procedures, and plans to address them.
In this Information Systems Security course, students explore the legal, ethical, and security issues involving data and information assets that organizations must address to ensure operational continuity as well as compliance with standards, policies, and laws. The course also covers security technology specific to safeguarding data and information assets.
Examining issues involved in protecting web-based applications from external threats while safeguarding customer privacy and accessibility, students in this course develop strategies that support systems and business goals.
This course provides an in-depth look at the kind of risk factor analysis that must be performed in order to design a flexible and comprehensive security plan. Topics include assessing threats, developing countermeasures, protecting information, using auditing practices to verify compliance with policies and procedures, and building a case for presentation in private and public settings.