Information Systems Security Degree Specialization
Cyber crime threats can affect nearly every company and organization. As a result, information systems security professionals are in high demand. This information systems security specialization will help you develop skills to design an organization's security systems procedures and protocols, as well as ensure that operational security is compliant with standards, policies, and laws.
Professional certifications and designations, such as the Systems Security Certified Practitioner (SCCP) certification, verify that you have practical security knowledge and technical skills in hands-on operational IT roles.1 As a student enrolled in the DeVry University’s Information Systems Security specialization, you can take advantage of our Certification Prep courses offered at no tuition charge. Better yet, eligible students who register for and complete the exam may be reimbursed for one exam sitting.
Pursue a career in Information Systems Security by choosing this specialization when you earn your bachelor's degree in Computer Information Systems (CIS) from DeVry University.
Learn more about DeVry's Information Systems Security degree specialization online.
Learn more about the advantages of studying at DeVry University. Request more information.
1. https://www.isc2.org/sscp/default.aspx.The SSCP designation requires 1 year of work experience. Without the work experience, those that pass the exam earn the Associate of (ISC)2.
Interested in a Related Cyber Security Program?
You Could Be A Cyber Warrior.
Our Cyber Security Programming Specialization immerses you in cyber attack simulations, preparing you with skills and knowledge to make an impact in the cyber security field.
When you specialize your Computer Information Systems degree in Information Systems Security, your coursework at DeVry University may include these courses:
Data Privacy and Security
Information Systems Security Planning and Audit
This course focuses on preparing for, reacting to, and recovering from events that threaten the security of information and information resources, or that threaten to disrupt critical business functions. Similar to information security analysts, students will examine various levels of threats to an organization's information assets and critical business functions, as well as develop policies, procedures, and plans to address them.
In this Information Systems Security course, students explore the legal, ethical, and security issues involving data and information assets that organizations must address to ensure operational continuity as well as compliance with standards, policies, and laws. The course also covers security technology specific to safeguarding data and information assets.
Examining issues involved in protecting web-based applications from external threats while safeguarding customer privacy and accessibility, students in this course develop strategies that support systems and business goals.
This course provides an in-depth look at the kind of risk factor analysis that must be performed in order to design a flexible and comprehensive security plan. Topics include assessing threats, developing countermeasures, protecting information, using auditing practices to verify compliance with policies and procedures, and building a case for presentation in private and public settings.