Information Systems Security Degree Specialization
Cyber crime threats can affect nearly every company and organization. As a result, information systems security professionals are in high demand. This information systems security specialization will help you develop skills to design an organization's security systems procedures and protocols, as well as ensure that operational security is compliant with standards, policies, and laws.
Professional certifications and designations, such as the Systems Security Certified Practitioner (SCCP) certification, verify that you have practical security knowledge and technical skills in hands-on operational IT roles.1 As a student enrolled in the DeVry University’s Information Systems Security specialization, you can take advantage of our Certification Prep courses offered at no tuition charge. Better yet, eligible students who register for and complete the exam may be reimbursed for one exam sitting.
Aim to follow a career track in Information Systems Security by choosing this specialization when you earn your bachelor's degree in Computer Information Systems (CIS) from DeVry University.
Learn more about DeVry's Information Systems Security degree specialization online.
Learn more about the advantages of studying at DeVry University. Request more information.
1. https://www.isc2.org/sscp/default.aspx.The SSCP designation requires 1 year of work experience. Without the work experience, those that pass the exam earn the Associate of (ISC)2.
All students enrolled in site-based programs will be required to take some coursework online and, for some programs and locations, a substantial portion of the program may be required to be completed online.
Take the TechPath
Want to learn how to navigate today’s tech-infused, dynamic and interconnected workplaces? Take the TechPath. Specially designed to help you gain the kinds of applied tech skills that are crucial in more and more companies today1, each TechPath class is powered by a learning rubric developed at DeVry called People-Process-Data-Devices, or P2D2. And because we believe TechPath is so important for our students and for helping to close the applied tech skills gap in this country, we’re offering our TechPath associates and bachelor’s degree programs to new students at a 20% savings2.
1Exploring America’s Tech Skills Gap and the Parallel Deficits of Applied Tech Skills and Hard Tech Skills, by The Career Advisory Board: http://careeradvisoryboard.org/research/technology-skills-gap-survey
2TechPath Associate and Bachelor’s degree programs are offered to new students at the cost of $487 per credit hour, which is 20% lower than our Non TechPath rate at $609. 20% savings is applicable to those who apply after 4/21/2017. New TechPath pricing savings do not apply to certificate programs.
Interested in a Related Cyber Security Program?
You Could Be A Cyber Warrior.
Our Cyber Security Programming Specialization immerses you in cyber attack simulations, preparing you with skills and knowledge to make an impact in the cyber security field.
When you specialize your Computer Information Systems degree in Information Systems Security, your coursework at DeVry University may include these courses:
Data Privacy and Security
Information Systems Security Planning and Audit
This course focuses on preparing for, reacting to, and recovering from events that threaten the security of information and information resources, or that threaten to disrupt critical business functions. Similar to information security analysts, students will examine various levels of threats to an organization's information assets and critical business functions, as well as develop policies, procedures, and plans to address them.
In this Information Systems Security course, students explore the legal, ethical, and security issues involving data and information assets that organizations must address to ensure operational continuity as well as compliance with standards, policies, and laws. The course also covers security technology specific to safeguarding data and information assets.
Examining issues involved in protecting web-based applications from external threats while safeguarding customer privacy and accessibility, students in this course develop strategies that support systems and business goals.
This course provides an in-depth look at the kind of risk factor analysis that must be performed in order to design a flexible and comprehensive security plan. Topics include assessing threats, developing countermeasures, protecting information, using auditing practices to verify compliance with policies and procedures, and building a case for presentation in private and public settings.