Bachelor’s Degree Specialization in Information Systems Security

Explore a Future in Information Systems Security

The threat of digital crime may affect nearly every company and organization, but information systems security experts stand at the frontlines to protect company and customer data. If you want to be a part of the defense against cyber criminals, team up with DeVry University to start exploring how you can become a defender of digital information. A Bachelor’s Degree with a Specialization in Information Systems Security can help you develop skills to design an organization's security systems procedures and protocols, as well as ensure that operational security is compliant with standards, policies and laws.

Get immersed in cyberattack simulations and be exposed to the skills and knowledge you’ll need to make an impact in the cyber security field. You can work towards a career track in Information Systems Security by choosing this specialization when you earn your Bachelor's Degree in Computer Information Systems from DeVry.

Get to Know Our Bachelor's Degree with a Specialization in Information Systems Security

Team up with us to earn a Bachelor’s Degree in Computer Information Systems with a Specialization in Information Systems Security and get the opportunity to learn how to develop and implement various methods of securing data and computer systems. You can learn to recognize and assess threats, align policies and procedures with applicable laws and regulations, and ensure that data is backed up in the event of an emergency.

During your time in this program, you’ll be taught by experienced and knowledgeable faculty who can give you insights into the real world of the information systems security.


Classes Start Every 8 Weeks

Earn your Bachelor's Degree in Computer Information Systems with Information Systems Security Specialization in as little as 2 years + 8 months*—or even more quickly with qualifying transfer credits.

*Not including breaks. Assumes year-round, full-time enrollment.

Continue

Availability

Why DeVry?

Complimentary Laptop

You’ll get a complimentary laptop as part of your technology program1. It’s our way of investing in your education—and you.

Work With IoT Technologies & Systems

Immerse yourself in the Internet of Things (IoT) world and obtain hands-on experience with IoT, cloud, software and security technologies and systems.

Certification Exam Reimbursement

Several of our tech programs are designed with industry-recognized certifications in mind. Qualified students may receive up to a $300 reimbursement for the cost of one exam attempt across a wide range of certifications:

  • CompTIA A+
  • CompTIA Linux+
  • CompTIA Network+
  • CompTIA Cloud+


Others may be applicable as well. Speak with an advisor for more info.

Questions? We can help!

What You'll Learn

DeVry's Bachelor’s Degree with a Specialization in Information Systems Security covers the following:

  • data privacy and security icon

    Data Privacy and Security

    Explore the legal, ethical and security issues involving data and information assets that organizations must address to ensure operational continuity, as well as compliance with standards, policies and laws.
  • logic and design icon

    Logic and Design

    Study basic programming logic and algorithm design, including control structures for sequential, iterative and decision-based processing. Learn how computers think in order to set up complex patterns and controls.
  • determining compliance with standards icon

    Determining Compliance with Standards

    Use relevant information and individual judgment to determine whether events or processes comply with laws, regulation or standards.
  • interacting with computers icon

    Interacting with Computers

    Improve your ability to use computers and computer systems to program hardware, write software, set up functions, enter data and process information.
  • complex problem solving icon

    Complex Problem Solving

    Apply critical and analytical thinking to identify complex problems, evaluate options and implement solutions.
  • structured analysis and design icon

    Structured Analysis and Design

    Explore the systems analysis and design process using information systems methodologies and techniques to analyze business activities and solve problems. Learn how to identify, define and document business problems, and then develop information system models to solve them.
  • web security icon

    Web Security

    Examine issues involved in protecting web-based applications from external threats while safeguarding customer privacy and accessibility.
  • information system security icon

    Information Systems Security Planning and Audit

    Understand the risk factor analysis that must be performed in order to design a flexible and comprehensive security plan.
  • public safety security icon

    Public Safety and Security

    Gain knowledge of relevant equipment, policies, procedures and strategies to promote effective local, state and national security for the protection of people, data, property and institutions.
  • business and continuity icon

    Business Continuity

    Focus on preparing for, reacting to, and recovering from events that threaten the security of information and information resources or that threaten to disrupt critical business functions

Embedded Programs - Demonstrate Skills at Every Step

Acquire two additional credentials with our unique three-in-one design. The courses in our Programming Essentials certificate program and Information Technology and Networking associate degree are embedded within this program, giving you the chance to obtain a certificate and an associate degree on the road to your Bachelors of Computer Information Systems degree at DeVry.2

Information systems security analyst works on his laptop

Career Opportunities

Graduates of our Bachelor’s Degree with a Specialization in Information Systems Security may consider but are not limited to the following careers:

  • Computer Security Specialist
    Computer security specialists help maintain the integrity of the systems used by a company. They develop and deploy countermeasures that protect networks and data, such as anti-virus software.

  • Data Security Administrator
    Data security administrators work to secure databases in order to keep them safe from intruders or attackers.
  • Information Security Specialist
    Information security specialists are specifically focused on protecting private information used by a company. This information may include things like customer and proprietary data.

Skill Focused Curriculum

Elements of the curriculum are aligned to industry certifications to help you validate your knowledge and skills as you prepare to pursue such certification exams as:

  • CompTIA A+: This certification proves your comprehension of basic IT skills related to computer hardware and software. It's a valuable certification for anyone who wants to work with information systems.
  • CompTIA Linux+: This verifies that you are capable of using the Linux operating system. This OS is versatile and favored by technology professionals, making it an important skill to have no matter your specialization.
  • CompTIA Network+: This certification confirms that you are capable of basic networking tasks that are performed in an IT setting. Networks play an important role in security, making this a useful certification for information security professionals.
  • CompTIA Cloud+: This certification shows that you are able to perform basic tasks with the Cloud. As cloud solutions become more widely accepted, this will remain a valuable certification.

General Education Courses

Communication Skills

ENGL1123 Composition
ENGL135 Advanced Composition
ENGL216 Technical Writing

One of:

SPCH275 Public Speaking
SPCH276 Intercultural Communication

Humanities4, 5

LAS432 Technology, Society, and Culture

One of:

ETHC232 Ethical and Legal Issues in the Professions
ETHC334 Diversity, Equity and Inclusion in the Workplace

Social Sciences

ECON312 Principles of Economics
SOCS185 Culture and Society

One of:

SOCS325 6 Environmental Sociology
SOCS350 Cultural Diversity in the Professions

Mathematics and Natural Sciences

MATH114 Algebra for College Students
MATH221 Statistics for Decision-Making
PHYS204 Applied Physics with Lab

Personal and Professional Development

CARD405 Career Development
COLL148 Critical Thinking and Problem-Solving

Tech Core Courses

Tech Core

CEIS101 Introduction to Technology and Information Systems
CEIS106 Introduction to Operating Systems
CEIS110 Introduction to Programming
CEIS114 Introduction to Digital Devices
NETW191 Fundamentals of Information Technology and Networking
NETW211 Fundamentals of Cloud Computing
SEC285 Fundamentals of Information Security

Program Courses

Information Systems and Programming

CEIS150 Programming with Objects
CEIS209 Intermediate Programming
CEIS236 Database Systems and Programming Fundamentals
CEIS312 Introduction to Artificial Intelligence and Machine Learning
CIS355A Business Application Programming with Lab

Application Development

CIS363B Web Interface Design with Lab
CIS407A Web Application Development with Lab
WBG310 Interactive Web Page Scripting with Lab

Career Preparation

CEIS299 Careers and Technology
CEIS499 Preparation for the Profession
MGMT404 Project Management
TECH460 Senior Project

Specialized Courses

Information Systems Security

SEC340 Business Continuity
SEC360 Data Privacy and Security
SEC380 Cloud Computing Security
SEC440 Information Systems Security Planning and Audit

Information Systems Security FAQs


What is Information Systems Security?

Information systems security is a wide-reaching field that deals with the protection of computers, users and networks. It works to create countermeasures that protect data, develop protocols to ensure that information does not fall outside the area of protection and maintain the availability of information for those who need access.


Is Information Systems Security important to businesses?

Information systems security is considered essential for many businesses today. Cybercrime  presents a pervasive threat across all industries, and a breach could mean the loss of proprietary information or worse, customer data. Information systems security ensures that this data stays where it should and out of the hands of cyber criminals.


Academic Catalog

Download PDF

Program Overview

Download PDF

Academic Catalog

Download PDF

Program Overview

Download PDF

Related Programs


1As part of this program, one complimentary laptop is provided to students enrolled in the Associate in Information Technology and Networking, Associate in Engineering Technology, Associate in Network Systems Administration, Bachelor’s in Information Technology and Networking, Bachelor’s in Software Development, Bachelor’s in Engineering Technology, Bachelor’s in Network and Communications Management and Bachelor’s in Computer Information Systems. The laptop is issued during the student’s second session. Certain restrictions apply.
2At the time of application to the next credential level, an evaluation of qualifying transfer credit will occur and the most beneficial outcome will be applied.
3Students enrolled at a New Jersey location take ENGL108 in lieu of this course.
4Students enrolled at a Pennsylvania location must take HUMN451 as part of this requirement.
5Students enrolled at a New Jersey location must take an additional six semester-credit hours of general education coursework from among the following course areas: communication skills, humanities, social sciences, mathematics and natural sciences. Courses selected in humanities or social sciences should be upper-division coursework (DeVry courses numbered 300-499).
6Students enrolled at a Nevada location must take POLI332 in lieu of this requirement.

All students enrolled in site-based programs will be required to take some coursework online and, for some programs and locations, a substantial portion of the program may be required to be completed online.