Take your IT career to the next level and become the wall that stands between cyber security threats and organizations' and individuals' sensitive information.
This program is ideal for you, the IT professional or someone interested in the IT field, who understand the importance of data and network security in today’s digital world. You will advance your existing IT knowledge, and learn to protect data and information from cyber threats by learning how to secure digital data.
Whether you’re a network administrator, security analyst, system architect, or other IT professional, you will benefit from CSU-Global's comprehensive curriculum in this lucrative career field. Learn to differentiate between various informational security models, evaluate network vulnerabilities, gain a knowledge of ethical and legal issues surrounding information security, and much more.
This program consists of five lower-division online criminal forensic courses for a total of 15 credit hours.
Students will learn about information security threats, dangers, and risks that organizations face in the workplace as well as the ability to analyze potential vulnerabilities that can have an adverse impact on digital assets.
This course provides an overview of cybersecurity threats, compromises and the related protection mechanisms. Topics include security of communications, networks and infrastructures. The course also discusses best practices in security policy formulation, cyber forensics and prevention of cybercrimes. Overall, the course introduces the latest developments in the field. (This course is also offered through CBE. Credits earned using this option will appear on transcripts with an "EX" suffix.) Prerequisite: ITS310
This course provides students with the experience needed to secure information systems against attacks such as viruses, worms, as well as other system weaknesses that pose a significant danger to organizational data by using ethical hacking and penetration testing to uncover common techniques used by cyber criminals to exploit system vulnerabilities.
This course provides students with an insight to cyber security professional intrusion detection methods, information security tools, and preventative measures to information security risks. Students will learn how to respond to cyber breaches which includes the recovery, preservation, analysis of digital crime scene evidence, and proper incident response to cyber criminals. (This course is also offered through CBE. Credits earned using this option will appear on transcripts with an "EX" suffix.)
In this course students will examine how law, ethics, and technology intersect in organizations that rely on information technology. Students will gain an understanding and insight into issues arising from privacy, secrecy, access control, and policy enforcement, as well as other legal and ethical dilemmas prevalent in today’s organizations.