Subscribe to our Newsletter

Helpful articles and useful tips for adults considering a college degree.

Thank you for signing up for our newsletter!

You will soon receive an email
confirming your request.

Information Security Degree Program

Information Security Degree Online - Computer Security Training Program OverviewProgram DetailsWhy Choose Franklin
Back To Program Details

Major Area Course Descriptions

ISEC 300 - PRINCIPLES OF INFORMATION SECURITY

In a highly connected, data intensive, and cost-focused business environment, the practice of information security not a business advantage; it is a customer requirement. Viruses, malware, trojans, denial of service attacks, phishing, and even Wiki leaks have become headline news. Failure to insure the confidentiality, integrity, and availability of data costs companies millions, if not billions o

ISEC 325 - NETWORK SECURITY

Networks are the major point of entry to most computer systems. Preventing unwanted intrusion, use, abuse, or flooding of communications channels is a high priority to organizations trying to protect their assets. Network security is about preserving the appropriate use of network resources while preventing disallowed use. In this course, you will learn how to employ firewalls, VPNs, and stateful

ISEC 350 - RISK MANAGEMENT AND COMPLIANCE

Proper assessment, management, and mitigation of risk are essential to any information security strategy. Risks aren't just related to IT assets, but to the overall business that the IT organization is supporting, thus, business continuity planning and impact analysis is also important. In this course, you will learn how to identify and analyze risks, determine impacts, and develop plans to mitiga

ISEC 400 - APPLICATION SECURITY

Software vulnerabilities, especially those that compromise personal or financial data, are appallingly common. Nearly every major software company has needed to deal with the fallout of a major incident due to vulnerabilities in their products. Writing correct - let alone secure - software is very difficult. Yet users and executives expect it. In this course, you will learn about the typical devel

ISEC 425 - BUSINESS CONTINUITY AND OPERATIONS SECURITY

The availability and integrity of systems constitutes two of the three areas of information security. Yet systems can fail in these two critical ways without intrusions, attacks, malicious code, social engineering, or any other external influence. Hardware fails; software has bugs; human beings make mistakes. These and many more factors influence the design and implementation of high availability

ISEC 450 - SECURITY ARCHITECTURE AND CONTROLS

Just as an architect designs and oversees the construction of buildings, a security architect designs and oversees the construction and maintenance of overall security strategy. This strategy consists of a balanced blend of business needs, security policy, industry and regulatory standards, technology and educational solutions used to implement secure, resilient, reliable and available information

ISEC 495 - INFORMATION SECURITY CAPSTONE

The Information Security Capstone course encourages teamwork in small groups on a substantial project. The intent of this course is to provide a capstone experience that integrates the material contained in courses required of the information security major. It also provides an opportunity for students to recognize and evaluate the interrelationship of their general education courses with the cour

ITEC 400 - UNIX ADMINISTRATION

This course covers the basic methods of UNIX system administration. The course will focus not only on user-level commands and utilities, but also upon installation and configuration of the UNIX kernel, file system, memory, peripheral devices, authentication/authorization and network facilities. The course also provides an introduction to the Perl programming language and the role of Linux in curre

MIS 310 - INFORMATION SYSTEMS ARCHITECTURE & TECHNOLOGY

This course provides a conceptual survey of general systems theory followed by a conceptual and technological survey of the structure of distributed information systems architectures, operating systems, network operating systems, peripheral technology and user interfaces. Interoperability between these architectural components will be explored and current technology and trends in each architectura

MIS 320 - TECHNICAL COMMUNICATION

This course will prepare students for the bi-directional technical communication demands specific to computer and information systems. Topics include technical research methods and approaches, critical analysis of technical documents, synthesis of data, information and knowledge gained through research and critical analysis, creation of accurate technical documents, and effective delivery of techn

The above list of courses only represents a portion of the courses required for a bachelor's degree. View the bachelor's degree full curriculum.

Additional Course Descriptions

Professional Core

Take a detailed look at courses that build upon your general education knowledge, and help to prepare you for major area coursework.

Similar Majors

Not the program you were looking for?

Check out these other popular, related majors and find your best degree program fit at Franklin.

View All Majors

Franklin is for you. Find out why.

Learn about our flexible class
scheduling, affordable tuition, and
history educating adult learners.

Learn More About Franklin