Subscribe to our Newsletter

Helpful articles and useful tips for adults considering a college degree.

Thank you for signing up for our newsletter!

You will soon receive an email
confirming your request.

Information Security Degree Program

Information Security Degree Online - Computer Security Training Program OverviewProgram DetailsWhy Choose Franklin
Back To Program Details

Major Area Course Descriptions

ISEC 300 - PRINCIPLES OF INFORMATION SECURITY

In a highly connected, data intensive, and cost-focused business environment, the practice of information security not a business advantage; it is a customer requirement. Viruses, malware, trojans, denial of service attacks, phishing, and even Wiki leaks have become headline news. Failure to insure the confidentiality, integrity, and availability of data costs companies millions, if not billions of dollars in legal settlements, lost business, and trade secrets. In this breadth-based course, you will get an overview of information security principles and practices, including security models, risk management, access controls, intrusion detection and prevention, cryptography, software vulnerabilities, and ethical issues. Subsequent courses expand on this foundational material in much greater depth.

ISEC 325 - NETWORK SECURITY

Networks are the major point of entry to most computer systems. Preventing unwanted intrusion, use, abuse, or flooding of communications channels is a high priority to organizations trying to protect their assets. Network security is about preserving the appropriate use of network resources while preventing disallowed use. In this course, you will learn how to employ firewalls, VPNs, and stateful packet inspection techniques to harden computer networks. Topics include packet filtering, intrusion detection and prevention, ingress and egress rules, monitoring, network access controls, authentication, authorization, and auditing.

ISEC 350 - RISK MANAGEMENT AND COMPLIANCE

Proper assessment, management, and mitigation of risk are essential to any information security strategy. Risks aren't just related to IT assets, but to the overall business that the IT organization is supporting, thus, business continuity planning and impact analysis is also important. In this course, you will learn how to identify and analyze risks, determine impacts, and develop plans to mitigate issues. Topics include threats, vulnerabilities, exploits, and countermeasures; US compliance laws; risk assessment and mitigation; business impact analysis; and business continuity and disaster recovery planning.

ISEC 400 - APPLICATION SECURITY

Software vulnerabilities, especially those that compromise personal or financial data, are appallingly common. Nearly every major software company has needed to deal with the fallout of a major incident due to vulnerabilities in their products. Writing correct - let alone secure - software is very difficult. Yet users and executives expect it. In this course, you will learn about the typical development mistakes that lead to application-level security issues as well as how to defend against them. Students will explore the Open Web Application Security Project (OWASP) top 10 security vulnerabilities. Topics include unchecked user input, injection, fuzzing, CSRF, XSS, cryptography, CAPTCHA, configuration errors, authentication, and authorization.

ISEC 425 - BUSINESS CONTINUITY AND OPERATIONSySECURITY

The availability and integrity of systems constitutes two of the three areas of information security. Yet systems can fail in these two critical ways without intrusions, attacks, malicious code, social engineering, or any other external influence. Hardware fails; software has bugs; human beings make mistakes. These and many more factors influence the design and implementation of high availability systems that maintain business continuity in light of outages. In this course, you will learn how to design and implement high availability systems that minimize economic impact during minor and major outages. Topics include high availability architecture; layered system design; storage redundancy; failover, load balancing, and virtualization clusters; and disaster recovery systems.

ISEC 450 - SECURITY ARCHITECTURE AND CONTROLS

Just as an architect designs and oversees the construction of buildings, a security architect designs and oversees the construction and maintenance of overall security strategy. This strategy consists of a balanced blend of business needs, security policy, industry and regulatory standards, technology and educational solutions used to implement secure, resilient, reliable and available information systems. In this course, you will learn how to connect business requirements to security performance targets by using a methodical systems-analysis based approach. Topics include systems engineering, architecture layers, security policies, security administration, and return on investment.

ISEC 495 - INFORMATION SECURITY CAPSTONE

The Information Security Capstone course encourages teamwork in small groups on a substantial project. The intent of this course is to provide a capstone experience that integrates the material contained in courses required of the information security major. It also provides an opportunity for students to recognize and evaluate the interrelationship of their general education courses with the courses taken for their information security major. The major areas of the program are reviewed and assessed via standardized exams. Students will also culminate their experiences with an overview of the evolution of computer systems and a look at the near-term future.

ITEC 400 - UNIX ADMINISTRATION

This course covers the basic methods of UNIX system administration. The course will focus not only on user-level commands and utilities, but also upon installation and configuration of the UNIX kernel, file system, memory, peripheral devices, authentication/authorization and network facilities. The course also provides an introduction to the Perl programming language and the role of Linux in current UNIX environments. This course also uses virtualization software to isolate the UNIX operating system from the underlying host operating system. As such, administrative access to a fast machine running Windows XP or better with at least 2 gigabytes of memory and 40 gigabytes of available hard drive space is required.

MIS 310 - INFORMATION SYSTEMS ARCHITECTURE &yTECHNOLOGY

This course provides a conceptual survey of general systems theory followed by a conceptual and technological survey of the structure of distributed information systems architectures, operating systems, network operating systems, peripheral technology and user interfaces. Interoperability between these architectural components will be explored and current technology and trends in each architectural element will be reviewed. This course will de-emphasize, although not ignore, mainframe architectures in favor of information architectures more applicable to client/server computing. The various interacting categories of client/server computing as well as the benefits and implications of such a system will be fully explored.

MIS 320 - TECHNICAL COMMUNICATION

This course will prepare students for the bi-directional technical communication demands specific to computer and information systems. Topics include technical research methods and approaches, critical analysis of technical documents, synthesis of data, information and knowledge gained through research and critical analysis, creation of accurate technical documents, and effective delivery of technical material via oral presentations supported by visual media.

The above list of courses only represents a portion of the courses required for a bachelor's degree. View the bachelor's degree full curriculum.

Additional Course Descriptions

Professional Core

Take a detailed look at courses that build upon your general education knowledge, and help to prepare you for major area coursework.

Similar Majors

Not the program you were looking for?

Check out these other popular, related majors and find your best degree program fit at Franklin.

View All Majors

Franklin is for you. Find out why.

Learn about our flexible class
scheduling, affordable tuition, and
history educating adult learners.

Learn More About Franklin