Subscribe to our Newsletter

Helpful articles and useful tips for adults considering a college degree.

Thank you for signing up for our newsletter!

You will soon receive an email
confirming your request.

Information Security Degree Program

Information Security Degree Online - Computer Security Training Program OverviewProgram DetailsWhy Choose Franklin
Back To Program Details

Information Security - Subsequent Bachelor of Science Degree

Looking to earn an additional bachelor’s degree? This degree is specifically designed for students who have already completed a bachelor's degree or higher.

Prerequisite Competencies

  • COMP 106 - INTRODUCTION TO SPREADSHEETS (1)

    COMP 106

    INTRODUCTION TO SPREADSHEETS

    Course Description

    This course focuses on using spreadsheets to solve business applications.
  • HUMN 211 - INTRO TO ETHICAL ANALYSIS AND REASONING (2)

    HUMN 211

    INTRO TO ETHICAL ANALYSIS AND REASONING

    Course Description

    The goal of this course is to help you improve your ethical analysis and reasoning skills. You will be introduced to the art of formulating and assessing ethical arguments according to the standards of logical thinking and critical analysis. In this course, you will discover how to apply the following questions to your job and everyday life. Why do we need ethics if we have laws to govern our behavior? Does the majority view determine what is ethical and what is not? Are feelings, desires, and preferences reliable ethical guides? Is it ever appropriate to criticize another individual's (or culture's) ethical judgment? Are people always responsible for their actions? Do human beings have a natural tendency to good, a natural tendency to evil? both? neither? Is there a single moral code that is binding on all people, at all times, and in all places?
  • MATH 160 - COLLEGE ALGEBRA (4)

    MATH 160

    COLLEGE ALGEBRA

    Course Description

    This course is designed to prepare students for Applied Calculus and Discrete Mathematics and to provide the mathematical background needed for the analytic reasoning used in other courses. Topics include functions and their graphs, including exponential and logarithmic functions; complex numbers; systems of equations and inequalities; matrices; basic principles of counting and probability; and other selected topics.
  • MATH 215 - STATISTICAL CONCEPTS (4)

    MATH 215

    STATISTICAL CONCEPTS

    Course Description

    This course introduces the student to statistics with business applications. The course covers both descriptive and inferential statistics. Topics included are: measures of central tendency; measures of dispersion; graphical displays of data; linear regression; basic probability concepts; binomial and normal probability distributions; confidence intervals; and hypothesis testing. These topics will be covered using a basic knowledge of algebra and Microsoft Excel.
  • PF 321 - LEARNING STRATEGIES (2)

    PF 321

    LEARNING STRATEGIES

    Course Description

    This course prepares students to be successful lifelong learners both academically and in their chosen careers. Franklin courses require a high level of self-directed learning and focus on skills required in the workplace and the classroom that are easily transferable between the two environments. The course includes strategies for advancing communication skills, including the use of electronic tools to participate in virtual environments. The assignments and activities in the course are created to closely simulate teamwork found in the workplace.
  • WRIT 220 - RESEARCH & WRITING FOR ACADEMIC &yPROFESSIONAL AUDIENCES (4)

    WRIT 220

    RESEARCH & WRITING FOR ACADEMIC &yPROFESSIONAL AUDIENCES

    Course Description

    This is an intermediate course focusing on the composition of research papers. Students in this course prepare to be active participants in professional discourse communities by examining and practicing the writing conventions associated with their own fields of study and work. By calling attention to the conventions of disciplinary writing, the course also prepares students for upper-division college writing and the special conventions of advanced academic discourse. Course activities include three extended research papers, semi-formal writing addressing interdisciplinary communication, and readings fostering critical engagement with disciplinary conversations.

    OR WRIT 320 - BUSINESS & PROFESSIONAL WRITING (4)

    WRIT 320

    BUSINESS & PROFESSIONAL WRITING

    Course Description

    This is an advanced composition course for juniors and seniors which focuses on business, technical and professional writing. Skills taught include audience analysis; research methods; questionnaire, interview and survey techniques; letters; data collection, interpretation and documentation; graphic illustration; and composition of reports in special formats. Instruction and practice are provided in writing various types of reports such as r‚sum‚s, proposals, summaries, research reports and instructions for user manuals, and in presenting committee and oral reports. Students will be encouraged to relate course materials to their major programs and their workplaces.

Professional Core (18 hours)

  • COMP 101 - PROBLEM SOLVING WITH COMPUTING (2)

    COMP 101

    PROBLEM SOLVING WITH COMPUTING

    Course Description

    Many organizations today utilize computers and information systems to store, organize, analyze, and summarize data to solve problems. As a result, computing is a tool that can benefit students in many different fields. At the heart of solving problems with computers is the study of structured thinking using algorithms. This course is designed for students with no prior programming experience and teaches the building blocks of algorithms, including variables, expressions, selection and repetition structures, functions and parameters, and array processing.
  • COMP 204 - PRINCIPLES OF COMPUTER NETWORKS (2)

    COMP 204

    PRINCIPLES OF COMPUTER NETWORKS

    Course Description

    This course serves as an introduction to the function, design, administration, and implementation of computer networks. Topics include network infrastructure, architecture, protocols, applications, and the OSI networking model.
  • COMP 281 - DATABASE MANAGEMENT SYSTEMS (4)

    COMP 281

    DATABASE MANAGEMENT SYSTEMS

    Course Description

    This course covers fundamental concepts necessary for the design, use, implementation and administration of database systems. The course will stress the fundamentals of database modeling and design, the languages and facilities provided by database management systems, and some techniques for implementing and administering database systems.
  • ITEC 136 - PRINCIPLES OF PROGRAMMING (4)

    ITEC 136

    PRINCIPLES OF PROGRAMMING

    Course Description

    This course covers fundamental programming principles for individuals with at least some programming background. Major themes are structured programming, problem solving, algorithm design, top-down stepwise refinement, and software lifecycle. Topics will include testing, data types, operators, repetition and selection control structures, functions, arrays, and objects. Students will design, code, test, debug, and document programs in a relevant programming language.
  • WEBD 101 - INTRODUCTION TO WEB PAGE CONSTRUCTION (2)

    WEBD 101

    INTRODUCTION TO WEB PAGE CONSTRUCTION

    Course Description

    This course covers the fundamental concepts necessary for the construction of web pages using the basic building blocks of Hypertext Markup Language (HTML) and Cascading Style Sheets (css). HTML and XHTML are covered in detail for building web pages using a web page development environment. The use of styling using css is introduced.
  • WEBD 236 - WEB INFORMATION SYSTEMS PROGRAMMING (4)

    WEBD 236

    WEB INFORMATION SYSTEMS PROGRAMMING

    Course Description

    This course builds web applications by employing server-side scripts that query relational databases. The student learns and reflects on two- and three-tier software architectures, separation of responsibility, model-view-controller pattern, basic security, and web frameworks. The student will design, code, test, debug, and document programs using a server-based scripting language. Note: This is a technology course in a technology program, and it requires the purchase of software that may be used in subsequent courses as well as being suitable for commercial work beyond completion of degree studies. For specific software requirements, consult the course syllabus.

Major Area (40 hours)

  • ISEC 300 - PRINCIPLES OF INFORMATION SECURITY (4)

    ISEC 300

    PRINCIPLES OF INFORMATION SECURITY

    Course Description

    In a highly connected, data intensive, and cost-focused business environment, the practice of information security not a business advantage; it is a customer requirement. Viruses, malware, trojans, denial of service attacks, phishing, and even Wiki leaks have become headline news. Failure to insure the confidentiality, integrity, and availability of data costs companies millions, if not billions of dollars in legal settlements, lost business, and trade secrets. In this breadth-based course, you will get an overview of information security principles and practices, including security models, risk management, access controls, intrusion detection and prevention, cryptography, software vulnerabilities, and ethical issues. Subsequent courses expand on this foundational material in much greater depth.
  • ISEC 325 - NETWORK SECURITY (4)

    ISEC 325

    NETWORK SECURITY

    Course Description

    Networks are the major point of entry to most computer systems. Preventing unwanted intrusion, use, abuse, or flooding of communications channels is a high priority to organizations trying to protect their assets. Network security is about preserving the appropriate use of network resources while preventing disallowed use. In this course, you will learn how to employ firewalls, VPNs, and stateful packet inspection techniques to harden computer networks. Topics include packet filtering, intrusion detection and prevention, ingress and egress rules, monitoring, network access controls, authentication, authorization, and auditing.
  • ISEC 350 - RISK MANAGEMENT AND COMPLIANCE (4)

    ISEC 350

    RISK MANAGEMENT AND COMPLIANCE

    Course Description

    Proper assessment, management, and mitigation of risk are essential to any information security strategy. Risks aren't just related to IT assets, but to the overall business that the IT organization is supporting, thus, business continuity planning and impact analysis is also important. In this course, you will learn how to identify and analyze risks, determine impacts, and develop plans to mitigate issues. Topics include threats, vulnerabilities, exploits, and countermeasures; US compliance laws; risk assessment and mitigation; business impact analysis; and business continuity and disaster recovery planning.
  • ISEC 400 - APPLICATION SECURITY (4)

    ISEC 400

    APPLICATION SECURITY

    Course Description

    Software vulnerabilities, especially those that compromise personal or financial data, are appallingly common. Nearly every major software company has needed to deal with the fallout of a major incident due to vulnerabilities in their products. Writing correct - let alone secure - software is very difficult. Yet users and executives expect it. In this course, you will learn about the typical development mistakes that lead to application-level security issues as well as how to defend against them. Students will explore the Open Web Application Security Project (OWASP) top 10 security vulnerabilities. Topics include unchecked user input, injection, fuzzing, CSRF, XSS, cryptography, CAPTCHA, configuration errors, authentication, and authorization.
  • ISEC 425 - BUSINESS CONTINUITY AND OPERATIONSySECURITY (4)

    ISEC 425

    BUSINESS CONTINUITY AND OPERATIONSySECURITY

    Course Description

    The availability and integrity of systems constitutes two of the three areas of information security. Yet systems can fail in these two critical ways without intrusions, attacks, malicious code, social engineering, or any other external influence. Hardware fails; software has bugs; human beings make mistakes. These and many more factors influence the design and implementation of high availability systems that maintain business continuity in light of outages. In this course, you will learn how to design and implement high availability systems that minimize economic impact during minor and major outages. Topics include high availability architecture; layered system design; storage redundancy; failover, load balancing, and virtualization clusters; and disaster recovery systems.
  • ISEC 450 - SECURITY ARCHITECTURE AND CONTROLS (4)

    ISEC 450

    SECURITY ARCHITECTURE AND CONTROLS

    Course Description

    Just as an architect designs and oversees the construction of buildings, a security architect designs and oversees the construction and maintenance of overall security strategy. This strategy consists of a balanced blend of business needs, security policy, industry and regulatory standards, technology and educational solutions used to implement secure, resilient, reliable and available information systems. In this course, you will learn how to connect business requirements to security performance targets by using a methodical systems-analysis based approach. Topics include systems engineering, architecture layers, security policies, security administration, and return on investment.
  • ISEC 495 - INFORMATION SECURITY CAPSTONE (4)

    ISEC 495

    INFORMATION SECURITY CAPSTONE

    Course Description

    The Information Security Capstone course encourages teamwork in small groups on a substantial project. The intent of this course is to provide a capstone experience that integrates the material contained in courses required of the information security major. It also provides an opportunity for students to recognize and evaluate the interrelationship of their general education courses with the courses taken for their information security major. The major areas of the program are reviewed and assessed via standardized exams. Students will also culminate their experiences with an overview of the evolution of computer systems and a look at the near-term future.
  • ITEC 400 - UNIX ADMINISTRATION (4)

    ITEC 400

    UNIX ADMINISTRATION

    Course Description

    This course covers the basic methods of UNIX system administration. The course will focus not only on user-level commands and utilities, but also upon installation and configuration of the UNIX kernel, file system, memory, peripheral devices, authentication/authorization and network facilities. The course also provides an introduction to the Perl programming language and the role of Linux in current UNIX environments. This course also uses virtualization software to isolate the UNIX operating system from the underlying host operating system. As such, administrative access to a fast machine running Windows XP or better with at least 2 gigabytes of memory and 40 gigabytes of available hard drive space is required.
  • MIS 310 - INFORMATION SYSTEMS ARCHITECTURE &yTECHNOLOGY (4)

    MIS 310

    INFORMATION SYSTEMS ARCHITECTURE &yTECHNOLOGY

    Course Description

    This course provides a conceptual survey of general systems theory followed by a conceptual and technological survey of the structure of distributed information systems architectures, operating systems, network operating systems, peripheral technology and user interfaces. Interoperability between these architectural components will be explored and current technology and trends in each architectural element will be reviewed. This course will de-emphasize, although not ignore, mainframe architectures in favor of information architectures more applicable to client/server computing. The various interacting categories of client/server computing as well as the benefits and implications of such a system will be fully explored.
  • MIS 320 - TECHNICAL COMMUNICATION (4)

    MIS 320

    TECHNICAL COMMUNICATION

    Course Description

    This course will prepare students for the bi-directional technical communication demands specific to computer and information systems. Topics include technical research methods and approaches, critical analysis of technical documents, synthesis of data, information and knowledge gained through research and critical analysis, creation of accurate technical documents, and effective delivery of technical material via oral presentations supported by visual media.

Additional Requirements

Each candidate for a subsequent degree must successfully complete in residence at Franklin University a minimum of 30 credit hours of 200 level courses or above, of which a minimum of 16 credit hours must be in major area courses at the 300 or 400 level. If the student is a previous Franklin bachelor of science degree graduate, the 30 credits must be earned after the first Franklin B.S. degree was awarded. If the required courses for a subsequent degree total less than 30 credit hours, the student may take Free Elective courses to achieve residency. Either PF 121 or PF 321 must be taken prior to the first BLF course, or it may be taken concurrently with the first 15-week BLF course. Students also must meet the University algebra competency requirement

A minimum GPA of 2.25 is required in the major area, and each major area course must be completed with a grade of “C” or better to count toward degree requirements.

Please see the Academic Bulletin for the complete list of degree and residency requirements.

Additional Curriculum

Information Security - Bachelor of Science Degree

View Curriculum

Build well-rounded skills and learn the industry specific knowledge you will need to be successful in your career.

Similar Majors

Not the program you were looking for?

Check out these other popular, related majors and find your best degree program fit at Franklin.

View All Majors

Franklin is for you. Find out why.

Learn about our flexible class
scheduling, affordable tuition, and
history educating adult learners.

Learn More About Franklin