Skip Navigation

Information Systems Security

Bachelor of Science

The Bachelor of Science in Information Systems Security combines educational theory with the technical skills required to meet information security needs across the enterprise. This online bachelor’s degree brings you coursework in information assurance, information security, network design and engineering, business continuity, and more. Learning the technological skills required to protect organizational assets from unscrupulous business competitors or unfriendly combatants is paramount to the credibility and survival of businesses, government agencies, and military operations. This online degree program helps to prepare you for careers such as information security manager, analyst, auditor, consultant, or risk assessor.

Courses in this program meet the topical requirements of the DoD Directive 8570.1M Information Assurance Management (IAM) Technical I, Technical II, Technical III, Management I, Management II, and Management III categories. Additionally, the National Security Agency (NSA) Information Assurance Courseware Evaluation (IACE) has certified some courses for this degree program.

Software and/or lab equipment required for some courses in this program are not provided through the undergraduate book grant and will need to be purchased by any student registering in those courses. Please see the course materials section of those courses for more information prior to registration.

Program Courses

The curriculum for this program follows industry trends to help ensure relevancy to today's marketplace. View all courses.

Note: Some courses in this program have additional laboratory course materials that are not covered by our undergraduate book grant. View the Materials Cost information below for details.

Program Objectives

In addition to the institutional and degree level learning objectives, graduates of this program are expected to achieve these learning outcomes:

  • Use analytical, logical, and critical thinking to analyze user requirements and to design, develop, and deploy effective information systems security solutions.
  • Analyze network designs, topologies, architectures, protocols, communications, administration, operations, and resource management for wired, wireless, and web-based networks.
  • Prescribe information assurance initiatives to protect an organization’s information assets by ensuring availability, confidentiality, integrity, authenticity, and non-repudiation.
  • Develop a security architecture consisting of tools, techniques, and technologies to prevent the penetration of networks, to detect attacks, and to design effective countermeasures.
  • Generate a risk assessment and risk mitigation methodology to analyze and manage risks in the context of network security.
  • Apply the discipline of network attack and defense to develop effective countermeasures to keeping hackers outside the perimeter of the network.
  • Develop network security audit practices, processes, and plans, and specify the roles and responsibilities of the staff on the audit team.
  • Develop actionable and maintainable network and information security plans and policies that address physical security, authentication, network security, encryption, software development, email, Internet, acceptable use, acceptable speech, and viruses/worms.

Degree at a Glance


Concentrations are designed to help you group courses together so you can further specialize in your field and pursue a more focused path to degree completion. You will be asked to select a concentration when you enroll in this program.

Explore the concentrations available for this program.


Cloud Computing

Explores cloud computing’s key principles, security, and privacy. Examines how to use resources for service specifications and contracts for proper management of cloud services, decision making and management techniques for best practices and organizational growth, and green IT.

Sample Courses

  • ISSC326 - Cloud Computing
  • ISSC345 - Service Oriented Architecture
  • ISSC386 - Green Computing: Foundations and Strategies
  • ISSC424 - Virtualization Security
  • ISSC426 - Cloud Security and Privacy

Cyber Intelligence

Prepares you to protect systems targeted at multiple levels based on various laws, regulations, and directives. Through information collection, social engineering, and reverse engineering of applications and processes, cyber intelligence provides the necessary tools for protecting an organization's systems.

Sample Courses

  • INTL410 - Counterintelligence
  • INTL434 - Threat Analysis
  • HLSS320 - Intelligence and Homeland Security
  • INTL421 - Signals Intelligence and Security
  • ISSC452 - Cybersecurity

Cybercrime Investigations

Focuses heavily on criminal justice, including: criminal behavior; crime detection and solution; use of intelligence in law enforcement; analysis and measurement of crime using GIS; and the various roles and functions within the cybersecurity practice.

Sample Courses

  • CMRJ303 - Criminology
  • CMRJ306 - Criminal Investigation
  • CMRJ320 - Law Enforcement Intelligence Applications
  • CMRJ335 - Crime Analysis
  • ISSC452 - Cybersecurity


Covers the processes and goals of cyber forensics investigations, and explores federal and state laws and legal concepts affecting how governments and organizations think about information security. Teaches the importance of search warrants and chain of custody in forensic investigations. Examines cybersecurity regulatory standards and compliance requirements, and explores technologies needed to detect, investigate, and prevent computer-related crimes.

Sample Courses

  • ITMG381 - Cyberlaw and Privacy in a Digital Age
  • ISSC325 - Biometrics
  • ISSC343 - Wireless Networks
  • ISSC452 - Cybersecurity
  • ISSC457 - Digital Forensics: Investigating Network Intrusions and Cybercrime Security

Digital Forensics

Explores common incident response procedures and the forensics of wireless network attacks caused by mobile and wireless peripheral devices. Examines security and access procedures and how search warrants, chains of custody, and investigation logs impact digital investigations. Topics include basic tracking techniques and computer-related crimes, image file analysis, crime prevention techniques, and password cracking on various operating systems.

Sample Courses

  • ISSC455 - Digital Forensics: Investigation Procedures and Response
  • ISSC458 - Digital Forensics: Investigating Data and Image Files
  • ISSC459 - Digital Forensics: Hard Disc and Operating Systems
  • ISSC456 - Digital Forensics: Investigating Wireless Networks and Devices
  • ISSC457 - Digital Forensics: Investigating Network Intrusions and Cybercrime Security


This general concentration allows you to select from dozens of different concentration courses offered within this program, enabling you to create your own focused area of study. View course catalog for details.

Sample Courses

  • ISSC461 - IT Security: Countermeasures
  • ISSC471 - IT Security: Auditing
  • ISSC490 - IT Security: Business Continuity
  • ISSC342 - Operating Systems: Hardening and Security
  • ISSC362 - IT Security: Attack & Defense
  • ITMG381 - Cyberlaw and Privacy in a Digital Age

Homeland Security

Expands on a holistic approach to cybersecurity and cyber operations to help you assess vulnerabilities and threats, levels of protection and prevention against such threats, and cyber operational processes.

Sample Courses

  • HLSS302 - Introduction to Homeland Security and Defense
  • HLSS303 - Homeland Security Risk, Threats and Consequences
  • HLSS320 - Intelligence and Homeland Security
  • INTL421 - Signals Intelligence and Security
  • ISSC452 - Cybersecurity

Wireless and Mobile Security

Provides specialization in the methodologies used in mobile and wireless network infrastructure security. Also covers the regulations, policies, procedures, and ethical responsibilities for privacy and security of mobile devices.

Sample Courses

  • ITMG381 - Cyberlaw and Privacy in a Digital Age
  • ISSC412 - Mobile Application Security
  • ISSC415 - Mobile Device Security
  • ISSC442 - Wireless and Mobile Network Security
  • ISSC343 - Wireless Networks

Admission Requirements

  • All AMU undergraduate programs require a minimum of a high school diploma or equivalent (i.e. GED).
  • Please read all undergraduate admission requirements before applying to this program and be prepared to submit the required documentation.
  • There is no fee to complete the AMU admission application. View steps to apply.

Need help?

Selecting the right program to meet your educational goals is a key step in ensuring a successful outcome. If you are unsure of which program to choose, or need more information, please contact an AMU admissions representative at 877-777-9081 or

Materials Cost

Software and/or lab equipment required for some courses in this program must be purchased at the student’s expense, and are not included in the undergraduate book grant.

Estimated course materials for this program are $229. You can view the materials required for individual courses in the ecampus under your Academic Plan.

Undergraduate Tuition Rates 

Per credit hour: $270 | $250 with military grant*

View Tuition and Fees Details  

*To help minimize out-of-pocket costs, AMU offers a tuition grant for U.S. active-duty servicemembers, Guard, Reserve, military spouses and dependents, and veterans that caps undergraduate tuition at the military TA limit. See all military-affiliated student benefits.

Paying for School

Because our university is accredited by the Higher Learning Commission (HLC), (the same as the Ohio State University, Univ. of Chicago, and U.S. Air Force Academy, to name a few), we can accept the following forms of financial aid and payments:

Ways to Save

Undergraduate Book Grant

Books are provided online at no cost if you are enrolled in undergraduate courses for credit. The undergraduate book grant is estimated to save $600 per academic semester* if you are registered as a full-time student.

Transfer Credits

Accelerate your degree completion by taking full advantage of our transfer credit options, including credit for your previous college courses, military service schools, American Council on Education (ACE) and College Level Examination Program (CLEP) tests, and prior learning experiences.  

Employer Contributions

AMU has educational partnerships with many employers and associations. Be sure to accurately enter your employer information when you complete our admissions application. Your employer might also offer a tuition reimbursement plan as one of your benefits.

*According to College Board Trends in College Pricing.