Skip Navigation
 

Information Systems Security Essentials

Online Undergraduate Certificate in Information Systems Security Essentials

Save @ AMU

$0 Application Fee
$0 Transfer Credit Evaluation
$0 Textbooks & eBooks
72%Have Graduated with No APUS-incurred Student Loan Debt1

About This Program

Build a solid foundation in access control, application security, business continuity, disaster recovery planning, and cryptography with the undergraduate certificate in information systems security essentials from American Military University (AMU).

In your online information systems security courses, you will:

  • Study information security and risk management, legal obligations, regulations, compliance and investigations, operations security, physical (environmental) security, security architecture and design, and telecommunications and network security
  • Learn how to develop security procedures, administer security policies, apply cryptography, and create IT security plans
  • Enhance your understanding of protecting information assets by ensuring the availability, confidentiality, integrity, authenticity, and nonrepudiation of information systems

What You Will Do

  1. Learn about information security strategies, structures, and plans to counteract intruders in an information system
  2. Grow your knowledge of national and federal information assurance laws, policies, and guidance, and the social, psychological, ethical, and legal policies and requirements in the information assurance field
  3. Become familiar with various types of security attacks, exploits, and security technologies
  4. Enhance your knowledge of risk mitigation methods that minimize the exposure of information to hackers and the techniques hackers use to avoid detection and cover their electronic footprints

Program at a Glance

Number of Credits
18
Cost Per Credit
$285 | $250*
Courses Start Monthly
Online

Program Requirements Printable Catalog Version

Must take all courses for this section.

Course ID: 2634

|
This course is a study of the discipline of Information Assurance that focuses on protecting information assets by ensuring availability, confidentiality, integrity, authenticity, and non- repudiation. This course delves into the deliberate engineering, planning and implementation of the five major areas in any enterprise: hardware, software, networks, people, and policies. This course meets the topical requirements of the DoD Directive 8570.1M Information Assurance Management (IAM) Technical III, Management II and Management III categories.
Registration Dates Course Dates Session Weeks
04/26/21 - 10/01/21 10/04/21 - 11/28/21 Fall 2021 Session B 8 Week session
05/21/21 - 10/29/21 11/01/21 - 12/26/21 Fall 2021 Session I 8 Week session
06/28/21 - 12/03/21 12/06/21 - 01/30/22 Fall 2021 Session D 8 Week session
07/27/21 - 12/31/21 01/03/22 - 02/27/22 Winter 2022 Session B 8 Week session
08/31/21 - 02/04/22 02/07/22 - 04/03/22 Winter 2022 Session I 8 Week session
09/28/21 - 03/04/22 03/07/22 - 05/01/22 Winter 2022 Session D 8 Week session

Course ID: 5165

|
This course examines the techniques and technologies for penetration of networks, detection of attacks, and prevention of attacks. This course addresses the techniques, the technologies, and the methodologies used by cyber intruders (hackers) to select a target and launch an attack. Students will gain insight into the motives and desired goals of hackers as well as effective tools and techniques used as countermeasures ensuring data assets remain secure. This course focuses on techniques and technologies to detect such attacks even while the attack is in progress; early detection enables the administrator to track the movements of the hacker and to discover the intent and goals of the hacker. This course assesses the various countermeasures to keep the system out of the “sights” of the hacker and to keep the hacker out of the perimeter of the target network. This course also explores the laws and the legal considerations in prosecuting computer crime.

Course ID: 2636

|
This course explores Networking Security from the perspective of risk management and confirms that assessment of IP based Network systems is critical to developing strategies to mitigate and manage risks. This course focuses on effective assessment strategies that ultimately help the student to implement effective and proactive risk mitigation measures and risk management practices. It exposes the vulnerabilities of TCP/IP; and appraises risk assessment, risk analysis, risk mitigation, risk management, networking components and Virtual Private Networks (VPN). This course examines the tools and techniques used to attack, test and assure the security of the remote information, maintenance, FTP, database, email, UNIX RPC, and IP VPN services. The student will apply this knowledge to develop an assessment methodology that identifies, attacks, and penetrates IP based network systems.
Registration Dates Course Dates Session Weeks
04/26/21 - 10/01/21 10/04/21 - 11/28/21 Fall 2021 Session B 8 Week session
05/21/21 - 10/29/21 11/01/21 - 12/26/21 Fall 2021 Session I 8 Week session
06/28/21 - 12/03/21 12/06/21 - 01/30/22 Fall 2021 Session D 8 Week session
07/27/21 - 12/31/21 01/03/22 - 02/27/22 Winter 2022 Session B 8 Week session
08/31/21 - 02/04/22 02/07/22 - 04/03/22 Winter 2022 Session I 8 Week session
09/28/21 - 03/04/22 03/07/22 - 05/01/22 Winter 2022 Session D 8 Week session

Course ID: 3349

|
This course allows the student to obtain the knowledge required to analyze and mitigate threats in the organizational network environment. Upon completion of this course, students will be able to demonstrate a knowledge of both computer and network security, from the wetware (human), software, and hardware perspectives. The "wetware" component will deal with identification of potential risk situations, establishing policies for avoidance, recovery, and prosecution, and proactive measures to reduce causal factors for security breaches in an organization. The "software" perspective will examine types of inappropriate software activity, as well as asset protection issues (recognizing software assets). This component will also address software tools available to assist in reducing administrative costs due to both malicious and accidental loss. The "hardware" component will address hardware approaches to protecting assets, as well as hardware techniques used to compromise assets. Specific technologies discussed include firewalls, symmetric key encryption, public key encryption, digital certificates, and cryptographic systems (SSL/TLS, VPNs, and Kerberos).
Registration Dates Course Dates Session Weeks
04/26/21 - 10/01/21 10/04/21 - 11/28/21 Fall 2021 Session B 8 Week session
05/21/21 - 10/29/21 11/01/21 - 12/26/21 Fall 2021 Session I 8 Week session
06/28/21 - 12/03/21 12/06/21 - 01/30/22 Fall 2021 Session D 8 Week session
07/27/21 - 12/31/21 01/03/22 - 02/27/22 Winter 2022 Session B 8 Week session
08/31/21 - 02/04/22 02/07/22 - 04/03/22 Winter 2022 Session I 8 Week session
09/28/21 - 03/04/22 03/07/22 - 05/01/22 Winter 2022 Session D 8 Week session

Course ID: 3183

|
This course allows students to examine a broad range of computer security issues and provides the student with technical knowledge not normally addressed in traditional training. It explores the protection of proprietary information and security planning with an emphasis on networked computer vulnerabilities. It also focuses on detection (e.g. viruses, hackers, types of computer crime, computer forensic examination, etc.), as well as disaster recovery and technology law. A primary focus is put on security of systems and computer crime prevention. Also addressed is the maturing criminal population with increased computer literacy, whose tendency is to move from violent actions to more profitable computer crime. Finally, issues of privacy and freedom of information are examined. This course meets the topical requirements of the DoD Directive 8570.1M Information Assurance Management (IAM) Technical II and Management I categories. Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility.
Registration Dates Course Dates Session Weeks
04/26/21 - 10/01/21 10/04/21 - 11/28/21 Fall 2021 Session B 8 Week session
05/21/21 - 10/29/21 11/01/21 - 12/26/21 Fall 2021 Session I 8 Week session
06/28/21 - 12/03/21 12/06/21 - 01/30/22 Fall 2021 Session D 8 Week session
07/27/21 - 12/31/21 01/03/22 - 02/27/22 Winter 2022 Session B 8 Week session
08/31/21 - 02/04/22 02/07/22 - 04/03/22 Winter 2022 Session I 8 Week session
09/28/21 - 03/04/22 03/07/22 - 05/01/22 Winter 2022 Session D 8 Week session

Course ID: 2644

|
This course is a study of Network Security attacks and countermeasures. This course examines various security technologies, such as: intrusion detection, authentication, session hijacking, sniffing, spoofing, denial of service, buffer overflow attack, port scanning, encryption, IPSec, DES encryption, triple DES encryption, message digest 5 algorithm, point-to-point tunneling protocol (PPTP), layer 2 tunneling protocol (L2TP), Kerberos, RSA Pretty Good Privacy(PGP), Secure Shell (SSH), Secure Sockets Layer (SSL), Stateful Packet Inspection (SPI), Network Address Translation (NAT), proxies, content filters, public/private keys, Public Key Infrastructure (PKI), Virtual Private Networks (VPN), security policies, security tokens, digital certificates, viruses, worms, Trojan horses, virus scanners, virus protection, vulnerability assessment, and vulnerability scanners.
Registration Dates Course Dates Session Weeks
04/26/21 - 10/01/21 10/04/21 - 11/28/21 Fall 2021 Session B 8 Week session
06/28/21 - 12/03/21 12/06/21 - 01/30/22 Fall 2021 Session D 8 Week session
08/31/21 - 02/04/22 02/07/22 - 04/03/22 Winter 2022 Session I 8 Week session

Courses Start Monthly

Next Courses Start Oct 4
Register by Oct 1

Admission Requirements

  • All AMU undergraduate programs require a minimum of a high school diploma or equivalent (i.e., GED).
  • Please read all undergraduate admission requirements before applying to this program and be prepared to submit the required documentation.
  • There is no fee to complete the AMU admission application. View steps to apply.

Materials Cost

Technology fee: $65 per course | $0 for active-duty military, National Guard members, and Reservists.

Need Help?

Selecting the right program to meet your educational goals is a key step in ensuring a successful outcome. If you are unsure of which program to choose, or need more information, please contact an AMU admissions representative at 877-755-2787 or info@apus.edu.

Quality Education Should Be Affordable

So you can focus on the opportunities ahead, without the financial burden of more expensive schools who are not as invested in your success. Learn more about paying for school.

Consumer Information

Department of Education and State Disclosures

For information on costs, median debt, state licensure requirements and more, view the gainful employment disclosures and the program disclosures for Maryland residents.

1Alumni Graduated with No APUS-incurred Student Loan Debt As of December 31, 2020

Includes alumni who graduated with an associate, bachelor's, or master's degree from APUS. Student loan debt is defined as student loans and private education loans used for tuition, fees, living expenses, and book costs associated with courses taken at APUS. Many APUS students receive military tuition assistance and veterans education benefits, which are not student loan debt.

*Cost Per Credit Hour

To minimize out-of-pocket costs, U.S. active-duty servicemembers, their spouse/dependents, National Guard members, and Reservists receive a tuition grant that caps undergraduate, master's degree, and graduate certificate tuition at $250/credit hour. In addition, a university book grant provides no-cost textbooks and ebooks for all undergraduates and military-tuition-grant-eligible master’s-level students.
See all military student benefits.