Skip to Content

Course Description

Access Control

The course provides an in depth study of the three main security principles: availability, integrity and confidentiality. The course examines mechanisms used to control what resources an entity can access, and the extent of the entity’s capabilities to interact with the resource. The course also examines approaches to auditing how the entity interacts with the resource.
 

Telecommunications and Network Security

The course provides fundamental concepts of networking including: examination of public and private communication systems, networking topologies, devices, protocols, and remote access. It additionally explores strategies on identifying areas for security vulnerabilities on networks.
 

Information Security and Risk Management

The course provides a methodology to identify an institution’s information technology assets, the proper way to determine the necessary level of protection required, and techniques for developing budgets for security implementations.
 

Application Security

This course discusses methods to increase the security of application development and thwart attacker attempts to manipulate code. It also explores the software life-cycle and change control to reduce the probability of poorly written applications that allows an attacker to exploit coding errors. Database development models will be introduced, focusing on choosing the best model to increase security.
 

Cryptography

The course examines methods and techniques for concealing data for security purposes. Topics covered will include cryptographic techniques, approaches and technologies.
 

Security Architecture and Design

The course focuses on the concepts and standards for designing and implementing secure software systems. Upon completion of the course, you will be able to recognize the components of the basic information system architecture and their functionality, and differentiate between hardware, software, and firmware; differentiate between key security concepts, recognize the roles of TCB, reference monitor, and security kernel in protecting the operating system; and much more.
 

Operations Security

The course examines controls over personnel, hardware, software, and systems. It also covers possible abuse channels and proper countermeasures. Upon completion of the course, you will be able to recognize the activities involved in securing the operations of an enterprise and identify the technologies used to maintain network and resource availability; identify the effects of various hardware and software violations on the system, and recognize how different types of operational and life-cycle assurance are used to secure operations; and more.
 

Business Continuity Planning and Disaster Recovery Planning

The course examines the preservation of business activities when faced with disruptions or disasters. It involves the processes that are used to create a business continuity and disaster recovery plan and strategies for critical resource recovery.
 

Legal Regulations, Compliance, and Investigation

The course examines computer crimes, laws and regulations. It includes techniques for investigating a crime and gathering evidence. It also covers techniques for creating incident reports.
 

Physical Security

The course examines risks, threats and countermeasures to secure data, personnel and hardware. This involves facility creation and selection concerns, facility access control methods, and safety issues.
 

Special Topics

The course presents special topics of interest in the domain of information security and information governance. Topic areas might include business continuity planning, legal and regulatory compliance issues and operations security.
 

Information Security Project

All students are required to demonstrate the ability to clearly evaluate a particular information security need, identify potential solutions, evaluate the alternatives, and implement the best solution. This project will draw upon portfolio case assignments completed in previous courses to produce a complete solution for the assigned problem. It will be evaluated using the same rubric that was used to assess the individual course portfolio assignments.
 

"Being part of the new era of technology allows UC to be a great learning institution as well as versatile."

Read More >
– Lesley Tipton
PA Program Student

"Enrolling in the University of the Cumberlands’ MBA program was a rewarding and valuable investment ..."

Read More >
– Brooklyn Hooker
Accountant
Kentucky Highlands Investment Corporation

"I believe that UC is making great strides toward becoming one of the best online programs."

Read More >
– Benjamin Clayton
MACS Program

"The [MBA] program allowed me to make great contacts and network with other professionals."

Read More >
– Amanda Farris
Accountant
Southeastern Kentucky Rehabilitation Industries

"I was attracted to UC because of its location in the beautiful foothills of the Appalachian Mountains ..."

Read More >
– Suzanne Benninger
PA Program Student

"The Rank 1 program at UC provides a broad array of avenues for enhancing our roles as educators."

Read More >
– Elizabeth Stack
Teacher

"I enjoyed the quality of the materials and the instructors. The knowledge I gained will help me in my business."

Read More >
– Eric Greer
Founder & President
CIS

"The online program at UC has allowed me to further my education while maintaining my personal commitments."

Read More >
– Carl Roberts
Teacher
MAT Program

"The MAED program was a very comprehensive and robust experience that definitely added value to ..."

Read More >
– Nathan Smith
Elementary School Teacher

"The MBA program fit my busy lifestyle. I was able to attend MBA classes and do the assigned work all ..."

Read More >
– Pam Jones
Controller
Baptist Regional Medical Center

"UC does an excellent job of bringing students from the virtual world together in a cohesive class unit."

Read More >
– Jennifer Kincaid
Assistant Principal
MAED Program Student

"The learning environment and the facilities at UC PA are the best around and it makes learning so much ..."

Read More >
– Kevin Caddell
PA Program Student

"The MBA program has given me an opportunity to further my education while working a full-time job."

Read More >
– Desrick Jones
Assistant Manager
Wal-Mart Stores, Inc.

"I enjoyed the convenience and flexibility of the schedule especially with four children. The small ..."

Read More >
– Mark Steely
Coordinator of Radiology and Radiation Safety Officer
Baptist Regional Medical Center

"UC has multiple attributes that I find attractive. Its affordability, high moral standards and sense of ..."

Read More >
– April Templeton
MBA graduate

"UC provided me with the tools and professional network of individuals to lead our school district in South Carolina."

Read More >
– David O’Shields
Superintendent
Laurens County School District

Clicking the “Send Request” button below constitutes your express written consent to be called and/or texted by University of the Cumberlands at the number(s) you provided, regarding furthering your education. You understand that these calls may be generated using an automated technology.