BBA | Bachelor of Business Administration

The Bachelor’s Degree Courses at CalSouthern’s School of Business

Below, you’ll find all of the online bachelor’s degree courses offered by CalSouthern’s School of Business. By taking 15 semester hours of elective online bachelor’s courses, you can focus your studies in your particular area of interest, earning your Bachelor of Business Administration Degree with a concentration in management, accounting, human resources management, marketing, international business, or criminal justice.

Required Core Courses

Lower Division Courses

TECH 2440 Information and Technology Security

Credits : 3

This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals

Learning Outcomes:
  • Describe the differences between threat agent and a threat.
  • Differentiate between technology and management for security purposes.
  • Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
  • Discuss unethical and illegal behavior, plus, risk management.
  • Discuss security information, ISO 27000, and ISO 17799.
  • Demonstrate the Importance of NIST, security framework applications, and technology management.
  • Explain the types and functions of firewalls.
  • Discuss DMZ and IDPS systems.
  • Define cryptography and cryptanalysis, plus, functions for using a key.
  • Explain differences between symmetric and asymmetric encryption.
  • Discuss the types and uses of locks and HVAC technology.
  • Explain the project plan, statement of vision, and objectives.
  • Summarize security for organizational personnel and termination procedures.
  • Discuss organizations security environment, CERT, and vulnerable processes.
  • Introduce self and explain course expectations.
  • Integrate the course concepts through interaction with other Learners and your Mentor.
  • Access information efficiently and effectively.
  • Evaluate information critically and competently.
  • Practices ethical behavior in regard to information and information technology.
Back


Upper Division Courses

TECH 2440 Information and Technology Security

Credits : 3

This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals

Learning Outcomes:
  • Describe the differences between threat agent and a threat.
  • Differentiate between technology and management for security purposes.
  • Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
  • Discuss unethical and illegal behavior, plus, risk management.
  • Discuss security information, ISO 27000, and ISO 17799.
  • Demonstrate the Importance of NIST, security framework applications, and technology management.
  • Explain the types and functions of firewalls.
  • Discuss DMZ and IDPS systems.
  • Define cryptography and cryptanalysis, plus, functions for using a key.
  • Explain differences between symmetric and asymmetric encryption.
  • Discuss the types and uses of locks and HVAC technology.
  • Explain the project plan, statement of vision, and objectives.
  • Summarize security for organizational personnel and termination procedures.
  • Discuss organizations security environment, CERT, and vulnerable processes.
  • Introduce self and explain course expectations.
  • Integrate the course concepts through interaction with other Learners and your Mentor.
  • Access information efficiently and effectively.
  • Evaluate information critically and competently.
  • Practices ethical behavior in regard to information and information technology.
Back


Business Elective Courses

Management Electives

Lower Division Courses

TECH 2440 Information and Technology Security

Credits : 3

This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals

Learning Outcomes:
  • Describe the differences between threat agent and a threat.
  • Differentiate between technology and management for security purposes.
  • Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
  • Discuss unethical and illegal behavior, plus, risk management.
  • Discuss security information, ISO 27000, and ISO 17799.
  • Demonstrate the Importance of NIST, security framework applications, and technology management.
  • Explain the types and functions of firewalls.
  • Discuss DMZ and IDPS systems.
  • Define cryptography and cryptanalysis, plus, functions for using a key.
  • Explain differences between symmetric and asymmetric encryption.
  • Discuss the types and uses of locks and HVAC technology.
  • Explain the project plan, statement of vision, and objectives.
  • Summarize security for organizational personnel and termination procedures.
  • Discuss organizations security environment, CERT, and vulnerable processes.
  • Introduce self and explain course expectations.
  • Integrate the course concepts through interaction with other Learners and your Mentor.
  • Access information efficiently and effectively.
  • Evaluate information critically and competently.
  • Practices ethical behavior in regard to information and information technology.
Back


Upper Division Courses

TECH 2440 Information and Technology Security

Credits : 3

This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals

Learning Outcomes:
  • Describe the differences between threat agent and a threat.
  • Differentiate between technology and management for security purposes.
  • Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
  • Discuss unethical and illegal behavior, plus, risk management.
  • Discuss security information, ISO 27000, and ISO 17799.
  • Demonstrate the Importance of NIST, security framework applications, and technology management.
  • Explain the types and functions of firewalls.
  • Discuss DMZ and IDPS systems.
  • Define cryptography and cryptanalysis, plus, functions for using a key.
  • Explain differences between symmetric and asymmetric encryption.
  • Discuss the types and uses of locks and HVAC technology.
  • Explain the project plan, statement of vision, and objectives.
  • Summarize security for organizational personnel and termination procedures.
  • Discuss organizations security environment, CERT, and vulnerable processes.
  • Introduce self and explain course expectations.
  • Integrate the course concepts through interaction with other Learners and your Mentor.
  • Access information efficiently and effectively.
  • Evaluate information critically and competently.
  • Practices ethical behavior in regard to information and information technology.
Back


Accounting Electives

Lower Division Courses

TECH 2440 Information and Technology Security

Credits : 3

This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals

Learning Outcomes:
  • Describe the differences between threat agent and a threat.
  • Differentiate between technology and management for security purposes.
  • Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
  • Discuss unethical and illegal behavior, plus, risk management.
  • Discuss security information, ISO 27000, and ISO 17799.
  • Demonstrate the Importance of NIST, security framework applications, and technology management.
  • Explain the types and functions of firewalls.
  • Discuss DMZ and IDPS systems.
  • Define cryptography and cryptanalysis, plus, functions for using a key.
  • Explain differences between symmetric and asymmetric encryption.
  • Discuss the types and uses of locks and HVAC technology.
  • Explain the project plan, statement of vision, and objectives.
  • Summarize security for organizational personnel and termination procedures.
  • Discuss organizations security environment, CERT, and vulnerable processes.
  • Introduce self and explain course expectations.
  • Integrate the course concepts through interaction with other Learners and your Mentor.
  • Access information efficiently and effectively.
  • Evaluate information critically and competently.
  • Practices ethical behavior in regard to information and information technology.
Back


Upper Division Courses

TECH 2440 Information and Technology Security

Credits : 3

This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals

Learning Outcomes:
  • Describe the differences between threat agent and a threat.
  • Differentiate between technology and management for security purposes.
  • Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
  • Discuss unethical and illegal behavior, plus, risk management.
  • Discuss security information, ISO 27000, and ISO 17799.
  • Demonstrate the Importance of NIST, security framework applications, and technology management.
  • Explain the types and functions of firewalls.
  • Discuss DMZ and IDPS systems.
  • Define cryptography and cryptanalysis, plus, functions for using a key.
  • Explain differences between symmetric and asymmetric encryption.
  • Discuss the types and uses of locks and HVAC technology.
  • Explain the project plan, statement of vision, and objectives.
  • Summarize security for organizational personnel and termination procedures.
  • Discuss organizations security environment, CERT, and vulnerable processes.
  • Introduce self and explain course expectations.
  • Integrate the course concepts through interaction with other Learners and your Mentor.
  • Access information efficiently and effectively.
  • Evaluate information critically and competently.
  • Practices ethical behavior in regard to information and information technology.
Back


Human Resource Management Electives

Lower Division Courses

TECH 2440 Information and Technology Security

Credits : 3

This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals

Learning Outcomes:
  • Describe the differences between threat agent and a threat.
  • Differentiate between technology and management for security purposes.
  • Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
  • Discuss unethical and illegal behavior, plus, risk management.
  • Discuss security information, ISO 27000, and ISO 17799.
  • Demonstrate the Importance of NIST, security framework applications, and technology management.
  • Explain the types and functions of firewalls.
  • Discuss DMZ and IDPS systems.
  • Define cryptography and cryptanalysis, plus, functions for using a key.
  • Explain differences between symmetric and asymmetric encryption.
  • Discuss the types and uses of locks and HVAC technology.
  • Explain the project plan, statement of vision, and objectives.
  • Summarize security for organizational personnel and termination procedures.
  • Discuss organizations security environment, CERT, and vulnerable processes.
  • Introduce self and explain course expectations.
  • Integrate the course concepts through interaction with other Learners and your Mentor.
  • Access information efficiently and effectively.
  • Evaluate information critically and competently.
  • Practices ethical behavior in regard to information and information technology.
Back


Upper Division Courses

TECH 2440 Information and Technology Security

Credits : 3

This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals

Learning Outcomes:
  • Describe the differences between threat agent and a threat.
  • Differentiate between technology and management for security purposes.
  • Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
  • Discuss unethical and illegal behavior, plus, risk management.
  • Discuss security information, ISO 27000, and ISO 17799.
  • Demonstrate the Importance of NIST, security framework applications, and technology management.
  • Explain the types and functions of firewalls.
  • Discuss DMZ and IDPS systems.
  • Define cryptography and cryptanalysis, plus, functions for using a key.
  • Explain differences between symmetric and asymmetric encryption.
  • Discuss the types and uses of locks and HVAC technology.
  • Explain the project plan, statement of vision, and objectives.
  • Summarize security for organizational personnel and termination procedures.
  • Discuss organizations security environment, CERT, and vulnerable processes.
  • Introduce self and explain course expectations.
  • Integrate the course concepts through interaction with other Learners and your Mentor.
  • Access information efficiently and effectively.
  • Evaluate information critically and competently.
  • Practices ethical behavior in regard to information and information technology.
Back


Marketing Electives

Lower Division Courses

TECH 2440 Information and Technology Security

Credits : 3

This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals

Learning Outcomes:
  • Describe the differences between threat agent and a threat.
  • Differentiate between technology and management for security purposes.
  • Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
  • Discuss unethical and illegal behavior, plus, risk management.
  • Discuss security information, ISO 27000, and ISO 17799.
  • Demonstrate the Importance of NIST, security framework applications, and technology management.
  • Explain the types and functions of firewalls.
  • Discuss DMZ and IDPS systems.
  • Define cryptography and cryptanalysis, plus, functions for using a key.
  • Explain differences between symmetric and asymmetric encryption.
  • Discuss the types and uses of locks and HVAC technology.
  • Explain the project plan, statement of vision, and objectives.
  • Summarize security for organizational personnel and termination procedures.
  • Discuss organizations security environment, CERT, and vulnerable processes.
  • Introduce self and explain course expectations.
  • Integrate the course concepts through interaction with other Learners and your Mentor.
  • Access information efficiently and effectively.
  • Evaluate information critically and competently.
  • Practices ethical behavior in regard to information and information technology.
Back


Upper Division Courses

TECH 2440 Information and Technology Security

Credits : 3

This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals

Learning Outcomes:
  • Describe the differences between threat agent and a threat.
  • Differentiate between technology and management for security purposes.
  • Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
  • Discuss unethical and illegal behavior, plus, risk management.
  • Discuss security information, ISO 27000, and ISO 17799.
  • Demonstrate the Importance of NIST, security framework applications, and technology management.
  • Explain the types and functions of firewalls.
  • Discuss DMZ and IDPS systems.
  • Define cryptography and cryptanalysis, plus, functions for using a key.
  • Explain differences between symmetric and asymmetric encryption.
  • Discuss the types and uses of locks and HVAC technology.
  • Explain the project plan, statement of vision, and objectives.
  • Summarize security for organizational personnel and termination procedures.
  • Discuss organizations security environment, CERT, and vulnerable processes.
  • Introduce self and explain course expectations.
  • Integrate the course concepts through interaction with other Learners and your Mentor.
  • Access information efficiently and effectively.
  • Evaluate information critically and competently.
  • Practices ethical behavior in regard to information and information technology.
Back


Entrepreneurship Electives

Lower Division Courses

TECH 2440 Information and Technology Security

Credits : 3

This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals

Learning Outcomes:
  • Describe the differences between threat agent and a threat.
  • Differentiate between technology and management for security purposes.
  • Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
  • Discuss unethical and illegal behavior, plus, risk management.
  • Discuss security information, ISO 27000, and ISO 17799.
  • Demonstrate the Importance of NIST, security framework applications, and technology management.
  • Explain the types and functions of firewalls.
  • Discuss DMZ and IDPS systems.
  • Define cryptography and cryptanalysis, plus, functions for using a key.
  • Explain differences between symmetric and asymmetric encryption.
  • Discuss the types and uses of locks and HVAC technology.
  • Explain the project plan, statement of vision, and objectives.
  • Summarize security for organizational personnel and termination procedures.
  • Discuss organizations security environment, CERT, and vulnerable processes.
  • Introduce self and explain course expectations.
  • Integrate the course concepts through interaction with other Learners and your Mentor.
  • Access information efficiently and effectively.
  • Evaluate information critically and competently.
  • Practices ethical behavior in regard to information and information technology.
Back


Upper Division Courses

TECH 2440 Information and Technology Security

Credits : 3

This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals

Learning Outcomes:
  • Describe the differences between threat agent and a threat.
  • Differentiate between technology and management for security purposes.
  • Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
  • Discuss unethical and illegal behavior, plus, risk management.
  • Discuss security information, ISO 27000, and ISO 17799.
  • Demonstrate the Importance of NIST, security framework applications, and technology management.
  • Explain the types and functions of firewalls.
  • Discuss DMZ and IDPS systems.
  • Define cryptography and cryptanalysis, plus, functions for using a key.
  • Explain differences between symmetric and asymmetric encryption.
  • Discuss the types and uses of locks and HVAC technology.
  • Explain the project plan, statement of vision, and objectives.
  • Summarize security for organizational personnel and termination procedures.
  • Discuss organizations security environment, CERT, and vulnerable processes.
  • Introduce self and explain course expectations.
  • Integrate the course concepts through interaction with other Learners and your Mentor.
  • Access information efficiently and effectively.
  • Evaluate information critically and competently.
  • Practices ethical behavior in regard to information and information technology.
Back


Leadership Electives

Lower Division Courses

TECH 2440 Information and Technology Security

Credits : 3

This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals

Learning Outcomes:
  • Describe the differences between threat agent and a threat.
  • Differentiate between technology and management for security purposes.
  • Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
  • Discuss unethical and illegal behavior, plus, risk management.
  • Discuss security information, ISO 27000, and ISO 17799.
  • Demonstrate the Importance of NIST, security framework applications, and technology management.
  • Explain the types and functions of firewalls.
  • Discuss DMZ and IDPS systems.
  • Define cryptography and cryptanalysis, plus, functions for using a key.
  • Explain differences between symmetric and asymmetric encryption.
  • Discuss the types and uses of locks and HVAC technology.
  • Explain the project plan, statement of vision, and objectives.
  • Summarize security for organizational personnel and termination procedures.
  • Discuss organizations security environment, CERT, and vulnerable processes.
  • Introduce self and explain course expectations.
  • Integrate the course concepts through interaction with other Learners and your Mentor.
  • Access information efficiently and effectively.
  • Evaluate information critically and competently.
  • Practices ethical behavior in regard to information and information technology.
Back


Upper Division Courses

TECH 2440 Information and Technology Security

Credits : 3

This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals

Learning Outcomes:
  • Describe the differences between threat agent and a threat.
  • Differentiate between technology and management for security purposes.
  • Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
  • Discuss unethical and illegal behavior, plus, risk management.
  • Discuss security information, ISO 27000, and ISO 17799.
  • Demonstrate the Importance of NIST, security framework applications, and technology management.
  • Explain the types and functions of firewalls.
  • Discuss DMZ and IDPS systems.
  • Define cryptography and cryptanalysis, plus, functions for using a key.
  • Explain differences between symmetric and asymmetric encryption.
  • Discuss the types and uses of locks and HVAC technology.
  • Explain the project plan, statement of vision, and objectives.
  • Summarize security for organizational personnel and termination procedures.
  • Discuss organizations security environment, CERT, and vulnerable processes.
  • Introduce self and explain course expectations.
  • Integrate the course concepts through interaction with other Learners and your Mentor.
  • Access information efficiently and effectively.
  • Evaluate information critically and competently.
  • Practices ethical behavior in regard to information and information technology.
Back


International Business Electives

Lower Division Courses

TECH 2440 Information and Technology Security

Credits : 3

This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals

Learning Outcomes:
  • Describe the differences between threat agent and a threat.
  • Differentiate between technology and management for security purposes.
  • Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
  • Discuss unethical and illegal behavior, plus, risk management.
  • Discuss security information, ISO 27000, and ISO 17799.
  • Demonstrate the Importance of NIST, security framework applications, and technology management.
  • Explain the types and functions of firewalls.
  • Discuss DMZ and IDPS systems.
  • Define cryptography and cryptanalysis, plus, functions for using a key.
  • Explain differences between symmetric and asymmetric encryption.
  • Discuss the types and uses of locks and HVAC technology.
  • Explain the project plan, statement of vision, and objectives.
  • Summarize security for organizational personnel and termination procedures.
  • Discuss organizations security environment, CERT, and vulnerable processes.
  • Introduce self and explain course expectations.
  • Integrate the course concepts through interaction with other Learners and your Mentor.
  • Access information efficiently and effectively.
  • Evaluate information critically and competently.
  • Practices ethical behavior in regard to information and information technology.
Back


Upper Division Courses

TECH 2440 Information and Technology Security

Credits : 3

This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals

Learning Outcomes:
  • Describe the differences between threat agent and a threat.
  • Differentiate between technology and management for security purposes.
  • Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
  • Discuss unethical and illegal behavior, plus, risk management.
  • Discuss security information, ISO 27000, and ISO 17799.
  • Demonstrate the Importance of NIST, security framework applications, and technology management.
  • Explain the types and functions of firewalls.
  • Discuss DMZ and IDPS systems.
  • Define cryptography and cryptanalysis, plus, functions for using a key.
  • Explain differences between symmetric and asymmetric encryption.
  • Discuss the types and uses of locks and HVAC technology.
  • Explain the project plan, statement of vision, and objectives.
  • Summarize security for organizational personnel and termination procedures.
  • Discuss organizations security environment, CERT, and vulnerable processes.
  • Introduce self and explain course expectations.
  • Integrate the course concepts through interaction with other Learners and your Mentor.
  • Access information efficiently and effectively.
  • Evaluate information critically and competently.
  • Practices ethical behavior in regard to information and information technology.
Back


Technology Electives

Lower Division Courses

TECH 2440 Information and Technology Security

Credits : 3

This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals

Learning Outcomes:
  • Describe the differences between threat agent and a threat.
  • Differentiate between technology and management for security purposes.
  • Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
  • Discuss unethical and illegal behavior, plus, risk management.
  • Discuss security information, ISO 27000, and ISO 17799.
  • Demonstrate the Importance of NIST, security framework applications, and technology management.
  • Explain the types and functions of firewalls.
  • Discuss DMZ and IDPS systems.
  • Define cryptography and cryptanalysis, plus, functions for using a key.
  • Explain differences between symmetric and asymmetric encryption.
  • Discuss the types and uses of locks and HVAC technology.
  • Explain the project plan, statement of vision, and objectives.
  • Summarize security for organizational personnel and termination procedures.
  • Discuss organizations security environment, CERT, and vulnerable processes.
  • Introduce self and explain course expectations.
  • Integrate the course concepts through interaction with other Learners and your Mentor.
  • Access information efficiently and effectively.
  • Evaluate information critically and competently.
  • Practices ethical behavior in regard to information and information technology.
Back


Upper Division Courses

TECH 2440 Information and Technology Security

Credits : 3

This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals

Learning Outcomes:
  • Describe the differences between threat agent and a threat.
  • Differentiate between technology and management for security purposes.
  • Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
  • Discuss unethical and illegal behavior, plus, risk management.
  • Discuss security information, ISO 27000, and ISO 17799.
  • Demonstrate the Importance of NIST, security framework applications, and technology management.
  • Explain the types and functions of firewalls.
  • Discuss DMZ and IDPS systems.
  • Define cryptography and cryptanalysis, plus, functions for using a key.
  • Explain differences between symmetric and asymmetric encryption.
  • Discuss the types and uses of locks and HVAC technology.
  • Explain the project plan, statement of vision, and objectives.
  • Summarize security for organizational personnel and termination procedures.
  • Discuss organizations security environment, CERT, and vulnerable processes.
  • Introduce self and explain course expectations.
  • Integrate the course concepts through interaction with other Learners and your Mentor.
  • Access information efficiently and effectively.
  • Evaluate information critically and competently.
  • Practices ethical behavior in regard to information and information technology.
Back


Take the first step - Call 800.477.2254