The Bachelor’s Degree Courses at CalSouthern’s School of Business
Below, you’ll find all of the online bachelor’s degree courses offered by CalSouthern’s School of Business. By taking 15 semester hours of elective online bachelor’s courses, you can focus your studies in your particular area of interest, earning your Bachelor of Business Administration Degree with a concentration in management, accounting, human resources management, marketing, international business, or criminal justice.
Required Core Courses
Lower Division Courses
TECH 2440 Information and Technology Security
This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals
Learning Outcomes:- Describe the differences between threat agent and a threat.
- Differentiate between technology and management for security purposes.
- Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
- Discuss unethical and illegal behavior, plus, risk management.
- Discuss security information, ISO 27000, and ISO 17799.
- Demonstrate the Importance of NIST, security framework applications, and technology management.
- Explain the types and functions of firewalls.
- Discuss DMZ and IDPS systems.
- Define cryptography and cryptanalysis, plus, functions for using a key.
- Explain differences between symmetric and asymmetric encryption.
- Discuss the types and uses of locks and HVAC technology.
- Explain the project plan, statement of vision, and objectives.
- Summarize security for organizational personnel and termination procedures.
- Discuss organizations security environment, CERT, and vulnerable processes.
- Introduce self and explain course expectations.
- Integrate the course concepts through interaction with other Learners and your Mentor.
- Access information efficiently and effectively.
- Evaluate information critically and competently.
- Practices ethical behavior in regard to information and information technology.
Upper Division Courses
TECH 2440 Information and Technology Security
This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals
Learning Outcomes:- Describe the differences between threat agent and a threat.
- Differentiate between technology and management for security purposes.
- Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
- Discuss unethical and illegal behavior, plus, risk management.
- Discuss security information, ISO 27000, and ISO 17799.
- Demonstrate the Importance of NIST, security framework applications, and technology management.
- Explain the types and functions of firewalls.
- Discuss DMZ and IDPS systems.
- Define cryptography and cryptanalysis, plus, functions for using a key.
- Explain differences between symmetric and asymmetric encryption.
- Discuss the types and uses of locks and HVAC technology.
- Explain the project plan, statement of vision, and objectives.
- Summarize security for organizational personnel and termination procedures.
- Discuss organizations security environment, CERT, and vulnerable processes.
- Introduce self and explain course expectations.
- Integrate the course concepts through interaction with other Learners and your Mentor.
- Access information efficiently and effectively.
- Evaluate information critically and competently.
- Practices ethical behavior in regard to information and information technology.
Business Elective Courses
Management Electives
Lower Division Courses
TECH 2440 Information and Technology Security
This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals
Learning Outcomes:- Describe the differences between threat agent and a threat.
- Differentiate between technology and management for security purposes.
- Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
- Discuss unethical and illegal behavior, plus, risk management.
- Discuss security information, ISO 27000, and ISO 17799.
- Demonstrate the Importance of NIST, security framework applications, and technology management.
- Explain the types and functions of firewalls.
- Discuss DMZ and IDPS systems.
- Define cryptography and cryptanalysis, plus, functions for using a key.
- Explain differences between symmetric and asymmetric encryption.
- Discuss the types and uses of locks and HVAC technology.
- Explain the project plan, statement of vision, and objectives.
- Summarize security for organizational personnel and termination procedures.
- Discuss organizations security environment, CERT, and vulnerable processes.
- Introduce self and explain course expectations.
- Integrate the course concepts through interaction with other Learners and your Mentor.
- Access information efficiently and effectively.
- Evaluate information critically and competently.
- Practices ethical behavior in regard to information and information technology.
Upper Division Courses
TECH 2440 Information and Technology Security
This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals
Learning Outcomes:- Describe the differences between threat agent and a threat.
- Differentiate between technology and management for security purposes.
- Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
- Discuss unethical and illegal behavior, plus, risk management.
- Discuss security information, ISO 27000, and ISO 17799.
- Demonstrate the Importance of NIST, security framework applications, and technology management.
- Explain the types and functions of firewalls.
- Discuss DMZ and IDPS systems.
- Define cryptography and cryptanalysis, plus, functions for using a key.
- Explain differences between symmetric and asymmetric encryption.
- Discuss the types and uses of locks and HVAC technology.
- Explain the project plan, statement of vision, and objectives.
- Summarize security for organizational personnel and termination procedures.
- Discuss organizations security environment, CERT, and vulnerable processes.
- Introduce self and explain course expectations.
- Integrate the course concepts through interaction with other Learners and your Mentor.
- Access information efficiently and effectively.
- Evaluate information critically and competently.
- Practices ethical behavior in regard to information and information technology.
Accounting Electives
Lower Division Courses
TECH 2440 Information and Technology Security
This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals
Learning Outcomes:- Describe the differences between threat agent and a threat.
- Differentiate between technology and management for security purposes.
- Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
- Discuss unethical and illegal behavior, plus, risk management.
- Discuss security information, ISO 27000, and ISO 17799.
- Demonstrate the Importance of NIST, security framework applications, and technology management.
- Explain the types and functions of firewalls.
- Discuss DMZ and IDPS systems.
- Define cryptography and cryptanalysis, plus, functions for using a key.
- Explain differences between symmetric and asymmetric encryption.
- Discuss the types and uses of locks and HVAC technology.
- Explain the project plan, statement of vision, and objectives.
- Summarize security for organizational personnel and termination procedures.
- Discuss organizations security environment, CERT, and vulnerable processes.
- Introduce self and explain course expectations.
- Integrate the course concepts through interaction with other Learners and your Mentor.
- Access information efficiently and effectively.
- Evaluate information critically and competently.
- Practices ethical behavior in regard to information and information technology.
Upper Division Courses
TECH 2440 Information and Technology Security
This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals
Learning Outcomes:- Describe the differences between threat agent and a threat.
- Differentiate between technology and management for security purposes.
- Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
- Discuss unethical and illegal behavior, plus, risk management.
- Discuss security information, ISO 27000, and ISO 17799.
- Demonstrate the Importance of NIST, security framework applications, and technology management.
- Explain the types and functions of firewalls.
- Discuss DMZ and IDPS systems.
- Define cryptography and cryptanalysis, plus, functions for using a key.
- Explain differences between symmetric and asymmetric encryption.
- Discuss the types and uses of locks and HVAC technology.
- Explain the project plan, statement of vision, and objectives.
- Summarize security for organizational personnel and termination procedures.
- Discuss organizations security environment, CERT, and vulnerable processes.
- Introduce self and explain course expectations.
- Integrate the course concepts through interaction with other Learners and your Mentor.
- Access information efficiently and effectively.
- Evaluate information critically and competently.
- Practices ethical behavior in regard to information and information technology.
Human Resource Management Electives
Lower Division Courses
TECH 2440 Information and Technology Security
This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals
Learning Outcomes:- Describe the differences between threat agent and a threat.
- Differentiate between technology and management for security purposes.
- Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
- Discuss unethical and illegal behavior, plus, risk management.
- Discuss security information, ISO 27000, and ISO 17799.
- Demonstrate the Importance of NIST, security framework applications, and technology management.
- Explain the types and functions of firewalls.
- Discuss DMZ and IDPS systems.
- Define cryptography and cryptanalysis, plus, functions for using a key.
- Explain differences between symmetric and asymmetric encryption.
- Discuss the types and uses of locks and HVAC technology.
- Explain the project plan, statement of vision, and objectives.
- Summarize security for organizational personnel and termination procedures.
- Discuss organizations security environment, CERT, and vulnerable processes.
- Introduce self and explain course expectations.
- Integrate the course concepts through interaction with other Learners and your Mentor.
- Access information efficiently and effectively.
- Evaluate information critically and competently.
- Practices ethical behavior in regard to information and information technology.
Upper Division Courses
TECH 2440 Information and Technology Security
This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals
Learning Outcomes:- Describe the differences between threat agent and a threat.
- Differentiate between technology and management for security purposes.
- Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
- Discuss unethical and illegal behavior, plus, risk management.
- Discuss security information, ISO 27000, and ISO 17799.
- Demonstrate the Importance of NIST, security framework applications, and technology management.
- Explain the types and functions of firewalls.
- Discuss DMZ and IDPS systems.
- Define cryptography and cryptanalysis, plus, functions for using a key.
- Explain differences between symmetric and asymmetric encryption.
- Discuss the types and uses of locks and HVAC technology.
- Explain the project plan, statement of vision, and objectives.
- Summarize security for organizational personnel and termination procedures.
- Discuss organizations security environment, CERT, and vulnerable processes.
- Introduce self and explain course expectations.
- Integrate the course concepts through interaction with other Learners and your Mentor.
- Access information efficiently and effectively.
- Evaluate information critically and competently.
- Practices ethical behavior in regard to information and information technology.
Marketing Electives
Lower Division Courses
TECH 2440 Information and Technology Security
This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals
Learning Outcomes:- Describe the differences between threat agent and a threat.
- Differentiate between technology and management for security purposes.
- Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
- Discuss unethical and illegal behavior, plus, risk management.
- Discuss security information, ISO 27000, and ISO 17799.
- Demonstrate the Importance of NIST, security framework applications, and technology management.
- Explain the types and functions of firewalls.
- Discuss DMZ and IDPS systems.
- Define cryptography and cryptanalysis, plus, functions for using a key.
- Explain differences between symmetric and asymmetric encryption.
- Discuss the types and uses of locks and HVAC technology.
- Explain the project plan, statement of vision, and objectives.
- Summarize security for organizational personnel and termination procedures.
- Discuss organizations security environment, CERT, and vulnerable processes.
- Introduce self and explain course expectations.
- Integrate the course concepts through interaction with other Learners and your Mentor.
- Access information efficiently and effectively.
- Evaluate information critically and competently.
- Practices ethical behavior in regard to information and information technology.
Upper Division Courses
TECH 2440 Information and Technology Security
This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals
Learning Outcomes:- Describe the differences between threat agent and a threat.
- Differentiate between technology and management for security purposes.
- Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
- Discuss unethical and illegal behavior, plus, risk management.
- Discuss security information, ISO 27000, and ISO 17799.
- Demonstrate the Importance of NIST, security framework applications, and technology management.
- Explain the types and functions of firewalls.
- Discuss DMZ and IDPS systems.
- Define cryptography and cryptanalysis, plus, functions for using a key.
- Explain differences between symmetric and asymmetric encryption.
- Discuss the types and uses of locks and HVAC technology.
- Explain the project plan, statement of vision, and objectives.
- Summarize security for organizational personnel and termination procedures.
- Discuss organizations security environment, CERT, and vulnerable processes.
- Introduce self and explain course expectations.
- Integrate the course concepts through interaction with other Learners and your Mentor.
- Access information efficiently and effectively.
- Evaluate information critically and competently.
- Practices ethical behavior in regard to information and information technology.
Entrepreneurship Electives
Lower Division Courses
TECH 2440 Information and Technology Security
This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals
Learning Outcomes:- Describe the differences between threat agent and a threat.
- Differentiate between technology and management for security purposes.
- Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
- Discuss unethical and illegal behavior, plus, risk management.
- Discuss security information, ISO 27000, and ISO 17799.
- Demonstrate the Importance of NIST, security framework applications, and technology management.
- Explain the types and functions of firewalls.
- Discuss DMZ and IDPS systems.
- Define cryptography and cryptanalysis, plus, functions for using a key.
- Explain differences between symmetric and asymmetric encryption.
- Discuss the types and uses of locks and HVAC technology.
- Explain the project plan, statement of vision, and objectives.
- Summarize security for organizational personnel and termination procedures.
- Discuss organizations security environment, CERT, and vulnerable processes.
- Introduce self and explain course expectations.
- Integrate the course concepts through interaction with other Learners and your Mentor.
- Access information efficiently and effectively.
- Evaluate information critically and competently.
- Practices ethical behavior in regard to information and information technology.
Upper Division Courses
TECH 2440 Information and Technology Security
This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals
Learning Outcomes:- Describe the differences between threat agent and a threat.
- Differentiate between technology and management for security purposes.
- Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
- Discuss unethical and illegal behavior, plus, risk management.
- Discuss security information, ISO 27000, and ISO 17799.
- Demonstrate the Importance of NIST, security framework applications, and technology management.
- Explain the types and functions of firewalls.
- Discuss DMZ and IDPS systems.
- Define cryptography and cryptanalysis, plus, functions for using a key.
- Explain differences between symmetric and asymmetric encryption.
- Discuss the types and uses of locks and HVAC technology.
- Explain the project plan, statement of vision, and objectives.
- Summarize security for organizational personnel and termination procedures.
- Discuss organizations security environment, CERT, and vulnerable processes.
- Introduce self and explain course expectations.
- Integrate the course concepts through interaction with other Learners and your Mentor.
- Access information efficiently and effectively.
- Evaluate information critically and competently.
- Practices ethical behavior in regard to information and information technology.
Leadership Electives
Lower Division Courses
TECH 2440 Information and Technology Security
This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals
Learning Outcomes:- Describe the differences between threat agent and a threat.
- Differentiate between technology and management for security purposes.
- Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
- Discuss unethical and illegal behavior, plus, risk management.
- Discuss security information, ISO 27000, and ISO 17799.
- Demonstrate the Importance of NIST, security framework applications, and technology management.
- Explain the types and functions of firewalls.
- Discuss DMZ and IDPS systems.
- Define cryptography and cryptanalysis, plus, functions for using a key.
- Explain differences between symmetric and asymmetric encryption.
- Discuss the types and uses of locks and HVAC technology.
- Explain the project plan, statement of vision, and objectives.
- Summarize security for organizational personnel and termination procedures.
- Discuss organizations security environment, CERT, and vulnerable processes.
- Introduce self and explain course expectations.
- Integrate the course concepts through interaction with other Learners and your Mentor.
- Access information efficiently and effectively.
- Evaluate information critically and competently.
- Practices ethical behavior in regard to information and information technology.
Upper Division Courses
TECH 2440 Information and Technology Security
This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals
Learning Outcomes:- Describe the differences between threat agent and a threat.
- Differentiate between technology and management for security purposes.
- Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
- Discuss unethical and illegal behavior, plus, risk management.
- Discuss security information, ISO 27000, and ISO 17799.
- Demonstrate the Importance of NIST, security framework applications, and technology management.
- Explain the types and functions of firewalls.
- Discuss DMZ and IDPS systems.
- Define cryptography and cryptanalysis, plus, functions for using a key.
- Explain differences between symmetric and asymmetric encryption.
- Discuss the types and uses of locks and HVAC technology.
- Explain the project plan, statement of vision, and objectives.
- Summarize security for organizational personnel and termination procedures.
- Discuss organizations security environment, CERT, and vulnerable processes.
- Introduce self and explain course expectations.
- Integrate the course concepts through interaction with other Learners and your Mentor.
- Access information efficiently and effectively.
- Evaluate information critically and competently.
- Practices ethical behavior in regard to information and information technology.
International Business Electives
Lower Division Courses
TECH 2440 Information and Technology Security
This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals
Learning Outcomes:- Describe the differences between threat agent and a threat.
- Differentiate between technology and management for security purposes.
- Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
- Discuss unethical and illegal behavior, plus, risk management.
- Discuss security information, ISO 27000, and ISO 17799.
- Demonstrate the Importance of NIST, security framework applications, and technology management.
- Explain the types and functions of firewalls.
- Discuss DMZ and IDPS systems.
- Define cryptography and cryptanalysis, plus, functions for using a key.
- Explain differences between symmetric and asymmetric encryption.
- Discuss the types and uses of locks and HVAC technology.
- Explain the project plan, statement of vision, and objectives.
- Summarize security for organizational personnel and termination procedures.
- Discuss organizations security environment, CERT, and vulnerable processes.
- Introduce self and explain course expectations.
- Integrate the course concepts through interaction with other Learners and your Mentor.
- Access information efficiently and effectively.
- Evaluate information critically and competently.
- Practices ethical behavior in regard to information and information technology.
Upper Division Courses
TECH 2440 Information and Technology Security
This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals
Learning Outcomes:- Describe the differences between threat agent and a threat.
- Differentiate between technology and management for security purposes.
- Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
- Discuss unethical and illegal behavior, plus, risk management.
- Discuss security information, ISO 27000, and ISO 17799.
- Demonstrate the Importance of NIST, security framework applications, and technology management.
- Explain the types and functions of firewalls.
- Discuss DMZ and IDPS systems.
- Define cryptography and cryptanalysis, plus, functions for using a key.
- Explain differences between symmetric and asymmetric encryption.
- Discuss the types and uses of locks and HVAC technology.
- Explain the project plan, statement of vision, and objectives.
- Summarize security for organizational personnel and termination procedures.
- Discuss organizations security environment, CERT, and vulnerable processes.
- Introduce self and explain course expectations.
- Integrate the course concepts through interaction with other Learners and your Mentor.
- Access information efficiently and effectively.
- Evaluate information critically and competently.
- Practices ethical behavior in regard to information and information technology.
Technology Electives
Lower Division Courses
TECH 2440 Information and Technology Security
This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals
Learning Outcomes:- Describe the differences between threat agent and a threat.
- Differentiate between technology and management for security purposes.
- Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
- Discuss unethical and illegal behavior, plus, risk management.
- Discuss security information, ISO 27000, and ISO 17799.
- Demonstrate the Importance of NIST, security framework applications, and technology management.
- Explain the types and functions of firewalls.
- Discuss DMZ and IDPS systems.
- Define cryptography and cryptanalysis, plus, functions for using a key.
- Explain differences between symmetric and asymmetric encryption.
- Discuss the types and uses of locks and HVAC technology.
- Explain the project plan, statement of vision, and objectives.
- Summarize security for organizational personnel and termination procedures.
- Discuss organizations security environment, CERT, and vulnerable processes.
- Introduce self and explain course expectations.
- Integrate the course concepts through interaction with other Learners and your Mentor.
- Access information efficiently and effectively.
- Evaluate information critically and competently.
- Practices ethical behavior in regard to information and information technology.
Upper Division Courses
TECH 2440 Information and Technology Security
This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionals
Learning Outcomes:- Describe the differences between threat agent and a threat.
- Differentiate between technology and management for security purposes.
- Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
- Discuss unethical and illegal behavior, plus, risk management.
- Discuss security information, ISO 27000, and ISO 17799.
- Demonstrate the Importance of NIST, security framework applications, and technology management.
- Explain the types and functions of firewalls.
- Discuss DMZ and IDPS systems.
- Define cryptography and cryptanalysis, plus, functions for using a key.
- Explain differences between symmetric and asymmetric encryption.
- Discuss the types and uses of locks and HVAC technology.
- Explain the project plan, statement of vision, and objectives.
- Summarize security for organizational personnel and termination procedures.
- Discuss organizations security environment, CERT, and vulnerable processes.
- Introduce self and explain course expectations.
- Integrate the course concepts through interaction with other Learners and your Mentor.
- Access information efficiently and effectively.
- Evaluate information critically and competently.
- Practices ethical behavior in regard to information and information technology.