Start by taking a single course
At CalSouthern, you have the option of enrolling in a course without committing to a degree program. It’s a fantastic way to get a feel for the CalSouthern online learning experience before enrolling. You can apply the credits you earn to a CalSouthern bachelor’s degree program, or, since CalSouthern is regionally accredited, the credits are readily transferable into a bachelor’s program at another institution, as well.* Or, maybe you simply want to gain college-level knowledge and expertise in a topic area of interest to you.
Choose from any of the undergraduate courses in CalSouthern’s School of Business. A vast selection of subjects are available, on topics as diverse as business communication, marketing, finance, human resources and international business.
Getting started is quick and easy. No entrance exams are required and you don’t have to provide official transcripts. Courses start every month and you’ll never encounter a closed course or waiting list!
*Although credits from regionally accredited institutions like CalSouthern are readily accepted by other universities, acceptance is at the discretion of the receiving institution.
Undergraduate Business Courses
TECH 2440 Information and Technology Security
This course focuses on how to secure information and technology today and in the future. Students will explore how to prevent recurring criminal threats and events, such as virus and worm attacks. They also learn how to handle criminal attackers that exploit the weaknesses of information technologies by providing heightened security for those systems. By obtaining a correct mix of skills and knowledge to anticipate unwanted criminal attacks on information and technology, today’s students will become tomorrow’s security practitioners and professionalsLearning Outcomes:
- Describe the differences between threat agent and a threat.
- Differentiate between technology and management for security purposes.
- Illustrate the different types of laws and Sarbanes-Oxley Act of 2002.
- Discuss unethical and illegal behavior, plus, risk management.
- Discuss security information, ISO 27000, and ISO 17799.
- Demonstrate the Importance of NIST, security framework applications, and technology management.
- Explain the types and functions of firewalls.
- Discuss DMZ and IDPS systems.
- Define cryptography and cryptanalysis, plus, functions for using a key.
- Explain differences between symmetric and asymmetric encryption.
- Discuss the types and uses of locks and HVAC technology.
- Explain the project plan, statement of vision, and objectives.
- Summarize security for organizational personnel and termination procedures.
- Discuss organizations security environment, CERT, and vulnerable processes.
- Introduce self and explain course expectations.
- Integrate the course concepts through interaction with other Learners and your Mentor.
- Access information efficiently and effectively.
- Evaluate information critically and competently.
- Practices ethical behavior in regard to information and information technology.