bcc400 | undergraduate

Information Systems Fundamentals

Explore by:

or call us at



This course introduces the fundamentals of computer systems and the role of information processing in current business environments. Students receive an overview of information systems, systems development, operating systems, networking, telecommunications, security concerns, and the Internet. Completing this course provides students new skills and knowledge that better prepares them for the Cybercrime specialization courses, and aids their present or future organizations as leaders, providing service to their communities.

This undergraduate-level course is 5 To enroll, speak with an Enrollment Representative.

Course details:

Credits: 3
Continuing education units: XX
Professional development units: XX
Duration: 5

topic title goes here

    Web and Mobile Computing

    • Identify how mobile and wireless technologies affect information security.
    • Explain how information systems utilize new technologies.
    • Identify how the Internet impacts information systems and organizations.

    Information System Use in Organizations

    • Identify types of systems used in organizations.
    • Identify types of systems used by security professionals.
    • Explain the importance of balancing security with operations.
    • Identify internal and external security threats.

    Managing Informational Technology

    • Evaluate factors affecting system acquisition.
    • Explain alternative management options for information technology systems.
    • Explain the role of strategic planning in information technology.

    Information Systems Overview

    • Describe how information systems enable and enhance the organization.
    • Define common computer, networking, and information processing terms.
    • Identify the hardware and software that information systems use.
    • Identify the network types and telecommunications that support information systems.

    Information Flow and Security

    • Identify how information flows through an organization.
    • Evaluate ethical situations related to how information is used and shared.
    • Identify the effect of information security threats on systems.
    • Describe the security professional’s role in protecting electronic information.
    Tuition for individual courses varies. For more information, please call or chat live with an Enrollment Representative.

    Please ask about these special rates:

    Teacher Rate: For some courses, special tuition rates are available for current, certified P-12 teachers and administrators. Please speak with an Enrollment Representative today for more details.

    Military Rate: For some courses, special tuition rates are available for active duty military members and their spouses. Please speak with an Enrollment Representative today for more details.

    The University of Phoenix reserves the right to modify courses.

    While widely available, not all programs are available in all locations or in both online and on-campus formats. Please check with a University Enrollment Representative.

    Transferability of credit is at the discretion of the receiving institution. It is the student’s responsibility to confirm whether or not credits earned at University of Phoenix will be accepted by another institution of the student’s choice.