Skip to Main Content Skip to bottom Skip to Chat, Email, Text
"Degrees & Programs"


Intro to Information Assurance & Security




Estimated Tuition


Total credits


Course length

Start when you're ready

Choose an upcoming start date:

Enroll by 1pm Central:

Please Note: Attendance and participation are mandatory in all University courses, and specific requirements may differ by course. If attendance requirements are not met, a student may be removed from the course. Please review the Course Attendance Policy in the Catalog for more information.

University of Phoenix reserves the right to modify courses. While widely available, not all programs are available to residents of all states. Please check with a University Enrollment Representative.

Course level: Undergraduate

This course is an introduction to information assurance and security in computing technology. Topics include risk management; protecting information in the enterprise; business continuity and disaster recovery planning; threats and remediation; legal, ethical, and professional issues; and considerations within systems development processes.



What you'll learn

Course skills and outcomes

Week 1

  • Compare and contrast types of security attacks and the malware used to perpetrate them.
  • Describe threat actor types and attributes.
  • Explain penetration testing and vulnerability scanning concepts.
  • Evaluate security threats and vulnerabilities in virtualization and cloud technologies.

Week 2

  • Describe hardware and software based network components used to support organizational security.
  • Explain the use of software tools to assess the security of an organization’s enterprise computing architecture.
  • Create a plan to securely deploy mobile devices.
  • Compare and contrast physical security and environmental controls.
  • Develop identity and access management policies.
  • Recommend cryptography and public key infrastructure (PKI).

Week 3

  • Explain the importance of policies, plans, and procedures related to organizational security.
  • Incorporate industry and government regulations into an organization’s cyber security plan.
  • Analyze the legal, ethical, and regulatory considerations of protecting data.

Week 4

  • Create a security risk management plan.
  • Create a disaster recovery and business continuity of operations plan.

Week 5

  • Explain the importance of secure application design, development, and deployment.
  • Design a secure staging deployment environment for an organization.
  • Analyze the security implications of embedded systems.
  • Evaluate the use of secure coding techniques in the development process.


Why take courses at University of Phoenix

Accreditation that matters

We’ve been accredited by the Higher Learning Commission ( for more than 40 years.

Real-world instructors

Learn from instructors who bring an average of 25 years of working experience to the classroom.

Affordable and potentially reimbursable

Our tuition and fees are competitive and fixed. Also, check to see if your employer will cover you for this course.

Next Steps

Start a conversation about your future with an enrollment representative today.

Start a conversation about your future with an enrollment representative today.

Call (844) 937-8679

Transfer Credits

Credit Transfer

Credit Transfer

Need to transfer credits to another college or university?

Before you enroll in a course, check with your school of choice to make sure they will accept our transfer credits and to understand any requirements or limitations. Then you can complete your course, and request your official transcript be sent to your school. That’s it!

How to request your transcripts