cmgt431 | undergraduate

Information Systems Security

Explore by:

or call us at



This course introduces students to the concept of information systems security within the framework of a major security certification - the Certified Information Systems Security Professional (CISSP®) certification. It provides an overview of the new eight domains of the CISSP® certification and prepares students for more detailed work in the subsequent program courses. The domains include: Security and Risk Management, focusing on Security, Risk, Compliance, Law, Regulations, and Business Continuity; Asset Security, focusing on Protecting the Security of Assets; Security Engineering, focusing on Engineering and Management of Security; Communication and Network Security, focusing on Designing and Protecting Network Security; Identity and Access Management, focusing on Controlling Access and Managing Identity; Security Assessment and Testing, focusing on Designing, Performing, and Analyzing Security Testing; Security Operations, focusing on Foundational Concepts, Investigations, Incident Management, and Disaster Recovery; and Software Development Security, focusing on Understanding, Applying, and Enforcing Software Security.

This undergraduate-level course is 5 To enroll, speak with an Enrollment Representative.

Course details:

Credits: 3
Continuing education units: XX
Professional development units: XX
Duration: 5

topic title goes here

    Identity-as-a-Service (IDaaS) and Testing

    • Discuss Identity-as-a-Service (IDaaS).
    • Review and discuss integration of Identity-as-a-Service (IDaaS).
    • Evaluate the testing and assessment strategies for software development.
    • Describe the difference between internal and external security audits.

    Incident Response, Prevention, and Change Management

    • Evaluate security incidents within an organization.
    • Describe preventative and mitigation measures against cyber-attacks on an organization.
    • Create a Change and Configuration Management Plan.
    • Assess environmental and security controls in a software development life cycle.

    Security Planning and Implementation

    • Discuss concepts and principles of securing and protecting information assets.
    • Apply risk management processes to support business continuity.
    • Describe three appropriate levels of security for an organization’s network.
    • Evaluate an incident response process.

    Security Governance, Risk Management, and Ethics

    • Reflect on the organizational processes in security governance.
    • Compare mitigation plans and the appropriate security risks involved during implementation.
    • Discuss how an organization’s code of ethics impacts security.
    • Summarize five key components of asset security standards and security governance.

    Vulnerabilities, Cryptography, Protocols, and Networks

    • Review the various access control categories and privileges applied to securing physical business assets.
    • Demonstrate the application and use of asymmetric and symmetric cryptography.
    • Discuss vulnerabilities of security architecture.
    • Explain the process of a secure network and communications security architecture.
    Tuition for individual courses varies. For more information, please call or chat live with an Enrollment Representative.

    Please ask about these special rates:

    Teacher Rate: For some courses, special tuition rates are available for current, certified P-12 teachers and administrators. Please speak with an Enrollment Representative today for more details.

    Military Rate: For some courses, special tuition rates are available for active duty military members and their spouses. Please speak with an Enrollment Representative today for more details.

    The University of Phoenix reserves the right to modify courses.

    While widely available, not all programs are available in all locations or in both online and on-campus formats. Please check with a University Enrollment Representative.

    Transferability of credit is at the discretion of the receiving institution. It is the student’s responsibility to confirm whether or not credits earned at University of Phoenix will be accepted by another institution of the student’s choice.