Start when you're ready
Choose an upcoming start date:
Please Note: Attendance and participation are mandatory in all University courses, and specific requirements may differ by course. If attendance requirements are not met, a student may be removed from the course. Please review the Course Attendance Policy in the Catalog for more information.
University of Phoenix reserves the right to modify courses. While widely available, not all programs are available to residents of all states. Please check with a University Enrollment Representative.
Course level: Undergraduate
This course explores the evolution from information security to cyber security, policy and cyber security development, and the relationships between business and public- or private-sector organizations in meeting the challenges of cyber security threats. Students will be introduced to the legal and regulatory requirements for internal network and Internet security as they apply to both business and personal use. Vulnerabilities of both the organization and the individual will be reviewed as well as the processes and controls for mitigating cyber security threats. The need for an IT audit will also be explored as part of the vulnerability or mitigation process as well as the need for development of an organization-wide cyber security policy.