The Introduction to Information Security course presents the concepts of network security, encryption, and security policies. Students will learn security principles and how to apply this knowledge throughout future courses. Role-based access control, trusted parties, risk assessment, and incident response management practices are applied to business policies and technology systems to protect data and preserve records. The use of encryption in computer, network, and storage systems is studied and applied.
Please note: This course must be successfully completed within 2-attempts. Students unable to successfully complete the course within 2-attempts will be dismissed from the program.
To create a custom estimate of your tuition and costs, visit our Net Price Calculator.
Request information about our programs, or complete an online application to begin your journey.