Common Searches

In as little as 85 weeks*, our program provides the foundation and training you need to seek an entry-level job in the field. Information systems security professionals must protect a company’s data. This involves working with security programs as well as hardware. After graduating, you can seek employment in the information systems security and cyber security branches of an organization as a systems security analyst, systems security administrator, or other IT network systems position that has security responsibilities.

You’ll learn how to:

  • Analyze security issues, policies, and implementations
  • Audit systems to ensure compliance
  • Control access
  • Configure operating systems and network security
  • Counter hacking ethically
  • Perform systems forensics
  • Respond to incidents

*Successful, Full-time enrollment is required to achieve stated completion dates.

Course # Course Title Credits
ISA100 Fundamentals of Networking 6
ISA101 Fundamentals of Information Systems Security 6
ISA102 Legal Issues in Information Security * 6
ISA103 Managing Risk In Information Security * 6
ISA104 Auditing ITS Infrastructures For Compliance * 6
ISA105 Security Policies and Implementation Issues * 6
ISA206 Access Control, Authentication, and PKI * 6
ISA207 Security Strategies in Windows Platforms and Applications * 6
ISA208 Network Security, Firewalls, and VPNs * 6
ISA209 Hacker Techniques, Tools, and Incident Handling * 6
ISA210 Security Strategies in Web Applications and Social Networking * 6
GE201 Introduction to College Mathematics 9
GE202 Introduction to Computer Science 4.5
GE203 Introduction to Psychology 4.5
GE206 English Composition I 4.5
GE207 English Composition II * 4.5

Fundamentals of Networking

ISA100

This course provides an introduction to networking and internetworking technologies applying devices, software systems and tools commonly found in consumer and business environments. The goal is to expose students to fundamental concepts and hands-on experience necessary to support basic network devices and infrastructure.

6 credits
40 theory hours
40 lab hours

Fundamentals of Information Systems Security

ISA101

This course provides an overview of security challenges and strategies of countermeasure in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity, and confidentiality aspects of information systems.

6 credits
40 theory hours
40 lab hours

Legal Issues in Information Security

ISA102

This course provides an overview of legal processes involved in implementing and maintaining information systems security. Students will study security violations and breaches in relation to pertinent laws and regulations, and will use case studies to analyze legal impacts of information security issues.

6 credits
40 theory hours
40 lab hours

Managing Risk In Information Security

ISA103

This course addresses the broad topic of risk management and how risk, threats, and vulnerabilities impact information systems. Areas of instruction include how to assess and manage risk based on defining an acceptable level of risk for information systems. Elements of a business impact analysis, business continuity plan, and disaster recovery plan will also be discussed.

6 credits
40 lab hours

Auditing ITS Infrastructures For Compliance

ISA104

This course explores principles, approaches and methodology in auditing information systems to ensure processes and procedures are in compliance with pertinent laws and regulatory provisions especially in the context of information systems security (ISS).

6 credits
40 theory hours
40 lab hours

Security Policies and Implementation Issues

ISA105

This course explores strategies and methods in formulating organizational policies in order to guide the practices that safeguard the integrity of the information systems infrastructure. Issues on organizational behavior and crisis management related to security policies are also addressed.

6 credits
40 theory hours
40 lab hours

Access Control, Authentication, and PKI

ISA206

This course introduces the concept of access control to information systems. Applications, authentication, and accounting for end users and system administrators will be discussed. Security controls for access control including tokens, biometrics, and use of public key infrastructures (PKI) will also be explored.

6 credits
40 theory hours
40 lab hours

Security Strategies in Windows Platforms and Applications

ISA207

This course discusses security implementations for various Windows platforms and applications. Areas of study involve identifying and examining security risks, security solutions and tools available for various Windows platforms and applications.

6 credits
40 theory hours
40 lab hours

Network Security, Firewalls, and VPNs

ISA208

This course introduces virtual private networks (VPNs) and firewalls for securing a network. Various network security-related issues are examined. Benefits and architecture of a VPN and different types of VPNs for securing data in an organizational setup are examined. The use of firewalls in tackling security problems is discussed in the context of how to construct, configure, and administer a firewall.

6 credits
40 theory hours
40 lab hours

Hacker Techniques, Tools, and Incident Handling

ISA209

This course explores systems intrusion and detection in the context of hacking tools and incident handling. Topics include vulnerabilities of operating systems and various tools used by hackers in order to access unauthorized information. The course also introduces methods in incident handling when information security is compromised.

6 credits
40 theory hours
40 lab hours

Security Strategies in Web Applications and Social Networking

ISA210

This course explores how Internet and Web-based applications have transformed the way businesses, organizations, and people communicate. With this transformation came new risks, threats, and vulnerabilities for Web-based applications. This course presents security strategies to mitigate the risk associated with Web applications and social networking.

6 credits
40 theory hours
40 lab hours

Introduction to College Mathematics

GE201

Introduction to College Mathematics covers basic math topics such as solving for whole numbers and equations, understanding proper and improper fractions, converting decimals and figuring percentages. Other topics covered include calculating simple interest, annuities, loan amortization, checkbook reconciliation, and business statistical problems such as mean, median and mode.

9 credits
90 theory hours

Introduction to Computer Science

GE202

This course introduces various information and communications technologies and explains how information systems are used to solve problems.

4.5 credits
45 theory hours

Introduction to Psychology

GE203

This course includes the study of the theories and concepts of psychology including the scope of psychology, biological foundations and the brain, sensation, perception, motivation, personality, learning/memory, emotion, states of consciousness, personality theories, cognition, life-span development, and applied psychology.

4.5 credits
45 theory hours

English Composition I

GE206

This course introduces students to critical reading and writing, research techniques, citation and documentation formats, as well as the use of correct grammar and sentence structure to communicate effectively.

4.5 credits
45 theory hours

English Composition II

GE207

This course builds on the skills learned in English Composition I. It develops written communication skills with an emphasis on the use of the writing process, the analysis of readings, and the practice of writing for personal and professional applications.

4.5 credits
45 theory hours

Program Availability

Ground Campuses

Request More Information

  • Step 1 Your Interests
  • Step 2 Your Information
  • Next

We Respect Your Privacy

By submitting this form, I agree that Vista College may use this information to contact me by methods I provided and consented, including phone (both mobile or home, dialed manually or automatically), social media, email, mail and text message.