Vista College is not accepting enrollments in the Information Systems Security & Assurance Associate of Applied Science program at this time.
Please visit our Information Technology Associate Degree program.
In as little as 85 weeks*, our Associate degree program in Information Systems Security and Assurance will provide the foundation and training you need to seek an entry-level job in the field. After graduating, you can seek employment in the information systems security and cyber security branches of an organization as a systems security analyst, systems security administrator, or other IT network systems position that has security responsibilities.
Information systems security professionals must protect a company’s data. This involves working with security programs as well as hardware. Depending on the position and organization, a systems security professional’s role may include:
- Testing, implementing, maintaining, and repairing software and hardware that protect data
- Leading information security teams
- Designing and implementing organization-wide processes and policies to improve security
- Managing a technical helpdesk
*Successful, Full-time enrollment is required to achieve stated completion dates.
|Course #||Course Title||Credits|
|ISA100||Fundamentals of Networking||6|
|ISA101||Fundamentals of Information Systems Security||6|
|ISA102||Legal Issues in Information Security *||6|
|ISA103||Managing Risk In Information Security *||6|
|ISA104||Auditing ITS Infrastructures For Compliance *||6|
|ISA105||Security Policies and Implementation Issues *||6|
|ISA206||Access Control, Authentication, and PKI *||6|
|ISA207||Security Strategies in Windows Platforms and Applications *||6|
|ISA208||Network Security, Firewalls, and VPNs *||6|
|ISA209||Hacker Techniques, Tools, and Incident Handling *||6|
|ISA210||Security Strategies in Web Applications and Social Networking *||6|
|GE201||Introduction to College Mathematics||9|
|GE202||Introduction to Computer Science||4.5|
|GE203||Introduction to Psychology||4.5|
|GE206||English Composition I||4.5|
|GE207||English Composition II *||4.5|
Fundamentals of Networking
This course provides an introduction to networking and internetworking technologies applying devices, software systems and tools commonly found in consumer and business environments. The goal is to expose students to fundamental concepts and hands-on experience necessary to support basic network devices and infrastructure.
Fundamentals of Information Systems Security
This course provides an overview of security challenges and strategies of countermeasure in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity, and confidentiality aspects of information systems.
Legal Issues in Information Security
This course provides an overview of legal processes involved in implementing and maintaining information systems security. Students will study security violations and breaches in relation to pertinent laws and regulations, and will use case studies to analyze legal impacts of information security issues.
Managing Risk In Information Security
This course addresses the broad topic of risk management and how risk, threats, and vulnerabilities impact information systems. Areas of instruction include how to assess and manage risk based on defining an acceptable level of risk for information systems. Elements of a business impact analysis, business continuity plan, and disaster recovery plan will also be discussed.
Auditing ITS Infrastructures For Compliance
This course explores principles, approaches and methodology in auditing information systems to ensure processes and procedures are in compliance with pertinent laws and regulatory provisions especially in the context of information systems security (ISS).
Security Policies and Implementation Issues
This course explores strategies and methods in formulating organizational policies in order to guide the practices that safeguard the integrity of the information systems infrastructure. Issues on organizational behavior and crisis management related to security policies are also addressed.
Access Control, Authentication, and PKI
This course introduces the concept of access control to information systems. Applications, authentication, and accounting for end users and system administrators will be discussed. Security controls for access control including tokens, biometrics, and use of public key infrastructures (PKI) will also be explored.
Security Strategies in Windows Platforms and Applications
This course discusses security implementations for various Windows platforms and applications. Areas of study involve identifying and examining security risks, security solutions and tools available for various Windows platforms and applications.
Network Security, Firewalls, and VPNs
This course introduces virtual private networks (VPNs) and firewalls for securing a network. Various network security-related issues are examined. Benefits and architecture of a VPN and different types of VPNs for securing data in an organizational setup are examined. The use of firewalls in tackling security problems is discussed in the context of how to construct, configure, and administer a firewall.
Hacker Techniques, Tools, and Incident Handling
This course explores systems intrusion and detection in the context of hacking tools and incident handling. Topics include vulnerabilities of operating systems and various tools used by hackers in order to access unauthorized information. The course also introduces methods in incident handling when information security is compromised.
Security Strategies in Web Applications and Social Networking
This course explores how Internet and Web-based applications have transformed the way businesses, organizations, and people communicate. With this transformation came new risks, threats, and vulnerabilities for Web-based applications. This course presents security strategies to mitigate the risk associated with Web applications and social networking.
Introduction to College Mathematics
Introduction to College Mathematics covers basic math topics such as solving for whole numbers and equations, understanding proper and improper fractions, converting decimals and figuring percentages. Other topics covered include calculating simple interest, annuities, loan amortization, checkbook reconciliation, and business statistical problems such as mean, median and mode.
Introduction to Computer Science
This course introduces various information and communications technologies and explains how information systems are used to solve problems.
Introduction to Psychology
This course includes the study of the theories and concepts of psychology including the scope of psychology, biological foundations and the brain, sensation, perception, motivation, personality, learning/memory, emotion, states of consciousness, personality theories, cognition, life-span development, and applied psychology.
English Composition I
This course introduces students to critical reading and writing, research techniques, citation and documentation formats, as well as the use of correct grammar and sentence structure to communicate effectively.
English Composition II
This course builds on the skills learned in English Composition I. It develops written communication skills with an emphasis on the use of the writing process, the analysis of readings, and the practice of writing for personal and professional applications.
As technology evolves and hackers adopt new tools and processes, an organization’s data security continues to be threatened. Even the most secure information systems need to update their hardware and software to prevent becoming compromised. Information systems security professionals need to remain current with leading technologies.
You’ll learn how to:
- Analyze security issues, policies, and implementations
- Audit systems to ensure compliance
- Control access
- Configure operating systems and network security
- Counter hacking ethically
- Perform systems forensics
- Respond to incidents