Information Security
The Bachelor of Science in Information Security is a degree-completion program. Students are expected to begin the program at WTU having already earned 90 credits at one or more other institutions. Students complete a further 90 credits through courses taken at WTU to graduate with a total of 180 credits.
The program is designed to provide an in depth understanding of information technology as well as prepare students to address a wide range of vulnerabilities and threats that affect private, corporate and government computer information systems. This program prepares students to design and implement key technologies and processes needed to protect critical information in cyberspace.
Program Outcomes
Identify the elements of an information system and understand how software is developed and used within the information system
Use and apply mathematical concepts appropriate to the development of software for a computer and information system
Demonstrate background knowledge of Operating Systems, Networking, Data Communications, Database Technology, Information Systems Planning, and Project Management
Analyze an information systems problem, define performance requirements and specifications needed to solve an information security problem
Identify solutions while recognizing the social and ethical impact of computing on individuals, organizations and society
Demonstrate effective team communication
Use current techniques, skills, and tools necessary for information systems practices by recognizing the need for, and the ability to engage in, continuing professional development
Understand professional, ethical, legal, security, social issues and responsibilities
Demonstrate the use of various computer forensic software tools and techniques as well as follow proper legal procedures for obtaining, analyzing, and reporting digital forensic evidence
Explain the findings of a cyber forensic investigation in both written form and in oral form
Identify and analyze legal issues within technology, regarding standards, compliance, contracts, computer crime, privacy, obscenity, and intellectual property
Compare and contrast techniques for preventing unauthorized access to computer networks and apply measures for minimizing the damage caused by network intruders.
Evaluate and implement security controls for an information system to provide assurance where the security processes or controls are implemented
Evaluate an implemented Governance Framework for its effectiveness and usefulness to an organization.
Identify the security mechanisms contained within various computing devices used to protect it while allowing it access to external data and other connected devices
Program Plan
General Education
These are credits that need to be earned at another organization before applying to WTU. They are credits to be transferred into the program at WTU.
- Communications (5 credits)
- Quantitative and Symbolic Reasoning (5 credits)
- Humanities (10 credits from two different subject areas or disciplines)
- Social Sciences (10 credits in two different subject areas or disciplines)
- Natural Sciences (10 credits in two different subject areas or disciplines)
- Electives (5 credits for any discipline from any category in this list)
General Electives
These are credits that need to be earned at another regionally or nationally accredited college or university before applying to WTU. They are credits to be transferred into the program at WTU.
Foundational Courses
These are basic required courses for the program. You will take these courses at WTU. The courses are designed to ensure you have the basic computing concepts and foundational Math concepts you will need to succeed through the remainder of the program.
| MATH 200 | Quantitative Tools and Methods | 5 |
| CPSC 210 | Computer Systems Foundations | 5 |
| Total Credit Hours: | 10 |
Core Technology Courses
These courses form the foundational technology classes needed to complete the program. You will take these courses at WTU.
| CPSC 220 | Operating Systems Foundations | 5 |
| CPSC 250 | Programming Fundamentals | 5 |
| CPSC 310 | Database Management Systems | 5 |
| INSE 300 | Legal and Ethical Issues in Information Systems | 5 |
| INSE 320 | Data Communications and Networking | 5 |
| INSE 335 | Project Management | 5 |
| INSE 400 | Fundamentals of Information Security | 5 |
| Total Credit Hours: | 35 |
Depth of Study Courses
These courses form the major classes needed to complete the program. You will take these courses at WTU.
| INSE 405 | Internet Security | 5 |
| INSE 410 | Corporate Governance, Policy, Risk, and Cybercrime | 5 |
| INSE 415 | Computer and Network Security | 5 |
| INSE 420 | Security Strategies for Operating Systems and Applications | 5 |
| INSE 425 | Computer and Network Forensics | 5 |
| INSE 430 | Compliance Auditing IT Infrastructure | 5 |
| INSE 435 | Hacker Tools and Techniques | 5 |
| INSE 440 | Internet, Wireless, and Mobile Device Security | 5 |
| Total Credit Hours: | 40 |
Capstone
This is the capstone course for the program. You will take this course at WTU.
| INSE 495 | Capstone Project | 5 |
| Total Credit Hours: | 5 |
Total Credit Hours: 180
Washington Technology University
Program Design Specification
BS in Information Security
180 Credits
Approved: 12/16/2021 8:45:43 PM
Program Name:
Information Security
The Bachelor of Science in Information Security is a degree-completion program. Students are expected to begin the program at WTU having already earned 90 credits at one or more other institutions. Students complete a further 90 credits through courses taken at WTU to graduate with a total of 180 credits.
The program is designed to provide an in depth understanding of information technology as well as prepare students to address a wide range of vulnerabilities and threats that affect private, corporate and government computer information systems. This program prepares students to design and implement key technologies and processes needed to protect critical information in cyberspace.
Program Outcomes:
Identify the elements of an information system and understand how software is developed and used within the information system
Use and apply mathematical concepts appropriate to the development of software for a computer and information system
Demonstrate background knowledge of Operating Systems, Networking, Data Communications, Database Technology, Information Systems Planning, and Project Management
Analyze an information systems problem, define performance requirements and specifications needed to solve an information security problem
Identify solutions while recognizing the social and ethical impact of computing on individuals, organizations and society
Demonstrate effective team communication
Use current techniques, skills, and tools necessary for information systems practices by recognizing the need for, and the ability to engage in, continuing professional development
Understand professional, ethical, legal, security, social issues and responsibilities
Demonstrate the use of various computer forensic software tools and techniques as well as follow proper legal procedures for obtaining, analyzing, and reporting digital forensic evidence
Explain the findings of a cyber forensic investigation in both written form and in oral form
Identify and analyze legal issues within technology, regarding standards, compliance, contracts, computer crime, privacy, obscenity, and intellectual property
Compare and contrast techniques for preventing unauthorized access to computer networks and apply measures for minimizing the damage caused by network intruders.
Evaluate and implement security controls for an information system to provide assurance where the security processes or controls are implemented
Evaluate an implemented Governance Framework for its effectiveness and usefulness to an organization.
Identify the security mechanisms contained within various computing devices used to protect it while allowing it access to external data and other connected devices
Program Requirements:
Program Plan
General Education
These are credits that need to be earned at another organization before applying to WTU. They are credits to be transferred into the program at WTU.
- Communications (5 credits)
- Quantitative and Symbolic Reasoning (5 credits)
- Humanities (10 credits from two different subject areas or disciplines)
- Social Sciences (10 credits in two different subject areas or disciplines)
- Natural Sciences (10 credits in two different subject areas or disciplines)
- Electives (5 credits for any discipline from any category in this list)
General Electives
These are credits that need to be earned at another regionally or nationally accredited college or university before applying to WTU. They are credits to be transferred into the program at WTU.
Foundational Courses
These are basic required courses for the program. You will take these courses at WTU. The courses are designed to ensure you have the basic computing concepts and foundational Math concepts you will need to succeed through the remainder of the program.
| MATH 200 | Quantitative Tools and Methods | 5 |
| CPSC 210 | Computer Systems Foundations | 5 |
| Total Credit Hours: | 10 |
Core Technology Courses
These courses form the foundational technology classes needed to complete the program. You will take these courses at WTU.
| CPSC 220 | Operating Systems Foundations | 5 |
| CPSC 250 | Programming Fundamentals | 5 |
| CPSC 310 | Database Management Systems | 5 |
| INSE 300 | Legal and Ethical Issues in Information Systems | 5 |
| INSE 320 | Data Communications and Networking | 5 |
| INSE 335 | Project Management | 5 |
| INSE 400 | Fundamentals of Information Security | 5 |
| Total Credit Hours: | 35 |
Depth of Study Courses
These courses form the major classes needed to complete the program. You will take these courses at WTU.
| INSE 405 | Internet Security | 5 |
| INSE 410 | Corporate Governance, Policy, Risk, and Cybercrime | 5 |
| INSE 415 | Computer and Network Security | 5 |
| INSE 420 | Security Strategies for Operating Systems and Applications | 5 |
| INSE 425 | Computer and Network Forensics | 5 |
| INSE 430 | Compliance Auditing IT Infrastructure | 5 |
| INSE 435 | Hacker Tools and Techniques | 5 |
| INSE 440 | Internet, Wireless, and Mobile Device Security | 5 |
| Total Credit Hours: | 40 |
Capstone
This is the capstone course for the program. You will take this course at WTU.
| INSE 495 | Capstone Project | 5 |
| Total Credit Hours: | 5 |