Saturday, 26 May 2012

Online Information Systems Security Degrees by Program Level

The fast-paced, rapidly growing field of information technology offers graduates ample career opportunities and flexibility. Work experience combined with a degree is usually a prerequisite for management positions. Bachelor's and master's degree programs in the field are available online.

Online Bachelor's Degree Program in Information Systems Security Overview

A bachelor's degree program in information systems technology is typically comprised of studies in the social and natural sciences, humanities and specialized coursework in information technology. Students gain information technology skills, such as systems administration and management, database development and maintenance, Web development and software development.

Program Information and Requirements

It typically takes four years to complete the coursework required to earn a Bachelor of Science in Information Technology or similar degree. A high school diploma and acceptable scores on entrance exams, such as the ACT and SAT, are common prerequisites.
Students interested in distance learning are generally able to complete this degree program entirely online. Students need a computer with high-speed Internet. Coursework is monitored through a course management system. Instructors blend traditional text, Web presentations and other modern instructional technologies to create a virtual classroom. Advanced classes in information technology might require additional computer hardware, software or specific operating system.

List of Common Undergraduate Information Systems Security Courses

At the bachelor's degree level, information technology courses are typically introductory in nature. Students learn the principles and practices of Web networks, databases, security and current operating systems.

Basics of Information Systems Security Course

Students receive a broad and thorough overview of information security methods. Topics covered include network infrastructure security, assessment and audits, access control, cryptography and organizational security.

Basics of Project Management Course

Project planning and implementation are the focal points. Students learn how to conceive and see a project through while paying attention to important issues, such as cost, best practices, resource allocation and personnel management.

Basics of Computer Networks Course

Students learn about computer networking theory which includes a discussion of networking equipment and networking protocols. Also covered are the design, installation and configuration of computer networking devices, such as routers, switches and firewalls.

Career Information

Graduates are qualified to take on a number of roles, including database administrator, systems designer, contingency planning analyst and disaster recovery analyst. The U. S. Bureau of Labor Statistics (BLS) reported an expected 30% increase in overall employment for such jobs over 2008-2018 (www.bls.gov). A survey, taken by Salary.com in August 2010, reported the middle 50% of database administrators and information systems securities managers earned $75,001-$97,443 and $87,099-$115,416 respectively.

Online Master's Degree Program in Information Systems Security Overview

Students working towards a Master of Science in Information Technology or Master of Science in Computer Information Systems take advanced coursework that covers core information technology topics and concentration areas, such as database management, project management, business intelligence and information systems security. Classes are designed to give students ample hands on experience and prepare them for management positions.

Program Information and Requirements

A master's degree program in information systems security typically takes two years to complete. It is available as a distance learning program from many schools.
Instructors use current online educational tools, such as audio and video presentations, chat rooms and podcasts to create a virtual learning environment. Specific software and computer operating systems may be required on an individual course basis.

List of Common Graduate Information Systems Security Courses

The curriculum of this master's degree program is comprised almost entirely of advanced coursework in various information technology concentrations, including information systems security. Students who concentrate in security take courses in security threat identification, security policy development and procedures, project management and others.

Advanced Theories of Database Security Course

Current theories and practices in database security and auditing are the focus of this course. Students use simulated scenarios and examples to explore database security issues, such as profiles, password policies and access control enforcement.

Policies and Procedure of Information Technology Security Course

This course focuses on security risk detection, security policy correction and secure business network implementation. Areas of interest include risk management plans, network and user access, disaster recovery, proper information handling procedures and privacy issues.

Theories and Practices in Data Mining Course

Students review current practices and theories in data mining, text mining and Web mining, using case studies as examples. Emphasis is placed on classification, decision-making, association rules, clustering and algorithms.

Career Information

A master's degree is generally preferred for upper-level management information technology positions. As technology continues to advance, the need for qualified workers in information technology will continue as well.

No comments:

Post a Comment