Information Security Planning

Online Undergraduate Certificate in Information Security Planning

Save @ AMU

$0 Application Fee
$0 Transfer Credit Evaluation
$0 Textbooks & eBooks

72%Have Graduated with No APUS-incurred Student Loan Debt2

About This Program

The undergraduate certificate in information security planning from American Military University (AMU) enables you to develop your knowledge of information systems attacks and defense principles, as well as how to protect an organization’s information assets.

Through our online information security planning classes, you will:

  • Learn how to design secure networks in a rapidly changing environment and strategize and develop sound security policies
  • Improve your ability to use cryptography and assess system vulnerabilities
  • Discover how to perform business continuity planning and use continual planning techniques that minimize risk

What You Will Do

  1. Study national/federal laws and policies (including Sarbanes-Oxley) related to information assurance and network security, as well as the social, psychological, legal, and management issues, risks, and controls
  2. Become familiar with the principles and concepts behind computer network defense (CND) methods, robust codes, cryptography, authentication, authorization, non-repudiation, and commercially available security packages such as PKI, PGP, Kerberos, SSL, and VPN
  3. Understand the processes, roles, and responsibilities of management and security professionals in risk assessment, risk mitigation, security validation, policy enforcement, and personnel training
  4. Grow your understanding of the plans, procedures, practices, and tools to ensure business continuity and incident recovery

Program at a Glance

Number of Credits
18
Cost Per Credit
$350 | $250*
$315**
Courses Start Monthly
Online
  • Want to Learn More?

    Contact student support if you're a current student and need assistance.

    Step One: Introduce Yourself
    Validation message here
    Validation message here
    Validation message here
    Validation message here
    Validation message here
    Validation message here

Program Requirements Printable Catalog Version

Must take all courses for this section.

Course ID: 5165

|
This course examines the techniques and technologies for penetration of networks, detection of attacks, and prevention of attacks. This course addresses the techniques, the technologies, and the methodologies used by cyber intruders (hackers) to select a target and launch an attack. Students will gain insight into the motives and desired goals of hackers as well as effective tools and techniques used as countermeasures ensuring data assets remain secure. This course focuses on techniques and technologies to detect such attacks even while the attack is in progress; early detection enables the administrator to track the movements of the hacker and to discover the intent and goals of the hacker. This course assesses the various countermeasures to keep the system out of the “sights” of the hacker and to keep the hacker out of the perimeter of the target network. This course also explores the laws and the legal considerations in prosecuting computer crime.
Registration Dates Course Dates Session Weeks
07/29/24 - 01/03/25 01/06/25 - 03/02/25 Winter 2025 Session B 8 Week session
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 2634

|
This course is a study of the discipline of Information Assurance that focuses on protecting information assets by ensuring availability, confidentiality, integrity, authenticity, and non- repudiation. This course delves into the deliberate engineering, planning and implementation of the five major areas in any enterprise: hardware, software, networks, people, and policies. This course meets the topical requirements of the DoD Directive 8570.1M Information Assurance Management (IAM) Technical III, Management II and Management III categories.
Registration Dates Course Dates Session Weeks
07/29/24 - 01/03/25 01/06/25 - 03/02/25 Winter 2025 Session B 8 Week session
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 3183

|
This course allows students to examine a broad range of computer security issues and provides the student with technical knowledge not normally addressed in traditional training. It explores the protection of proprietary information and security planning with an emphasis on networked computer vulnerabilities. It also focuses on detection (e.g. viruses, hackers, types of computer crime, computer forensic examination, etc.), as well as disaster recovery and technology law. A primary focus is put on security of systems and computer crime prevention. Also addressed is the maturing criminal population with increased computer literacy, whose tendency is to move from violent actions to more profitable computer crime. Finally, issues of privacy and freedom of information are examined. This course meets the topical requirements of the DoD Directive 8570.1M Information Assurance Management (IAM) Technical II and Management I categories. Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility.
Registration Dates Course Dates Session Weeks
07/29/24 - 01/03/25 01/06/25 - 03/02/25 Winter 2025 Session B 8 Week session
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 2646

|
Security is one of the most important concerns in the world of Information Technology. This course examines the technical issues and the administrative practices to implement and manage security; in particular, this course focuses on the principles of security auditing. This course explores the various technologies and tools to assist with discovery and auditing in the world of security management. This course also assesses the audit practices, audit processes, audit plans, discovery process, discovery software, penetration strategies, identification of potential attacks, log analysis, user baseline analysis, activity analysis, risk assessment, roles and responsibilities, and the roles and responsibilities of security auditing professionals.
Registration Dates Course Dates Session Weeks
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 2647

|
This course examines the principles of security planning and policy; it offers a holistic approach to cybersecurity for an organization. It focuses on a variety of security guidelines, policies and plans (security requirements, internal users, external users, operational costs, geography, capacity plan, growth plan, business organization, business scenarios, business factors, business processes, business functions, business products, product life cycle, technical factors, roles and responsibilities, and organizational authority). This course addresses physical security, authentication, network security, encryption, software development, email, Internet, acceptable use, acceptable speech, and viruses/worms. It also covers the need for actionable and maintainable policies and the need for periodic audits of policies and configurations.
Registration Dates Course Dates Session Weeks
07/29/24 - 01/03/25 01/06/25 - 03/02/25 Winter 2025 Session B 8 Week session
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Course ID: 5169

|
This course examines how laws have changed to account for the expanded realm of crimes in the digital age. Students will learn about topics such as online identity theft, sexual harassment, intellectual property rights violations, and plagiarism. In addition, students will learn how stalkers can access the digital data of victims, gain access to highly confidential medical and financial information, and sabotage their victims' reputations. This course examines current literature on topics such as the Health Insurance Portability and Accountability Act (HIPAA), the Family Educational Rights and Privacy Act (FERPA), the Children’s Online Privacy Protection Act (COPPA), the Sarbanes-Oxley Act, and other legislation impacting legal disputes.
Registration Dates Course Dates Session Weeks
07/29/24 - 01/03/25 01/06/25 - 03/02/25 Winter 2025 Session B 8 Week session
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session
12/30/24 - 05/30/25 06/02/25 - 07/27/25 Spring 2025 Session D 8 Week session

Courses Start Monthly

Next Courses Start Jan 6
Register by Jan 3

Admission Requirements

  • All AMU undergraduate programs require a minimum of a high school diploma or equivalent (i.e., GED).
  • Please read all undergraduate admission requirements before applying to this program and be prepared to submit the required documentation.
  • There is no fee to complete the AMU admission application for this program. View steps to apply.

Need Help?

Selecting the right program to meet your educational goals is a key step in ensuring a successful outcome. If you are unsure of which program to choose, or need more information, please contact an AMU admissions coach at 877-755-2787 or [email protected].

Quality Education Should Be Affordable

So you can focus on the opportunities ahead, without the financial burden of more expensive schools who are not as invested in your success. Learn more about paying for school.

Consumer Information

Disclosures

Maryland Residents learn more about costs, completion rates, median debt, and more.

2Alumni Graduated with No APUS-incurred Student Loan Debt As of December 31, 2021

Includes alumni who graduated with an associate, bachelor's, or master's degree from APUS. Student loan debt is defined as student loans and private education loans used for tuition, fees, living expenses, and book costs associated with courses taken at APUS. Many APUS students receive military tuition assistance and veterans education benefits, which are not student loan debt.

1The University reserves the right to accept or deny credits according to policies outlined on our University website. Please see the University's transfer credit policy webpage for complete information.

*Cost Per Credit Hour

The Preferred Military Rate is $250 per credit hour for undergraduate and  master's-level courses. This rate is available to all U.S. active-duty servicemembers, National Guard members, Reservists, and military families, including parents, spouses, legal partners, siblings, and dependents.

See all military student benefits.

Cost of Attendance

Learn more about AMU’s cost components and full cost of attendance