Azusa Pacific University System
The Cyber Security concentration provides students with specialized knowledge and skills related to information and system security, including best practices related to vulnerability assessment, data protection, compliance, and risk management. Students are prepared for a variety of career opportunities within the information security industry.
This 15-unit concentration requires the following coursework:
This course introduces learners to the application of forensic science principles and practices to the collection, preservation, examination, analysis, and presentation of digital evidence. The course includes topics from the legal, forensic, and information technology fields.
Learners explore the hacker mindset and work with various hacker tools. In today’s rapidly changing security landscape, understanding the ethical application of hacker tools and techniques prepares learners to design and build practical information technology defenses for the purpose of safeguarding and protecting legitimate resources.
This course explores ethical issues related to information systems in the context of business, including information privacy, intellectual property rights, malicious technologies, workplace access to inappropriate content, and ethical codes of conduct. Learners are presented with ethical theory and decision-making models to help them determine appropriate responses to ethical issues.
This course introduces learners to the basics of information security in the workplace with an emphasis on the role of compliance with regulatory bodies. Compliance requirements in all areas of information technology continue to grow. Learners explore the analysis and design required to meet these evolving demands.
Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimize the effects of risk on an organization's capital and earnings. Learners will acquire the skills necessary to successfully identify and analyze risks, develop risk management processes and remediation plans, and explore the different models used in the risk management practice.
Positions as information security analysts, information security officers, network administrators, security architects, software security engineers.
Get in Touch
Having trouble navigating the website or need answers to a specific question? We’ve got you covered.
Tell us a little more about yourself to receive additional information about LAPU.