Information Security Management Certificate of Completion

The Graduate Certificate of Completion in Information Security Management prepares professionals to lead and support the protection of critical information assets in today’s complex digital landscape. This four-course program begins with a foundational course in security management, covering essential topics such as risk assessment, access control, business continuity, and legal and ethical considerations. Learners then customize their path by selecting from a range of specialized courses that explore the many dimensions of information security—from physical and operational safeguards to human behavior, governance, compliance, and disaster recovery. This flexible structure allows students to align their studies with their professional goals and areas of interest.

Curriculum

What You'll Learn

  • Analyze organizational security needs to identify potential vulnerabilities and recommend appropriate protection strategies.
  • Evaluate security policies, governance frameworks, and compliance requirements to support risk-informed decision-making.
  • Create integrated security plans that align with business continuity, legal, and operational objectives.

Students seeking this certificate of completion will need successfully complete:

(Click a course name below to view course details).

This course addresses the issues relating to successful information security management. Topics include access control systems, network and software security, management practices, risk management, protection mechanisms, business continuity planning, and legal and ethical issues. The course allows for analysis of current security management models.

In addition, students will select 9 credits (3 classes) from those below:

This course presents an examination of effective security methodologies based on comprehensive assessment of threats and implementation of a layered system of physical and electronic protection. Threat identification, countermeasures, and prevention are explored.

This course provides an exploration of the human aspects of Cybersecurity. Topics include human behavior and interaction, motivation and influence, and social engineering. Emphasis on the human element of cyber incidents in relation to protecting information and technology assets.

This course provides an exploration of how organizations manage risks to information technology assets. Discussion includes the application of methodologies and models for managing such risks. Topics also include recognition of security threats and vulnerabilities and the analysis of associated risks. A systematic approach for acquiring and analyzing information to support decision-making in the protection of assets and the allocation of security resources is presented.

This course explores the concepts of governance and how it applies to information systems. Discussion includes the importance of compliance with laws, regulations, policies, and procedures as a means of minimizing risk through mandated security and control measures. Through this course, students also gain an understanding of Information Technology (IT) Auditing processes and principles.

This course provides the student with an opportunity to identify the processes associated with business continuity planning and disaster recovery. Business continuity topics such as project scope and planning, assessing risk, developing policy and procedures, conducting business impact analyses, recovery strategies, recovery plan development, and implementation are explored. Disaster recovery will be discussed in terms of recovery plan development, implementation, and restoration.

Related links

Online Degrees Military-Friendly University Master's in Cybersecurity Bachelor of Science in Intelligence and Security Studies Business Analytics Certificate of Completion Cybersecurity Certificate of Completion