Information Security (CERT)

Summary

The Information Security certificate provides students with the necessary knowledge in information security principles and practices and an understanding of how information security functions in an organization from both business and technology aspects. The program will engage students with a thorough review of viruses, worms, backdoors, Trojan horses, Rootkits, and other threats. Students will analyze malware in order to understand the infection, propagation, and deception mechanisms of these attack vectors. It will also focus on risk assessment to identify reasonably foreseeable internal and external risks to the security, confidentiality and integrity of user information and assess the sufficiency of any safeguards in place to control these risks.

The certificate may not be eligible for federal financial aid. Speak with the Campus Hub for details. 

Catalog Year

2024-2025

Degree

Certificate

Major Credits

12

Total Credits

12

Locations

Mankato

Career Cluster

Information Technology

Program Requirements

Prerequisites to the Major

Students planning to take CIS 460 must have basic knowledge of or experience in data communications and networking (equivalent of CIS 360). Students planning to take CIS 442 must have basic knowledge of or experience in databases (equivalent of CIS 340).

Major Restricted Electives

Choose 12 Credit(s).

Security concepts and mechanisms; security technologies; authentication mechanisms; mandatory and discretionary controls; cryptography and applications; threats; intrusion detection and prevention; regulations; vulnerability assessment; information assurance; forensics; anonymity and privacy issues; disaster recovery planning, legal issues and ethics.

Prerequisites: EE 107 or CIS 121 or an approved substitute.

This course covers science and study of methods of protecting data and designing disaster recovery strategy. Secure database design, data integrity, secure architectures, secure transaction processing, information flow controls, inference controls, and auditing. Security models for relational and object-oriented databases.Variable

Prerequisites: CIS 350, CIS 440

Covers information warfare principles and technologies. Information warfare concepts; protocols, authentication, and encryption; network attack techniques, methodologies, and tools; network defense; malware; Trojan worms, viruses, and malicious code; electronic crimes and digital evidence.

Prerequisites: CIS 350

Advanced coverage of data communication, networking and security protocols. Topics: data transmission methods, error detection and recovery, flow control, routing, security issues and performance analysis of existing and emerging protocols for secure communication. Fall, Spring

Prerequisites: CIS 360