Skip Navigaton

Information Systems Security

Certificate Program Online!

CertificateOverview

Corporations have been put on alert to heighten their infrastructure and data security due to threats from hackers and cyber-terrorists. Government agencies and customers have dramatically increased their requirements of corporate security procedures. Develop the skills you need to succeed in this rapidly expanding, dynamic field.

The curriculum focuses on developing a comprehensive understanding of the principles for designing, engineering, and managing secure information systems environments. Core topic areas include access control, application development security, business continuity and disaster recovery planning, cryptography, information security governance and risk management, legal, regulations, investigations and compliance, operations security, physical (environmental) security, security architecture and design, and telecommunications and network security. This program will help prepare you to sit for the Certified Information Systems Security Professional (CISSP®) exam administered by the International Information Systems Security Certification Consortium, Inc., (ISC)2®.

In addition, graduates from UC Irvine Extension's Information Systems Security Certificate Program are eligible to transfer credits to University of Wisconsin-Platteville's Online Master of Science in Criminal Justice.

Who Should Enroll

This program has been designed to benefit security professionals who require CISSP® certification and work on software development and information technology infrastructure teams, security technicians working with Internet service providers, application service providers, systems integrators, and security auditors. Business professionals who must combat potential cyber-threats and attacks that endanger their organizations’ data will also benefit from this program.

The program also includes courses to expand technical skills and enable security professionals and those training to be security professionals to pursue and maintain a variety of industry certifications. The courses include current findings from academic and technological research and state-of-the-art practice.

Certificate Requirements

A certificate is awarded upon completion of: three (3) required courses and six (6) units of elective courses; totalling minimum of fifteen (15) units or 150 hours of instruction with a grade point average of 'B' or better.

To become an official candidate in the program, students pursuing the certificate must submit a Declaration of Candidacy. To receive the certificate after completing all program requirements, students must submit a Request for Certificate. All requirements must be completed within five (5) years after the student enrolls in his/her first course. Students not pursuing the certificate program are welcome to take as many individual courses as they wish.

On-site Training Available

Through Corporate Training, we can deliver this program or customize one that fits your organization's specific needs. Visit Corporate Training or call (949) 824-1847 for information.

Stay Informed About
Information Systems Security

Information Systems Security Education Planning Session
Recorded 3/21/2014
View Webinar

Information Systems Security Special Topic Webinar: Computer Forensics
Recorded 3/15/2013
View Webinar

Program Benefits

  • Develop key knowledge of information systems security, including access control, administration, audit and monitoring, risk, response, and recovery
  • Implement government and customer imposed security requirements
  • Develop best practices for business continuity planning in the event of a major disaster or major change in the business
  • Broaden your knowledge to include the implementation of multiple technologies, including client/server, Web, mainframe, and wireless
  • Design, diagnose, implement, manage, and resolve complex computer security threats
  • Gain the knowledge required to obtain your CISSP® certification

Advisory Committee

  • Leo A. Dregier III, CISSP®, CEH™, CHFI™, CISM®, CEO, The Security Matrix, LLC
  • Nelson Eby, M.S., ACE, Forensic Analyst, GE, Federal Bureau of Investigation CART, Member of Technical Working Group for Education and Training in Computer Forensics
  • Tony Gaidhane, MBA, M.S., CISSP®, CISM®, CISA®, PMP, Director, Identity Management, WellPoint Inc.
  • Ian Harris, Ph.D., Associate Professor, Donald Bren School of Information and Computer Sciences, University of California, Irvine
  • Terry House, Ph.D., Assistant Professor of Computer Science, Methodist University
  • Barbara Johnson, CISA®, CISSP®, ISSMP®, CBCP, MBCI, Information Security and Business Continuity Consultant, Member of the ISC2® Common Body of Knowledge (CBK) Committee
  • David M. Mahoney, MBA, PMP®, CISSP®, Manager, Infrastructure Services, Information Systems Sector, Civil Systems Division, Northrop Grumman Corporation
  • Pramod Pandya, Ph.D., Professor and Director, Information Technologies, California State University, Fullerton
  • Debbie Rodriguez, CISSP®, CISA®, MBA, System Analyst, Intuit Financial Services
  • Maria Suarez, Chief Information Security Officer, University of Southern California
My Account Login

 

Reset Password
Create New Account

×