Corporations have been put on alert to heighten their infrastructure and data
security due to threats from hackers and cyber-terrorists. Government agencies and customers have dramatically increased their
requirements of corporate security procedures. Develop the skills you
need to succeed in this rapidly expanding, dynamic field.
The curriculum focuses on developing a comprehensive understanding of the
principles for designing, engineering, and managing secure
information systems environments. Core topic areas include access control,
application development security, business continuity and disaster recovery
planning, cryptography, information security governance and risk management,
legal, regulations, investigations and compliance, operations security, physical
(environmental) security, security architecture and design, and
telecommunications and network security. This program will help prepare you to
sit for the Certified Information Systems Security Professional (CISSP®) exam
administered by the International Information Systems Security Certification
Consortium, Inc., (ISC)2®.
In addition, graduates from UC Irvine Extension's Information Systems Security Certificate Program are eligible to transfer credits to University of Wisconsin-Platteville's Online Master of Science in Criminal Justice.
Who Should Enroll
This program has been designed to benefit security professionals who require CISSP®
certification and work on software development and information technology infrastructure
teams, security technicians working with Internet service providers, application
service providers, systems integrators, and security auditors. Business professionals
who must combat potential cyber-threats and attacks that endanger their organizations’
data will also benefit from this program.
The program also includes courses to expand technical skills and enable
security professionals and those training to be security professionals to pursue
and maintain a variety of industry certifications. The courses include current
findings from academic and technological research and state-of-the-art practice.
A certificate is awarded upon completion of: three (3) required courses and six (6) units of elective courses; totalling minimum of fifteen (15)
units or 150 hours of instruction with a grade point average of 'B' or better.
To become an official candidate in the program, students pursuing the certificate must submit a Declaration of Candidacy. To receive the certificate after completing all program requirements, students must submit a Request for Certificate. All requirements must be completed within five (5) years after the student enrolls in his/her first course. Students not pursuing the certificate program are welcome to take as many individual courses as they wish.
On-site Training Available
Through Corporate Training, we can deliver this program or customize one that fits
your organization's specific needs. Visit Corporate Training
or call (949) 824-1847 for information.
Information Systems Security
Information Systems Security Education Planning Session
Information Systems Security Special Topic Webinar: Computer Forensics
- Develop key knowledge of information systems security, including access control,
administration, audit and monitoring, risk, response, and recovery
- Implement government and customer imposed security requirements
- Develop best practices for business continuity planning in the event of a major
disaster or major change in the business
- Broaden your knowledge to include the implementation of multiple technologies, including
client/server, Web, mainframe, and wireless
- Design, diagnose, implement, manage, and resolve complex computer security threats
- Gain the knowledge required to obtain your CISSP® certification
- Leo A. Dregier III, CISSP®, CEH™, CHFI™, CISM®, CEO, The Security Matrix, LLC
- Nelson Eby, M.S., ACE, Forensic Analyst, GE, Federal Bureau of Investigation CART, Member of Technical Working Group for Education and Training in Computer Forensics
- Tony Gaidhane, MBA, M.S., CISSP®, CISM®, CISA®, PMP, Director, Identity Management, WellPoint Inc.
- Ian Harris, Ph.D., Associate Professor, Donald Bren School of
Information and Computer Sciences, University of California, Irvine
- Terry House,
Ph.D., Assistant Professor of Computer Science, Methodist University
Johnson, CISA®, CISSP®, ISSMP®, CBCP, MBCI, Information Security and Business
Continuity Consultant, Member of the ISC2® Common Body of Knowledge (CBK)
- David M. Mahoney, MBA, PMP®, CISSP®, Manager, Infrastructure Services,
Information Systems Sector, Civil Systems Division, Northrop Grumman Corporation
- Pramod Pandya, Ph.D., Professor and Director, Information Technologies,
California State University, Fullerton
- Debbie Rodriguez, CISSP®, CISA®, MBA,
System Analyst, Intuit Financial Services
- Maria Suarez, Chief Information Security
Officer, University of Southern California