Corporations have been put on alert to heighten their infrastructure and data
security due to threats from hackers and cyber-terrorists. Government agencies and customers have dramatically increased their
requirements of corporate security procedures. Develop the skills you
need to succeed in this rapidly expanding, dynamic field.
The curriculum focuses on developing a comprehensive understanding of the
principles for designing, engineering, and managing secure
information systems environments. Core topic areas include access control,
application development security, business continuity and disaster recovery
planning, cryptography, information security governance and risk management,
legal, regulations, investigations and compliance, operations security, physical
(environmental) security, security architecture and design, and
telecommunications and network security. This program will help prepare you to
sit for the Certified Information Systems Security Professional (CISSP®) exam
administered by the International Information Systems Security Certification
Consortium, Inc., (ISC)2®.
Who Should Enroll
This program has been designed to benefit security professionals who require CISSP®
certification and work on software development and information technology infrastructure
teams, security technicians working with Internet service providers, application
service providers, systems integrators, and security auditors. Business professionals
who must combat potential cyber-threats and attacks that endanger their organizations’
data will also benefit from this program.
The program also includes courses to expand technical skills and enable
security professionals and those training to be security professionals to pursue
and maintain a variety of industry certifications. The courses include current
findings from academic and technological research and state-of-the-art practice.
- Develop key knowledge of information systems security, including access control,
administration, audit and monitoring, risk, response, and recovery
- Implement government and customer imposed security requirements
- Develop best practices for business continuity planning in the event of a major
disaster or major change in the business
- Broaden your knowledge to include the implementation of multiple technologies, including
client/server, Web, mainframe, and wireless
- Design, diagnose, implement, manage, and resolve complex computer security threats
- Gain the knowledge required to obtain your CISSP® certification
Certificate Eligibility and Requirements
A certificate is awarded upon completion of: three (3) required courses and six (6) units of elective courses; totaling minimum of fifteen (15)
units or 150 hours of instruction with a grade of 'B' or higher in each course.
To become an official candidate in the program, students pursuing the certificate must submit a Declaration of Candidacy. Students are encouraged to declare candidacy as soon as possible, but no later than after the third course in the program. To receive the certificate after completing all program requirements, students must submit a Request for Certificate. All requirements must be completed within five (5) years after the student enrolls in his/her first course. Students not pursuing a certificate are welcome to take as many individual courses as they wish.
Information Systems Security
Information Systems Security Education Planning Session
Graduates from UC Irvine Extension's Information
Systems Security Certificate program are eligible
to transfer credits to University of Wisconsin-Platteville, Master of Science in Criminal Justice
and University of Maryland, Baltimore County
(UMBC), Master's in Professional Studies (MPS):
- Leo A. Dregier III, CISSP®, CEH™, CHFI™, CISM®, CEO, The Security Matrix, LLC
- Nelson Eby, M.S., ACE, Forensic Analyst, GE, Federal Bureau of Investigation CART, Member of Technical Working Group for Education and Training in Computer Forensics
- Tony Gaidhane, MBA, M.S., CISSP®, CISM®, CISA®, PMP, Director, Identity Management, WellPoint Inc.
- Ian Harris, Ph.D., Associate Professor, Donald Bren School of
Information and Computer Sciences, University of California, Irvine
- Terry House,
Ph.D., Assistant Professor of Computer Science, Methodist University
Johnson, CISA®, CISSP®, ISSMP®, CBCP, MBCI, Information Security and Business
Continuity Consultant, Member of the ISC2® Common Body of Knowledge (CBK)
- David M. Mahoney, MBA, PMP®, CISSP®, Manager, Infrastructure Services,
Information Systems Sector, Civil Systems Division, Northrop Grumman Corporation
- Pramod Pandya, Ph.D., Professor and Director, Information Technologies,
California State University, Fullerton
- Debbie Rodriguez, CISSP®, CISA®, MBA,
System Analyst, Intuit Financial Services
- Maria Suarez, Chief Information Security
Officer, University of Southern California
On-site Training Available
Our Corporate Training specialists can deliver this program or customize one that fits your organization’s specific needs. Visit Corporate Training or call (949) 824-1847 for information.
English Proficiency Requirement
All certificate programs at UC Irvine Extension (classroom and online formats) require
professional-level English language proficiency in listening and note-taking, reading
comprehension and vocabulary, written expression, and oral presentation.