Enterprise Information Security
Graduate Certificate
Quick Facts
Top 1%
of all Higher-Ed
Institutions
- Center for World University Rankings, 2024
#1
In Best Value Among
Arizona's Public Universities
- Payscale, 2022
This graduate certificate program addresses top information technology concerns with courses designed specifically for information security professionals within industry and government. Students will gain the skills to secure information and information systems in the areas of confidentiality, integrity and availability.
Upon successful completion of the three required core courses, students can also receive:
- CPE units for CISSP, ISSAP, ISSEP, ISSMP, CAP and SSCP designation(s). These designations are offered by (ISC)²
- CPE units for CISM and CRISC designations, which are offered by ISACA
- One year of qualified work experience toward the Certified Information Security Manager® (CISM®) designation
*Residents of some U.S. Territories may not be eligible. Please see our Eligibility & State Authorization page for more information.
The Enterprise Information Security certificate requires successful completion of three courses (9 units):
This course exposes the student to a broad range of computer systems and information security topics. It is designed to provide a general knowledge of measures to insure confidentiality, availability, and integrity of information systems. Topics range from hardware, software and network security to INFOSEC, OPSEC and NSTISS overviews.
The objective of our MIS 416/516 course is to provide students with a thorough understanding of risk management as it applies to information security and corporate assets. The course covers numerous concepts to include asset valuation, data collection, conducting a risk assessment, risk reporting and monitoring as well as presenting various risk assessment models and frameworks.
The information security arena contains a broad array of multi-level models for assessing, planning, implementing and monitoring the mitigation of security risks. At the very core of this information security spectrum are the actual system and network devices which store, manage, transmit and secure information. This course is designed to provide a working knowledge of issues and techniques surrounding the proper safeguarding of operating systems and related components.