|
|
Aug 04, 2025
|
|
2025-2026 Graduate Catalog
Information Security Management, CAS
|
|
Contact:
Jeff Saltz
Program Director
(315)443-2911
Website:
Overview:
Information is a critical asset within an organization. Lives and livelihoods depend on the continuation of information systems and their correct operation. With the increasing complexities of today’s hardware, software, and their networking, the need for managing enterprise security becomes more pressing. Information Security Management (ISM) can be defined as the comprehensive skills that manage a high degree of complex technical security, increased operational costs, and diverse policies and user behavior. Senior executives, IT managers, and technical staffs need well-educated, strong skills in ISM for their organizations.
The Certificate of Advanced Study (CAS) in Information Security Management (ISM) offers a comprehensive set of skills for information security management, enabling students to take a lead role in the area within their organizations. The 15-credit CAS provides students with the flexibility to take coursework that does not overlap with their current expertise but gives them tools in information security technology, policy, risk management, and evaluation, depending on their background.
This certificate is offered both on campus and online. The certificate is available to those with or without experience in the information technology field. Applicants may be currently working in a related field, or they may be interested in making a career change into the information security field. The certificate also provides an opportunity for professional development and serves as a foundation for career advancement.
|
Student Learning Outcomes
After completing the program, students will be able to: - Analyze technical and policy issues, ethics, and diverse user behavior that either impact or are impacted by information security
- Evaluate and explain applications of information security in highly complex hardware, software, data, and their networking infrastructure
- Manage the complex interaction between technical security, management issues, policy issues, ethics, and diverse user behavior, as it may affect organizational operations and data integrity
- Develop and deliver effective professional communications
Secondary Core: 9 credits
Students need to choose three class from the list below. Electives: 3 credits
Students can choose one course from the list below. or any additional course from the secondary core. Courses and Independent studies in related areas can be petitioned to count as an elective. |
|
|
|