LET US HELP
Welcome to Capella
Select your program and we'll help guide you through important information as you prepare for the application process.
Core courses:
IAS5002 |
Communication Skills for Today’s Information Security Professional
This course establishes foundational knowledge of the methodologies, nomenclature, communication skills, principles, and practices related to information assurance and security. This course also introduces current and future technological tools and practices designed to assess vulnerabilities while protecting information technology assets and intellectual property. Must be taken during the first quarter by learners who have been admitted to the MS in Information Assurance and Cybersecurity degree program. Cannot be fulfilled by transfer or credit for prior learning. |
4 quarter credits |
---|---|---|
IAS5010 |
Information Technology Security Fundamentals
In this course, learners examine the technology and security principles that apply throughout system and product life cycles. Learners identify the basic network components in an information technology system, analyze how they interact, and evaluate their role in system operation. Learners explore the basic role and function of network devices including routers, switches, firewalls, VPNs, and intrusion detection as well as the underlying protocols and controls that contribute to their operation. In addition, learners demonstrate their ability to use network security tools and network analysis. |
4 quarter credits |
IAS5015 * |
Network Security Fundamentals and Cryptography
Learners apply foundational concepts of cybersecurity and information assurance to select appropriate information security policies, procedures, and controls to defend enterprise information assets from breaches of confidentiality and integrity. Learners identify specific points of vulnerability that may be mitigated through the use of administrative security policies and operational information security tools. Learners also examine principles of cryptography and some of the security controls and methods that use it. Prerequisite(s): Completion of or concurrent registration in IAS5010 or PM5018 and ITEC5020. |
4 quarter credits |
IAS5020 * |
Information Security Regulatory and Legal Environment
Learners apply cyber-defense and information assurance controls in context of the rules and guidelines that influence them and with an understanding of the security standards, responsibilities, rules, regulations, and issues that impact a particular organization. Learners identify laws and policies related to cyber-defense and how they relate to the storage and transmission of data. Learners also study basic concepts of audit, evidence collection, and chain of custody rules. Prerequisite(s): Completion of or concurrent registration in IAS5015. |
4 quarter credits |
IAS5025 * |
Operating System Defense
Learners in this course explore the fundamental security issues related to operating system (OS) defense. Learners also employ best practices to harden operating systems and associated software applications using various tools as a part of a layered defense-in-depth strategy. Prerequisite(s): Completion of or concurrent registration in IAS5020. |
4 quarter credits |
IAS5030 * |
Identifying and Managing Risk
Learners identify common information security risk analysis methodologies, their characteristics, pros and cons, and applications. Learners examine the sources of risk, including external malicious attackers, intentional and accidental attacks by internal users, and threats from environmental and structural sources. Learners also identify vulnerabilities in hardware, software, locations, and procedures that provide an opening to attackers and create risk to organizations. Learners demonstrate risk assessment techniques through hands-on application of software vulnerability testing tools. Prerequisite(s): IAS5025. |
4 quarter credits |
Specialization courses:
IAS5110 * |
Digital Forensics Processes
Learners in this course apply forensics tools and techniques to investigate incidents, analyze devices, and conduct forensics reporting. Prerequisite(s): IAS5030. |
4 quarter credits |
---|---|---|
IAS5200 |
Network Architecture and Cyberoperations
Learners in this course study common security architectures to help identify potential vulnerabilities in architectures, and learn to design secure architectures. Learners identify issues related to the design and implementation of operating system concepts, components and interfaces, and design and implement significant architectural changes to an existing operating system. Learners also examine the authorities, roles, and steps associated with cyber operations, and develop a working knowledge regarding the security issues associated with building complex systems out of third-party components of unknown origin. |
4 quarter credits |
IAS5230 |
Secure Network Design and Engineering
Learners investigate abstract data types and how to address them in solving cyber security problems related to network design and engineering. Learners also analyze security requirements while designing network operational systems in order to gain approvals in recognition and compliance with organizational governance and processes. Finally, learners articulate how virtualization and network architecture is implemented, deployed, and used, and describe the implications that interfaces between major components of virtualized systems have for security. |
4 quarter credits |
IAS5320 * |
Patient Privacy Rights and Health Care Regulatory Requirements
Learners in this course evaluate the differences between health care privacy and health care information security and develop their understanding of the health care regulatory environment. Learners identify and demonstrate the use of tools and controls used to prevent data breaches, and evaluate the processes for creating forensic evidence of a breach. To help end users comply with data security, learners also develop policies, procedures, and user training, which consists of documentation, communication, and notifications and risk assessment strategies. Prerequisite(s): IAS5200. |
4 quarter credits |
IAS5330 * |
Third Party Risk Management in Health Care
Learners in this course identify and examine the risks caused by third parties, and the policies and documents required to ensure that they are in compliance with security requirements. Learners evaluate the difference between a third party and a business associate, as well as gain an understanding of the laws, regulations, contracts, and agreements that apply to each. Learners also demonstrate the use of tools and methodologies for auditing and monitoring interactions with third parties and business associates to ensure security compliance. Prerequisite(s): IAS5200. |
4 quarter credits |
Capstone course
At least 4 quarter credits
Taken during the learner’s final quarter:
IAS5900 * |
IAS Capstone
Learners demonstrate their mastery of the program and specialization objectives through application of information security and assurance tools and methodologies. For MS in Information Assurance and Cybersecurity learners only. Must be taken during the learner’s final quarter. Prerequisite(s): Completion of all required coursework. Cannot be fulfilled by transfer or credit for prior learning. |
4 quarter credits |
---|
Total
At least 48 quarter credits
* Denotes courses that have prerequisite(s). Refer to the descriptions for further details.
Learners who do not complete all program requirements within quarter credit/program point minimums will be required to accrue such additional quarter credits/program points as are associated with any additional or repeat coursework necessary for successful completion of program requirements.
Each unit consists of readings, discussions, and other activities you will be expected to complete throughout the week. Assignments are due on Sundays, though not every course requires an assignment each week.
In each course, you will receive a detailed scoring guide that describes expectations for every graded assignment.
Grades are based on your participation in weekly reading discussions and completion of assignments. You will also be assessed on your ability to demonstrate an understanding of expected outcomes for your program or specialization. These outcomes are based on the needs and performance standards of your field or discipline.
Learn more about online learning at Capella.
There are many ways to reduce tuition costs, including transferring credits which may help save time and money. You can transfer up to 12 credits into this program.
Whether you're completing additional credits for your own education, want to see if online learning is right for you, or are simply interested in a specific topic, you can enroll in many of Capella's online courses without committing to a degree program. We recommend speaking with an enrollment counselor to discuss your goals and ensure that the credits you earn now may be applicable to a Capella degree program.