Information Security and Assurance

Information security is the protection of the confidentiality, integrity, and availability of information while in transmission, storage, or processing through the application of education and training, policy and technology. Information assurance concerns information operations that protect and defend information and information systems by ensuring availability, integrity, authentication, confidentiality, and nonrepudiation.

Degree Programs in Information Security and Assurance

The following provides the degree options available for the Information Security and Assurance (ISA) program:

  • Program Description

    KSU's BBA-ISA program is distinguished in its approach to creating business-focused, technology-savvy professionals capable of ascending the career path to Chief Information Security Officer (CISO). Graduates are prepare to understand and apply a variety of technical and managerial controls to solve information security challenges. They learn a top-down approach to security beginning with governance, risk management and regulatory compliance, and continue through designing a comprehensive cyber defense profile, protecting organizations' information assets with people, processes and technology.

    The BBA-ISA was first offered as a BS-ISA in 2005, with the first graduates in May 2007. It was the first bachelor-level security degree program of its kind to be offered at a public university in the Southeast.

    The undergraduate ISA program has served as the cornerstone of KSU's successful bid for the prestigious DHS/NSA National Center of Academic Excellence in Information Assurance/Cyber Defense Education designation. KSU earned the Center of Academic Excellence designations in 2004, 2007, 2012 and 2015. Graduates receive special certificates and can complete coursework earning specialized "Focus Areas" in Security Policy Development and Compliance and/or Systems Security Administration.

    Careers

    Information security, also known as cybersecurity, is a fast growing industry, with a good employment outlook. If you enjoy critical thinking and problem solving, and enjoy working with both people and technology, this may be a good career for you.

    Early career job titles include:

    • help desk technician
    • systems administrator
    • network administrator
    • data security administrator
    • information security analyst
    • information security specialist
    • information systems security analyst
    • information technology security analyst

    Progress to management should be possible quickly, with the eventual career path leading to Chief Information Security Officer.

    For more information regarding this program please visit the Coles College of Business website.

  • Program Description

    KSU's ISA minor is ideal for a student who is currently enrolled in another degree program, especially those majoring in another computing field such as Computer Science, Information Systems or Information Technology. Upon completion of the minor, the student will be able to make more educated and informed decisions related to the security of information assets and perform actions more securely in their major field of study.

    For more information regarding this program please visit the Coles College of Business website.

  • Program Description

    The graduate certificate program in information security and assurance is designed for both technology and non-technology graduate students that have already earned an undergraduate degree. The Graduate Certificate in Information Security and Assurance may be pursued as a Stand-Alone or Embedded program. As a stand-alone credential, interested students not currently enrolled in a degree program can complete the requirements and immediately apply for the certificate.

    For more information regarding this program please visit the Coles College of Business website
  • Program Description

    The Certificate in Information Security and Assurance is designed for students with an interest in Information Security and its application in the expanding field of technology. The certificate program emphasizes the skills and knowledge necessary to protect and inspect systems, and to detect and react to threats to the security of information in those systems. The Certificate can be pursued as a stand-alone credential or embedded as part of a a degree program. As a stand-alone credential, interested students not currently enrolled in a degree program can complete the certificate requirements and immediately apply for the certificate.

    For more information regarding this program please visit the Coles College of Business website.


©