Earn Your University of Fairfax Enterprise Information Security Practices Graduate Certificate Online
The Enterprise Information Security certification program consists of 3 online courses (9 credit hours).
This program is structured to provide students the necessary skills to apply a comprehensive and rigorous approach in designing an Enterprise Information System to satisfy current and future needs for an organization. Students develop competencies in developing interoperable enterprise security architectures focusing on information security throughout the entire enterprise. The concepts discussed are adaptable and can be tailored to fit a small, mid-size or large organization's needs. This architecture can be tailored to fit an organization's size, risk profile, and budget and can be based on standard methodologies such as IAEF or TOGAF, etc.
IA8021 Cloud Cybersecurity
In this course students will research and analyze virtualization technology needed in today's rapidly changing IT workplace. The course will focus on virtualization in software-defined data centers. Students learn to build virtual networks, implement high-availability clusters, enhance performance and security, and manage the virtual data center.
- Analyze the major applications of cloud coming in data centers including hosting a virtual data center, extending a data center, and providing disaster recovery options
- Investigate the steps and components necessary to extend a virtual data center
- Analyze the procedures and options involved in developing a backup and disaster recovery procedure for a local virtual data center
- Discuss the components of OpenStack architecture and how OpenStack products are being used and marketed by many major companies
- Identify the components of a Virtual Desktop Infrastructure and describe their functions
IA8190 Forensic Evaluation and Incident Response Management
In this course, students explore the essentials of electronic discovery and analyze issues related to cyber evidence. Using this evidence, students identify and analyze the nature of security incidents, the source of potential threats and the methods used in incident management and mitigation. Students also analyze the technical and business issues which affect the actions of the enterprise in responding to a security incident.
- To analyze the nature of computer security incidents and the source of potential threats.
- To prepare a report which shows knowledge of a methodology for end-to-end incident management and mitigation.
- To analyze and evaluate the business and non-technical drivers, as well as technical issues associated with incident management.
- To examine the rules of evidence to electronic security incidents in the identification of criminal actions using network trace back and computer forensics and create a plan to mitigate those incidents.
IA9150 Strategic and Technological Trends in Information Security
In this course, students will focus on the managerial aspects of information security assurance. Topics covered include access control models, information security governance, and information security program assessment and metrics. Coverage on the foundational and technical components of information security is included to reinforce key concepts. The course includes up-to-date information on changes in the field, such as national and international laws and international standards like the ISO 2700 series.
- Compare and contrast information security management and general business management
- Assess the importance, benefits, and desired outcomes of information security governance and how such a program would be implemented
- Analyze how risk is assessed based on the likelihood of adverse events and the effects on information assets when events occur
- Analyze popular approaches used in the industry to manage risk
- Analyze emerging trends in the certification and accreditation of U.S. federal information technology systems
Join the Cybersecurity Elite
U of F Cybersecurity Education Path
» Download PDF or register for a