Information Security for the Enterprise (ISEN)

Students explore the 10 domains of Information Security and examine effective approaches to implementing security awareness programs within an enterprise.


IA7020 Information Security Systems and Organizational Awareness

In this course, students will familiarize themselves with the eight domains of the (ISC)2 Common Body of Knowledge (CBK) in information security as a framework to critically analyze security awareness issues and to evaluate best practices in implementing security systems within the enterprise. (3 credits)

DELIVERABLES: Best Practice Analyses


  • To analyze structures, transmission methods, transport formats and security measures that enable confidentiality, integrity and availability in business communications.
  • To gain knowledge of network and system vulnerability assessment terms and techniques.
  • To assess best practices used in establishing controls, within business applications, which support the security strategy of an enterprise.
  • To evaluate the impact of high level procedures, structures and standards used in defining, designing, and implementing information systems and technology.
  • To propose best practices which utilize the means and methods of disguising information through cryptography in order to protect confidentiality and integrity of data.
IA7030 Legal and Ethical Practices in Information Security

In this course, students will draw on what they learned from IA7020 to dig deeper into the eight domains of the (ISC)2 Common Body of Knowledge (CBK) in information security by evaluating information security case studies and produce real-life deliverables. (3 credits)

DELIVERABLES: Best Practice Analyses and Mock plans


  • To evaluate physical, procedural, and environmental risks associated with a business information technology infrastructure.
  • To recommend procedures and best practices required to preserve business in the face of major disruptions to normal operations.
  • To propose best practices for the protection and control of information technology resources.
  • To understand how to develop typical deliverables for information security programs such as an assessment plan, security policies, and implementation plan.
PM8100 Information Security Project Management

In this course, students utilize PMI's Project Management Body of Knowledge (PMBOK) as a framework to apply project management concepts in the information security arena. Each student develops a project plan for a security assessment which incorporates the technical and behavioral characteristics of high performance teams. (3 credits)

DELIVERABLES: Project Charter; Project Scope Document; Project Management Plan


  • To evaluate the role of project management in improving the success of information technology and information assurance projects.
  • To demonstrate and apply knowledge of key project management terms and techniques.
  • To gain experience in the use of project management methodologies and techniques.
  • To develop skills in creating project management documentation.
IA7040 Information Security and Organizational Change

In this course, students analyze the principles of change management as they apply to the requirements and regulations of information security. Students evaluate the factors which affect corporate decision-making when implementing security programs and the ability of the manager to translate corporate needs into information security projects. (3 credits)

DELIVERABLES: Change Management Plan


  • To analyze the factors influencing the need for change and the imperatives for managing information security change initiatives in the workplace.
  • To evaluate the need for a specific Information Security change initiative at the group and organizational level.
  • To evaluate how the proposed change aligns with corporate leadership goals and culture.
  • To develop a change strategy and identify potential resistance factors to be managed.
  • To apply appropriate models to implement a sustainable Information Security change initiative.
Credits required for Certificate: 12

» Take the next step. Submit an inquiry of interest.


Join the Cybersecurity Elite
U of F Cybersecurity Education Path

Education Path
Distinguish yourself and advance your cybersecurity career by following the University of Fairfax Online Cybersecurity Education Path. No matter which graduate program you pursue, all of your courses will explore relevant cybersecurity policy and management issues, and you will complete a cybersecurity project in each course. You can apply what you learn and make significant contributions in your workplace right away.
» Download PDF or register for a