Skip to Main Content Skip to bottom Skip to Chat, Email, Text

AJS/524

Cybercrime and Information Systems Security

credits

Total credits

weeks

Course length

Take this course on its own, or as part of a degree or certificate program.

Please Note: Attendance and participation are mandatory in all University courses, and specific requirements may differ by course. If attendance requirements are not met, a student may be removed from the course. Please review the Course Attendance Policy in the Catalog for more information.

University of Phoenix reserves the right to modify courses. While widely available, not all programs are available to residents of all states. Please check with a University Enrollment Representative.

Course level: Graduate

This course provides an overview of the nature of criminal activity that is facilitated through, or that targets, information systems. The course also reviews security measures that are designed to protect the software, hardware, and data associated with information systems.

Please Note: Attendance and participation are mandatory in all University courses, and specific requirements may differ by course. If attendance requirements are not met, a student may be removed from the course. Please review the Course Attendance Policy in the Catalog for more information.

University of Phoenix reserves the right to modify courses. While widely available, not all programs are available to residents of all states. Please check with a University Enrollment Representative.

What you'll learn

Course skills and outcomes

  • Identify the various components of information systems and their functionality.
  • Describe the global interconnectivity of information systems.
  • Assess the depth and breadth of the effect of a failure of a major component of a complex system.
  • Explain the reasons for the protection of information systems and the consequences of inadequate security.

  • Discuss the recent crime trends in cyber space.
  • Analyze the criminal intent and methodologies involved in the utilization of information systems to perpetrate specific types of crimes.
  • Evaluate the motives and methods of individuals or organizations that target various information systems for infiltration or destruction.

  • Describe the principles of risk management as they pertain to information systems and technology.
  • Identify the risks and impacts pertaining to computers as well as risk mitigation and risk evaluations.
  • Explore the vulnerabilities of information systems.
  • Analyze the nature of potential internal and external threats, as well as natural or unintended events that can jeopardize information systems.

  • Analyze the nature of government regulations imposed upon administrators of information systems and their impact on the distribution of information and related security issues.
  • Evaluate the need for various internal and external policies and procedures designed to promote protection of both the hardware, software, and data related to information systems.
  • Identify the policies that govern the levels of access security.
  • Determine organizational structures, necessary authority and assignment of responsibilities and accountabilities to insure optimal security of information systems.

  • Compare the strengths and weaknesses of contemporary methodologies and technologies designed to protect information systems and data.
  • Create strategies for restoration of information system operations in the event of an attack or failure and for the recovery of data that may be stolen, altered or destroyed.
  • Explain the various issues associated with the failure of information systems at local, state, and national levels of society.

  • Assess the nature and extent of the reliance of various social institutions on information systems and technology.
  • Critique the laws and various enforcement mechanisms designed to discourage crimes against information systems.
  • Discuss the future challenges faced by law enforcement personnel regarding cybercrime and systems security.
  • Assess sentencing guidelines, punishment, and fines targeting cybercriminals.

Why UOPX

Why take courses at University of Phoenix

Accreditation that matters

We’ve been accredited by the Higher Learning Commission (hlcommission.org) for more than 40 years.

Real-world instructors

Learn from instructors who bring an average of 25 years of working experience to the classroom.

Affordable and potentially reimbursable

Our tuition and fees are competitive and fixed. Also, check to see if your employer will cover you for this course.

Next Steps

Smiling enrollment representative

Start a conversation about your future with an enrollment representative today.

Transfer Credits

Credit Transfer

Need to transfer credits to another college or university?

Before you enroll in a course, check with your school of choice to make sure they will accept our transfer credits and to understand any requirements or limitations. Then you can complete your course, and request your official transcript be sent to your school. That’s it!

Transferability of credit is at the discretion of the receiving institution. It is the student’s responsibility to confirm whether or not credits earned at University of Phoenix will be accepted by another institution of the student’s choice. If you have a question contact us at (866) 354-1800.

The University of Phoenix reserves the right to modify courses. Although our continuing teacher education courses are accepted by some state agencies in the United States toward teacher certifications and endorsements, this may not be the case in all states or foreign jurisdictions. If you plan to use courses for certification or endorsement, please check with your own state agency and your school district for applicability. Continuing teacher education courses are not eligible to apply to degree programs at University of Phoenix. These courses are not eligible for federal financial aid. Transferability of credit is at the discretion of the receiving institution. It is the student’s responsibility to confirm whether or not credits earned at University of Phoenix will be accepted by another institution of the student’s choice. While widely available, not all programs are available to residents of all states. Please check with a University Enrollment Representative. If you have a question contact us at (866) 354-1800.