Skip to Main Content Skip to bottom Skip to Chat, Email, Text

CIS/297

Information Technology

Computer Security and Operational Support Fundamentals

Online

Format

$1,194

Estimated Tuition

credits

Total credits

weeks

Course length

Start when you're ready

Choose an upcoming start date:

Enroll by 1pm Central:

Take this course on its own, or as part of a degree or certificate program.

Please Note: Attendance and participation are mandatory in all University courses, and specific requirements may differ by course. If attendance requirements are not met, a student may be removed from the course. Please review the Course Attendance Policy in the Catalog for more information.

University of Phoenix reserves the right to modify courses. While widely available, not all programs are available to residents of all states. Please check with a University Enrollment Representative.

Course level: Undergraduate

This course provides an introduction to the fundamentals of network security across devices. Topics include operational procedures and best practices for troubleshooting and providing end-user support. This course provides theory and practice troubleshooting operating systems across devices. This course and CIS/295 align with the requirements of the CompTIA A+ 220-1002 exam.

Required materials

The materials required for this course are covered in your resource fees.

Please Note: Attendance and participation are mandatory in all University courses, and specific requirements may differ by course. If attendance requirements are not met, a student may be removed from the course. Please review the Course Attendance Policy in the Catalog for more information.

University of Phoenix reserves the right to modify courses. While widely available, not all programs are available to residents of all states. Please check with a University Enrollment Representative.

What you'll learn

Course skills and outcomes

  • Identify types of security threats to computing resources.
  • Explain how security breaches can occur.
  • Compare and contrast physical and digital security capabilities.
  • Describe how the use of policies can minimize the risk of security threats to computing resources.
  • Troubleshoot individual user account security vulnerabilities.

  • Define criteria for creating and deleting accounts.
  • Mitigate risks of default settings to individual and system security.
  • Describe the security features of common data encryption methods.
  • Explain the effects of patch management compliance on organizations.
  • Troubleshoot operating system failures.

  • Identify multiple authentication actions for mobile devices.
  • Summarize the risks associated with mobile login access practices.
  • Describe when to use device encryption.
  • Outline accessibility and user permission practices to protect data on mobile devices.
  • Explain how to maintain data synchronization between mobile, desktops, and corporate servers.

  • Describe organizational data encryption best practices.
  • Explain methods for complete data destruction.
  • Compare and contrast the security risks of data storage and retrieval types.
  • Identify data destruction and hardware disposal methods that comply with common safety and environmental laws and regulations.

  • Identify Small Office/Home Office (SOHO) network components.
  • Identify elements and characteristics of a secured wired and wireless networks.
  • Identify security capabilities of standard network devices.
  • Compare and contrast public vs. private network firewall and anti-virus requirements.
  • Describe policies and procedures appropriate to protect small business networks against common security issues.

Why UOPX

Why take courses at University of Phoenix

Accreditation that matters

We’ve been accredited by the Higher Learning Commission (hlcommission.org) for more than 40 years.

Real-world instructors

Learn from instructors who bring an average of 25 years of working experience to the classroom.

Affordable and potentially reimbursable

Our tuition and fees are competitive and fixed. Also, check to see if your employer will cover you for this course.

Next Steps

Smiling enrollment representative

Start a conversation about your future with an enrollment representative today.

Transfer Credits

Credit Transfer

Need to transfer credits to another college or university?

Before you enroll in a course, check with your school of choice to make sure they will accept our transfer credits and to understand any requirements or limitations. Then you can complete your course, and request your official transcript be sent to your school. That’s it!

Transferability of credit is at the discretion of the receiving institution. It is the student’s responsibility to confirm whether or not credits earned at University of Phoenix will be accepted by another institution of the student’s choice. If you have a question contact us at (866) 354-1800.

The University of Phoenix reserves the right to modify courses. Although our continuing teacher education courses are accepted by some state agencies in the United States toward teacher certifications and endorsements, this may not be the case in all states or foreign jurisdictions. If you plan to use courses for certification or endorsement, please check with your own state agency and your school district for applicability. Continuing teacher education courses are not eligible to apply to degree programs at University of Phoenix. These courses are not eligible for federal financial aid. Transferability of credit is at the discretion of the receiving institution. It is the student’s responsibility to confirm whether or not credits earned at University of Phoenix will be accepted by another institution of the student’s choice. While widely available, not all programs are available to residents of all states. Please check with a University Enrollment Representative. If you have a question contact us at (866) 354-1800.