Skip to Main Content Skip to bottom Skip to Chat, Email, Text

SEC/441

Security of Networks and Enterprise Systems

credits

Total credits

weeks

Course length

Take this course on its own, or as part of a degree or certificate program.

Please Note: Attendance and participation are mandatory in all University courses, and specific requirements may differ by course. If attendance requirements are not met, a student may be removed from the course. Please review the Course Attendance Policy in the Catalog for more information.

University of Phoenix reserves the right to modify courses. While widely available, not all programs are available to residents of all states. Please check with a University Enrollment Representative.

Course level: Upper Division

This course provides the student with an understanding of the security issues associated with computer network systems. The course also identifies security measures that are intended to protect the software, hardware, and data associated with computer systems and include practices that security professional can employ to harden their organization's information systems against attack.

Please Note: Attendance and participation are mandatory in all University courses, and specific requirements may differ by course. If attendance requirements are not met, a student may be removed from the course. Please review the Course Attendance Policy in the Catalog for more information.

University of Phoenix reserves the right to modify courses. While widely available, not all programs are available to residents of all states. Please check with a University Enrollment Representative.

What you'll learn

Course skills and outcomes

  • Examine the evolution of information security fundamentals since the year 2000.
  • Analyze government and private sector Cybersecurity Frameworks.
  • Analyze the basic threats for information security.
  • Outline the importance of network mapping and its authorized and unauthorized connections.

  • Analyze the barriers for Hardening Devices that include mobile technology.
  • Examine the risk of a computer network that fails to remove outdated and unsupported software.
  • Classify access control concepts and technologies.
  • Determine how organizations can increase information systems security compliance.
  • Examine how to implement a risk acceptance process in an organization.

  • Compare Privileged Access Management (PAM) vendors, tools, and software solutions.
  • Examine network defense and offense for information systems security.
  • Determine interdisciplinary targets of ransomware and potential future targets.
  • Analyze how to ensure supply chain security.
  • Apply methods in which an organization can detect and respond to potential intrusions.

  • Illustrate how to ensure strong authentication.
  • Analyze the basic methods and tools used to defend against network security risks.
  • Examine external and internal threats.
  • Determine how to reduce the attack surface by reducing the number of unnecessary direct connections to the internet.

  • Produce a process to ensure an identified vulnerability in a software program can be repaired or mediated.
  • Analyze best options to prevent data loss or restore corrupted data.
  • Examine prominent security standards organizations and relevant certification.
  • Produce a real-time cybersecurity metrics dashboard.

Why UOPX

Why take courses at University of Phoenix

Accreditation that matters

We’ve been accredited by the Higher Learning Commission (hlcommission.org) for more than 40 years.

Real-world instructors

Learn from instructors who bring an average of 25 years of working experience to the classroom.

Affordable and potentially reimbursable

Our tuition and fees are competitive and fixed. Also, check to see if your employer will cover you for this course.

Next Steps

Smiling enrollment representative

Start a conversation about your future with an enrollment representative today.

Transfer Credits

Credit Transfer

Need to transfer credits to another college or university?

Before you enroll in a course, check with your school of choice to make sure they will accept our transfer credits and to understand any requirements or limitations. Then you can complete your course, and request your official transcript be sent to your school. That’s it!

Transferability of credit is at the discretion of the receiving institution. It is the student’s responsibility to confirm whether or not credits earned at University of Phoenix will be accepted by another institution of the student’s choice. If you have a question contact us at (866) 354-1800.

The University of Phoenix reserves the right to modify courses. Although our continuing teacher education courses are accepted by some state agencies in the United States toward teacher certifications and endorsements, this may not be the case in all states or foreign jurisdictions. If you plan to use courses for certification or endorsement, please check with your own state agency and your school district for applicability. Continuing teacher education courses are not eligible to apply to degree programs at University of Phoenix. These courses are not eligible for federal financial aid. Transferability of credit is at the discretion of the receiving institution. It is the student’s responsibility to confirm whether or not credits earned at University of Phoenix will be accepted by another institution of the student’s choice. While widely available, not all programs are available to residents of all states. Please check with a University Enrollment Representative. If you have a question contact us at (866) 354-1800.