Courses Health Care Security

Master of Science in Information Assurance and Cybersecurity

Show course with description

Core courses:

IAS5002
Communication Skills for Today’s Information Security Professional

This course establishes foundational knowledge of the methodologies, nomenclature, communication skills, principles, and practices related to information assurance and security. This course also introduces current and future technological tools and practices designed to assess vulnerabilities while protecting information technology assets and intellectual property. Must be taken during the first quarter by learners who have been admitted to the MS in Information Assurance and Cybersecurity degree program. Cannot be fulfilled by transfer or credit for prior learning.

4 quarter credits
IAS5010
Information Technology Security Fundamentals

In this course, learners examine the technology and security principles that apply throughout system and product life cycles. Learners identify the basic network components in an information technology system, analyze how they interact, and evaluate their role in system operation. Learners explore the basic role and function of network devices including routers, switches, firewalls, VPNs, and intrusion detection as well as the underlying protocols and controls that contribute to their operation. In addition, learners demonstrate their ability to use network security tools and network analysis.

4 quarter credits
IAS5015 *
Network Security Fundamentals and Cryptography

Learners apply foundational concepts of cybersecurity and information assurance to select appropriate information security policies, procedures, and controls to defend enterprise information assets from breaches of confidentiality and integrity. Learners identify specific points of vulnerability that may be mitigated through the use of administrative security policies and operational information security tools. Learners also examine principles of cryptography and some of the security controls and methods that use it. Prerequisite(s): Completion of or concurrent registration in IAS5010 or PM5018 and ITEC5020.

4 quarter credits
IAS5020 *
Information Security Regulatory and Legal Environment

Learners apply cyber-defense and information assurance controls in context of the rules and guidelines that influence them and with an understanding of the security standards, responsibilities, rules, regulations, and issues that impact a particular organization. Learners identify laws and policies related to cyber-defense and how they relate to the storage and transmission of data. Learners also study basic concepts of audit, evidence collection, and chain of custody rules. Prerequisite(s): Completion of or concurrent registration in IAS5015.

4 quarter credits
IAS5025 *
Operating System Defense

Learners in this course explore the fundamental security issues related to operating system (OS) defense. Learners also employ best practices to harden operating systems and associated software applications using various tools as a part of a layered defense-in-depth strategy. Prerequisite(s): Completion of or concurrent registration in IAS5020.

4 quarter credits
IAS5030 *
Identifying and Managing Risk

Learners identify common information security risk analysis methodologies, their characteristics, pros and cons, and applications. Learners examine the sources of risk, including external malicious attackers, intentional and accidental attacks by internal users, and threats from environmental and structural sources. Learners also identify vulnerabilities in hardware, software, locations, and procedures that provide an opening to attackers and create risk to organizations. Learners demonstrate risk assessment techniques through hands-on application of software vulnerability testing tools. Prerequisite(s): IAS5025.

4 quarter credits

Specialization courses:

IAS5110 *
Digital Forensics Processes

Learners in this course apply forensics tools and techniques to investigate incidents, analyze devices, and conduct forensics reporting. Prerequisite(s): IAS5030.

4 quarter credits
IAS5200
Network Architecture and Cyberoperations

Learners in this course study common security architectures to help identify potential vulnerabilities in architectures, and learn to design secure architectures. Learners identify issues related to the design and implementation of operating system concepts, components and interfaces, and design and implement significant architectural changes to an existing operating system. Learners also examine the authorities, roles, and steps associated with cyber operations, and develop a working knowledge regarding the security issues associated with building complex systems out of third-party components of unknown origin.

4 quarter credits
IAS5230
Secure Network Design and Engineering

Learners investigate abstract data types and how to address them in solving cyber security problems related to network design and engineering. Learners also analyze security requirements while designing network operational systems in order to gain approvals in recognition and compliance with organizational governance and processes. Finally, learners articulate how virtualization and network architecture is implemented, deployed, and used, and describe the implications that interfaces between major components of virtualized systems have for security.

4 quarter credits
IAS5320 *
Patient Privacy Rights and Health Care Regulatory Requirements

Learners in this course evaluate the differences between health care privacy and health care information security and develop their understanding of the health care regulatory environment. Learners identify and demonstrate the use of tools and controls used to prevent data breaches, and evaluate the processes for creating forensic evidence of a breach. To help end users comply with data security, learners also develop policies, procedures, and user training, which consists of documentation, communication, and notifications and risk assessment strategies. Prerequisite(s): IAS5200.

4 quarter credits
IAS5330 *
Third Party Risk Management in Health Care

Learners in this course identify and examine the risks caused by third parties, and the policies and documents required to ensure that they are in compliance with security requirements. Learners evaluate the difference between a third party and a business associate, as well as gain an understanding of the laws, regulations, contracts, and agreements that apply to each. Learners also demonstrate the use of tools and methodologies for auditing and monitoring interactions with third parties and business associates to ensure security compliance. Prerequisite(s): IAS5200.

4 quarter credits

 

Capstone course

 

At least 4 quarter credits

Taken during the learner’s final quarter:

IAS5900 *
IAS Capstone

Learners demonstrate their mastery of the program and specialization objectives through application of information security and assurance tools and methodologies. For MS in Information Assurance and Cybersecurity learners only. Must be taken during the learner’s final quarter. Prerequisite(s): Completion of all required coursework. Cannot be fulfilled by transfer or credit for prior learning.

4 quarter credits

 

 

Total

 

 

At least 48 quarter credits

* Denotes courses that have prerequisite(s). Refer to the descriptions for further details.

Learners who do not complete all program requirements within quarter credit/program point minimums will be required to accrue such additional quarter credits/program points as are associated with any additional or repeat coursework necessary for successful completion of program requirements.

What can I expect?

Each unit consists of readings, discussions, and other activities you will be expected to complete throughout the week. Assignments are due on Sundays, though not every course requires an assignment each week.

In each course, you will receive a detailed scoring guide that describes expectations for every graded assignment.

Grades are based on your participation in weekly reading discussions and completion of assignments. You will also be assessed on your ability to demonstrate an understanding of expected outcomes for your program or specialization. These outcomes are based on the needs and performance standards of your field or discipline.

Learn more about online learning at Capella.

Transfer Credits

There are many ways to reduce tuition costs, including transferring credits which may help save time and money. You can transfer up to 12 credits into this program.

Ever Wonder What a Capella Course is Like?

Sign up for a GuidedPath Trial Course on us and see all the great each online learning format has to offer.

Get started

Take an individual course

Whether you're completing additional credits for your own education, want to see if online learning is right for you, or are simply interested in a specific topic, you can enroll in many of Capella's online courses without committing to a degree program. We recommend speaking with an enrollment counselor to discuss your goals and ensure that the credits you earn now may be applicable to a Capella degree program.

Learn more about individual courses.

Ready for the next step?

Learning online doesn't mean going it alone. Help is here. From faculty, coaches, advisors and more. Plus a supportive community of students who are as passionate about their careers as you are about yours.