​​​​​​​​​​​​​​Information Assurance Emphasis​

In today's high-technology environment, homes and businesses must be constantly vigilant about computer security and information management. The demand for trained individuals in this area will continue to grow.  Completion of the information assurance emphasis at The University of Findlay can increase your marketability upon graduation.


An emphasis in information assurance prepares students for careers as information security analysts in addition to software engineering.  Graduates will be able to manage risks associated with the use, processing, storage and transmission of information or data and the systems and processes used for these purposes. 


To complete a Computer Science degree with an Information Assurance Emphasis you must complete eight information assurance emphasis courses in addition to the computer science core courses.


Information Assurance​ Emphasis Courses 

Information Security Fundamentals (CSCI 302​)

It seems like issues surrounding data security are in the news every other week. Ensure your company is prepared by learning about topics such as security policy, risk analysis, auditing and vulnerability assessment, firewalls and intrusion detection systems, and the anatomy of abuses like theft, fraud, viruses, worms and DoS. 


Understanding Cryptography (CSCI 402)
Learn about cryptography and its use in securing computer systems. Real-world applications of cryptographic primitives and protocols, and their limitations and vulnerabilities will be explored. Topics covered in this course will include ciphers and fundamentals, secret key encryption, hashing, public key, key exchange, authentication and digital certificates, tunneling, crypto cracking, light-weight cryptography and other methods, blockchain and crypto-currency, zero-knowledge proof (ZKP) and privacy preserving, wireless cryptography, and stream ciphers.​ 


Managing Information Security (CSCI 412)

Building on your Information Security Fundamentals course, this class takes those principles and applies them to the management side. You will learn security planning, policy considerations, security management models, risk management and laws and ethics surrounding data security.


Secure E-commerce (CSCI 414)

Online shopping involves a lot more than just filling up a virtual cart. ​Online shopping involves a lot more than just filling up a virtual cart. Compliance with security and privacy regulations ad following industry best practices are just the beginning of moving business online safely. This course prepares you to understand the risks and vulnerabilities associated with eBusiness initiatives. ​


Computer and Network Forensics (CSCI 416)

When criminals take to the internet to commit crimes, they need to be taken down quickly, effectively and while preserving the evidence. Topics in this course include the scope and impact of computer crime, the basics of forensic tools and their usage, legal considerations, and the collection and preservation of evidence. 


Computer Networking (CSCI 445)

In a large company with many moving pieces, you need a strong and secure network in place. This course will provide the theoretical understanding and practical experience with things such as network design and implementation, network security, capacity planning, risk assessment and feasibility studies. 


Information Assurance Capstone (CSCI 496)

This course will bring all your previous learning together and prepare you to become an information assurance professional. It will include a major research project and/or a community service component, grant writing principles, and participation in the management of a symposium. You will learn professional standards, global management principles, and the principles of co-existence in a secure cyberspace.​


Add at least one course  from the following 

SQL & Business Intelligence Tools for Decision Making (CSCI 285)

This beginning course will teach you how to write basic and intermediate SQL code using a standard relational database package such as Access, SQL Server, or MySQL. In addition to writing queries, you will learn to use a business intelligence (BI) tool such as Tableau and/or Power BI to create sophisticated data visualizations which can help users quickly answer questions about trends, exceptions, and hidden insights within large data sets. 

Applied Operations Research (CSCI 330)

Use software for solving problems! Topic in this course includes linear programming, sensitivity analysis, network analysis, CPM, PERT, queuing calculations, and simulations.  

Internet Programming Unix  (CSCI 374)

Develop a web application using Unix, a programming language such as PHP and database management system like MySQL.


Computer Systems Administration (CSCI 460)

This course provides an advanced study of computer systems administration of either a Unix-based or a Windows Server-based operating system. 


JavaScript and Android Application Development (CSCI 470)

Gain hands-on, applicable experience by developing JavaScript and Android applications in this course. JavaScript and jQuery JavaScript library functions will be used to create web applications where you will extend the functionality of the CSS and HTML content that you have learned in other courses. The Android Studio IDE will be used to develop Android mobile applications using XML and Java. 


Internet Programming Windows(CSCI 475)

This course is an introduction to Internet scripting from both the client- and server-side. Covers core Web programming concepts necessary for Web programming in JavaScript, VBScript, and ASP.


Capstone Project (CSCI 497)

Research your passion! You will work with a department adviser to develop a project that will utilize your skills and integrate your learning into the field of computer science. 


Internship in Computer Science (CSCI 498)

Gain job experience while you are in school. If you would like to have an internship during your time at Findlay, this course will provide you with the credits to maintain a full-time student status. 





Request Information

​​


​​