Eastern Michigan University

College Of Technology  
 

 

College Of Technology

109 Sill Hall
Ypsilanti, MI,48197
734.487.0354


Contact the college

EMU Information:
734.487.1849

For detailed information, click the following link to visit the program website at : http://www.emich.edu/ia/

About the Program

As a National Security Agency (NSA) Center of Academic Excellence in Information Assurance Education, the Information Assurance Undergraduate program offers tremendous opportunities that are excellent preparation for an advanced degree in information assurance/security. The program provides flexibility that prepares the student with the foundational education experience in an applied professional track leading to employment after graduation in the IA field. With the merger of Network Security there are four unique concentrations for students to choose from: IA Management, Applied IA , IA cryptography and Network Security/Administration.

The term “information assurance” encompasses the scientific, technical, and management disciplines required to ensure computer and network security, such as:

• Digital forensic Investigations
• Systems/network administration and operation
• Systems security engineering
• Information assurance systems and product acquisition
• Cryptography
• Threat and vulnerability assessment
• Web security
• Computer emergency response team operations
• Information assurance training education and management
• Defensive information operations
• Cyber crime investigation
• Offensive computer security

The unique interdisciplinary nature of information assurance requires a diverse educational approach. Most of today’s computer science programs are not sufficiently prepared to educate tomorrow’s cyber defenders. The purpose of this undergraduate interdisciplinary program is to:

• Meet society’s need for educated professionals in information assurance.
• Provide its graduates with the knowledge and skills required to protect the informational technology needs of society which includes all government branches and the private sector.
• To propagate a new generation of research scientists in information assurance.

     

About the Curriculum

General Education Requirements 31 Credit Hours
 
Foundation courses (All concentrations have the same foundation Courses) 42 Credit Hours

COSC 146 Applied Programming
COSC 206 Applied Programming II
MATH 170 Elementary Statistics
IA 103 Information Security Overview
IA 202 Risk-Vulnerability Analysis
IA 210 Concepts of Network and Business Technology
IA 212 Open Source Platform and Network Administration
IA 213 Privacy and Technology
IA 215 System Support and Trouble Shooting
IA 240 Intelligence Analysis
IA 329 Policy Development in Information Assurance
LEGL 320 Cyber Law and Compliance
STS 300W Research and Writing Tech Perspectives
CTAC 224 Public Speaking
CTAC 225 Listening Behavior or CTAC 227 Interpersonal Communication
CTAC 350 Persuasion


Information assurance management 42 Credit Hours

MGMT 386 Organizational Behavior and Theory
MGMT 403 Managerial Communication: Theory and Application
MGMT 480 Management Responsibility and Ethics
IA 343 Intelligence II
IA 344 Administration of Computer Systems
IA 400 Malware Analysis and Reverse Engineering
IA 422 End User Systems: Planning and Design
IA 425 Cyber Crime Investigation
IA 427 Digital Forensics I
IA 430 Network Forensics
IA 445 Ethical Hacking Penetration Testing
IA 415 Research Techniques
IA 416 Applied Research Project or IA 387 CO/OP or Internship<
IA 480 SQL Database Security




Applied information assurance: 42 Credit Hours

IA 343 Intelligence II
IA 344 Administration of Computer Systems<
IA 400 Malware Analysis and Reverse Engineering
IA 425 Cyber Crime Investigation
IA 427 Digital Forensics I
IA 428 Digital Investigations II
IA 430 Network Forensics
IA 412 Linux Security Administration
IA 415 Research Techniques
IA 416 Applied Research Project or IA 387 CO/OP or Internship
IA 445 Ethical Hacking and Offensive Security
IA 455 Incident Response
IA 480 SQL Database Security
COSC 374 Applied Cryptography



Information assurance encryption: 42 Credit Hours

MATH 120 Calculus I
MATH 121 Calculus II
MATH 205 Math Structure for Computer Science
MATH 319 Mathematical Modeling
MATH 409 Cryptography (New Course)
COSC 314 Computational Discrete Structures
IA 400 Malware Analysis and Reverse Engineering
IA 415 Research Techniques
IA 416 Applied Research Project or IA 387 CO/OP or Internship
IA 427 Digital Forensics I
IA 430 Network Forensics
IA 480 SQL Database Security
COSC 374 Applied Cryptography



Network Security/Administration: 42 Credit Hours

IA 344 Administration of Computer Systems
IA 350 Network Connectivity
IA 354 Multinetwork Connectivity
IA 364 Advanced Windows Security
IA 400 Malware Analysis and Reverse Engineering
IA 412 Linux Security Administration
IA 422 End User Systems: Planning and Design
IA 427 Digital Forensics I
IA 430 Network Forensics
IA 445 Ethical Hacking and Offensive Security
IA 455 Incident Response
IA 480 SQL Database Security
IA 495 Networks: Implementation and Evaluation
IA 416 Applied Research Project or IA 387 CO/OP or Internship



Electives Courses (Suggested) 9 Credit Hours


IA 429 Enterprise Digital Analysis
IA 425 Cyber Crime Investigation I
IA 426 Cyber Crime II
CMT 305 Comm. Transmission Systems
IA 415 Introduction to Research in Information Assurance
IA 416 Applied Research Project
IA 440 Intelligence Analysis
IA 441 - Foreign and Domestic Terrorism and Information Warfare
IA 379/479 Special Topics
IA 213 Privacy and Technology



Program Total 124 Credit Hours

About the Faculty

>>  James Banfield - Network Security/Administration