Request Information

Please complete the form below, and an admissions advisor will contact you shortly.


Apply Now

Ready to take the next step?

The application process is easy. We accept and review applications year-round, and qualified applicants can begin classes any month of the year, depending on your program and location.

Click Apply Now to get started on the next exciting chapter of your life!

Apply Now

General Course Information for ITM475: Information Security Technolog

Course: ITM475 - Information Security Technolog
Textbook: For the correct edition of the textbook assigned to a specific class, go to:

Course Prerequisite(s):
Course Description:

This course covers the technical aspects of information security for computer systems and networks. This course helps students understand the technologies used to design secure information systems and networks. This course is divided into six sections covering various technologies pertaining to information security. With the understanding of what security is, this course discusses access control mechanisms, methods of attack, and secure protocols. It includes how to secure telecommunications networks and the Internet. Cryptography is discussed to provide privacy and secrecy. It emphasizes physical security followed by application and system development security. This course together with ITM 470 help students prepare for the Certified Information Systems Security Professional (CISSP) exam.

Course Learning Outcomes:
  • Identify the different access control methods and models.
  • Describe methods of attack.
  • Monitor a system to ensure security is enforced.
  • Identify physical security threat classifications.
  • Implement countermeasures against physical threats.
  • Implement an access control policy for all users.
  • Describe how secure networks are implemented.
  • Configure remote access.
  • Secure wireless networks.
  • Identify cryptography components.
  • Explain cryptography algorithms and mechanisms.
  • Describe cryptography applications.
  • Implement software control subsystems.
  • Explain database security issues.
  • Explain the software development lifecycle.
Specified Program Learning Outcomes:
  • Apply concepts of best practices in information technology management and security to enterprise processes.
  • Demonstrate an ability to set up and integrate local and remote server and workstation computers with proper user authentication to preserve user privacy and confidentiality.
  • Demonstrate the ability to plan an integrated system that involves computer applications to satisfy specific business processes.
  • Demonstrate written and oral communication skills in collaborative environments by participating on teams that address solutions for IT management challenges.
  • Describe the ethical challenges that confront an IT professional

Students with Disabilities:
Students seeking special accommodations due to a disability must submit an application with supporting documentation, as explained under this subject heading in the General Catalog. Instructors are required to provide such accommodations if they receive written notification from the University.

Writing Across the Curriculum:
Students are expected to demonstrate writing skills in describing, analyzing and evaluating ideas and experiences. Written reports and research papers must follow specific standards regarding citations of an author's work within the text and references at the end of the paper. Students are encouraged to use the services of the University's Writing Center when preparing materials.

The following website provides information on APA, MLA, and other writing and citation styles that may be required for term papers and the like:

National University Library:
National University Library supports academic rigor and student academic success by providing access to scholarly books and journals both electronically and in hard copy. Print materials may be accessed at the Library in San Diego or through document delivery for online and regional students. Librarians are available to provide training, reference assistance, and mentoring at the San Diego Library and virtually for online or regional students. Please take advantage of Library resources:


Contact the Library:

  • (858) 541-7900 (direct line)
  • 1-866-NU ACCESS x7900 (toll free)

Use the Library Training Tools (on the Library Homepage) for additional help

  • Recorded class presentations
  • Tutorials & Guides (APA/MLA, Peer-Review, and more)

Plagiarism is the presentation of someone else's ideas or work as one's own. Students must give credit for any information that is not either the result of original research or common knowledge. If a student borrows ideas or information from another author, he/she must acknowledge the author in the body of the text and on the reference page. Students found plagiarizing are subject to the penalties outlined in the Policies and Procedures section of the University Catalog, which may include a failing grade for the work in question or for the entire course. The following is one of many websites that provide helpful information concerning plagiarism for both students and faculty:

Ethical behavior in the classroom is required of every student. The course will identify ethical policies and practices relevant to course topics.

Students are expected to be competent in using current technology appropriate for this discipline. Such technology may include word processing, spreadsheet, and presentation software. Use of the internet and e-mail may also be required.

Learning to work with and value diversity is essential in every class. Students are expected to exhibit an appreciation for multinational and gender diversity in the classroom.

As a diverse community of learners, students must strive to work together in a setting of civility, tolerance, and respect for each other and for the instructor. Rules of classroom behavior (which apply to online as well as onsite courses) include but are not limited to the following:

  • Conflicting opinions among members of a class are to be respected and responded to in a professional manner.
  • Side conversations or other distracting behaviors are not to be engaged in during lectures, class discussions or presentations
  • There are to be no offensive comments, language, or gestures