Mar 15, 2026  
2025-2026 Catalog 
    
2025-2026 Catalog

CIA 103 - Information Security Principles


Credit Hours: 3
Billable Contact Hours: 3
Prerequisites: CIS 130  as prerequisite or co-requisite
Session Cycle: FL

This course provides an introduction and overview of information security/assurance for incoming students. This course will enhance technical, communication, problem-solving, and teaming skills related to the study of Information Security and Information Assurance. This course will also cover a broad spectrum of pertinent IS/IA base information, including voice and data network connectivity. In addition, an introduction to cryptography, intrusion detection systems, data firewalls, malicious software, information operations, warfare, denial of service attacks, regulations, laws, and governance.

Notes:  

Business Division

Theory Hours: 45

Learning Outcomes:  

  1. Examine and apply the fundamental computer security techniques.

Applies To Computer Information Systems: Cybersecurity and Information Assurance, A.A.S.  Program Outcome E

Applies To Computer Information Systems: System Administration Specialist, A.A.S.  Program Outcome E

  2. Identify and explain risk and potential security issues. 

Applies To Computer Information Systems: Cybersecurity and Information Assurance, A.A.S.  Program Outcome F

Applies To Computer Information Systems: System Administration Specialist, A.A.S.  Program Outcome F

  3. Demonstrate responsible computer use as it deals with social, political, legal, and ethical issues in today’s electronic society. 

  4. Demonstrate foundation knowledge of information security/assurance within the organization. 

Applies To Computer Information Systems: Cybersecurity and Information Assurance, A.A.S.  Program Outcome E

  5. Demonstrate knowledge of the profession, its organizations, goals and leadership roles, literature/publications, issues, and research foundations. 

Applies To Computer Information Systems: Cybersecurity and Information Assurance, A.A.S.  Program Outcome I

  6. Demonstrate knowledge of security objectives and policy development. 

Applies To Computer Information Systems: Cybersecurity and Information Assurance, A.A.S.  Program Outcome G & J