IT Infrastructure Security

Online Undergraduate Certificate in IT Infrastructure Security

Save @ APU

$0 Application Fee
$0 Transfer Credit Evaluation
$0 Textbooks & eBooks

About This Program

All organizations, no matter how big or small, must have robust security and guard themselves against internal and external threats. Gain the knowledge you’ll need with the undergraduate certificate in IT infrastructure security from American Public University (APU).

Through our IT infrastructure security courses, you’ll learn how to design secure networks, develop risk mitigation plans, and perform intrusion detection in IT network environments.

IT infrastructure security classes in this online program are ideal for developing your ability to assess, mitigate, and manage security risks in IT infrastructures. Courses are taught by expert practitioners with years of real-world knowledge.

What You Will Do

  1. Increase your understanding of the impact of operating systems and network security on IT management and global ecommerce
  2. Study the technical risks, performance factors, and security issues related to operating system and network security
  3. Learn how viruses, worms, and Trojan horses reproduce and embed themselves in operating systems
  4. Enhance your knowledge of active and passive intrusion detection, scalable procedures for implementing border and firewall security, and effective network and application security assessment

Program at a Glance

Number of Credits
18
Cost Per Credit
{{{UndergradTuition}}} | {{{UndergradPreferredMilitaryRate}}}*
{{{UndergradVeteranGrant}}}**
Courses Start Monthly
Online
  • Want to Learn More?

    Step One: Introduce Yourself
    Validation message here
    Validation message here
    Validation message here
    Validation message here
    Validation message here
    Validation message here

Program Requirements Printable Catalog Version

Must take all courses for this section.

Course ID: 5163

|
This course is a study of the evolution, the concepts, and the principles of local, distributed and enterprise networking. This course examines Network design, topologies, architecture, media, interface cards, protocols, problem resolution, communications, administration, operations, and resources. It introduces the student to the concepts of wireless networking, and web-based networks. This course also explores the Open Systems Interconnection (OSI) and the Transmission Control Protocol/ Internet Packet (TCP/IP) reference models. This course also examines internetworking servers, and hardware and operating systems maintenance.
Registration Dates Course Dates Session Weeks
12/25/23 - 05/31/24 06/03/24 - 07/28/24 Spring 2024 Session D 8 Week session
01/29/24 - 06/28/24 07/01/24 - 08/25/24 Summer 2024 Session B 8 Week session
02/26/24 - 08/02/24 08/05/24 - 09/29/24 Summer 2024 Session I 8 Week session
03/25/24 - 08/30/24 09/02/24 - 10/27/24 Summer 2024 Session D 8 Week session

Course ID: 5164

|
This course is a study of the principles and concepts of Network Security from various aspects including but not limited to hardware, software, and other critical elements relating to the CIA Triad. There is an emphasis on standard Operating System (OS) functions and discovering vulnerabilities. Upon completion of this course, students will be able to demonstrate an understating of methodologies and measures necessary to take a preventive stance to address security vulnerabilities. Students will examine the principles, practices, and policies related to hardening and securing Operating Systems. This course focuses on vulnerabilities and related countermeasures of various Windows components
Registration Dates Course Dates Session Weeks
12/25/23 - 05/31/24 06/03/24 - 07/28/24 Spring 2024 Session D 8 Week session
01/29/24 - 06/28/24 07/01/24 - 08/25/24 Summer 2024 Session B 8 Week session
02/26/24 - 08/02/24 08/05/24 - 09/29/24 Summer 2024 Session I 8 Week session
03/25/24 - 08/30/24 09/02/24 - 10/27/24 Summer 2024 Session D 8 Week session

Course ID: 5165

|
This course examines the techniques and technologies for penetration of networks, detection of attacks, and prevention of attacks. This course addresses the techniques, the technologies, and the methodologies used by cyber intruders (hackers) to select a target and launch an attack. Students will gain insight into the motives and desired goals of hackers as well as effective tools and techniques used as countermeasures ensuring data assets remain secure. This course focuses on techniques and technologies to detect such attacks even while the attack is in progress; early detection enables the administrator to track the movements of the hacker and to discover the intent and goals of the hacker. This course assesses the various countermeasures to keep the system out of the “sights” of the hacker and to keep the hacker out of the perimeter of the target network. This course also explores the laws and the legal considerations in prosecuting computer crime.
Registration Dates Course Dates Session Weeks
12/25/23 - 05/31/24 06/03/24 - 07/28/24 Spring 2024 Session D 8 Week session
01/29/24 - 06/28/24 07/01/24 - 08/25/24 Summer 2024 Session B 8 Week session
02/26/24 - 08/02/24 08/05/24 - 09/29/24 Summer 2024 Session I 8 Week session
03/25/24 - 08/30/24 09/02/24 - 10/27/24 Summer 2024 Session D 8 Week session

Course ID: 2636

|
This course explores Networking Security from the perspective of risk management and confirms that assessment of IP based Network systems is critical to developing strategies to mitigate and manage risks. This course focuses on effective assessment strategies that ultimately help the student to implement effective and proactive risk mitigation measures and risk management practices. It exposes the vulnerabilities of TCP/IP; and appraises risk assessment, risk analysis, risk mitigation, risk management, networking components and Virtual Private Networks (VPN). This course examines the tools and techniques used to attack, test and assure the security of the remote information, maintenance, FTP, database, email, UNIX RPC, and IP VPN services. The student will apply this knowledge to develop an assessment methodology that identifies, attacks, and penetrates IP based network systems.
Registration Dates Course Dates Session Weeks
12/25/23 - 05/31/24 06/03/24 - 07/28/24 Spring 2024 Session D 8 Week session
01/29/24 - 06/28/24 07/01/24 - 08/25/24 Summer 2024 Session B 8 Week session
02/26/24 - 08/02/24 08/05/24 - 09/29/24 Summer 2024 Session I 8 Week session
03/25/24 - 08/30/24 09/02/24 - 10/27/24 Summer 2024 Session D 8 Week session

Course ID: 3349

|
This course allows the student to obtain the knowledge required to analyze and mitigate threats in the organizational network environment. Upon completion of this course, students will be able to demonstrate a knowledge of both computer and network security, from the wetware (human), software, and hardware perspectives. The "wetware" component will deal with identification of potential risk situations, establishing policies for avoidance, recovery, and prosecution, and proactive measures to reduce causal factors for security breaches in an organization. The "software" perspective will examine types of inappropriate software activity, as well as asset protection issues (recognizing software assets). This component will also address software tools available to assist in reducing administrative costs due to both malicious and accidental loss. The "hardware" component will address hardware approaches to protecting assets, as well as hardware techniques used to compromise assets. Specific technologies discussed include firewalls, symmetric key encryption, public key encryption, digital certificates, and cryptographic systems (SSL/TLS, VPNs, and Kerberos).
Registration Dates Course Dates Session Weeks
12/25/23 - 05/31/24 06/03/24 - 07/28/24 Spring 2024 Session D 8 Week session
01/29/24 - 06/28/24 07/01/24 - 08/25/24 Summer 2024 Session B 8 Week session
02/26/24 - 08/02/24 08/05/24 - 09/29/24 Summer 2024 Session I 8 Week session
03/25/24 - 08/30/24 09/02/24 - 10/27/24 Summer 2024 Session D 8 Week session

Course ID: 2644

|
This course is a study of Network Security attacks and countermeasures. This course examines various security technologies, such as: intrusion detection, authentication, session hijacking, sniffing, spoofing, denial of service, buffer overflow attack, port scanning, encryption, IPSec, DES encryption, triple DES encryption, message digest 5 algorithm, point-to-point tunneling protocol (PPTP), layer 2 tunneling protocol (L2TP), Kerberos, RSA Pretty Good Privacy(PGP), Secure Shell (SSH), Secure Sockets Layer (SSL), Stateful Packet Inspection (SPI), Network Address Translation (NAT), proxies, content filters, public/private keys, Public Key Infrastructure (PKI), Virtual Private Networks (VPN), security policies, security tokens, digital certificates, viruses, worms, Trojan horses, virus scanners, virus protection, vulnerability assessment, and vulnerability scanners.
Registration Dates Course Dates Session Weeks
12/25/23 - 05/31/24 06/03/24 - 07/28/24 Spring 2024 Session D 8 Week session
02/26/24 - 08/02/24 08/05/24 - 09/29/24 Summer 2024 Session I 8 Week session

Courses Start Monthly

Next Courses Start Jan 6
Register by Jan 3

Admission Requirements

  • All APU undergraduate programs require a minimum of a high school diploma or equivalent (i.e., GED).
  • Please read all undergraduate admission requirements before applying to this program and be prepared to submit the required documentation.
  • There is no fee to complete the APU admission application for this program. View steps to apply.

Materials Cost

Software and/or lab equipment required for some courses in this program must be purchased at the student’s expense, and are not included in the university book grant. 

 

Need Help?

Selecting the right program to meet your educational goals is a key step in ensuring a successful outcome. If you are unsure of which program to choose, or need more information, please contact an APU admissions coach at 877-755-2787 or [email protected].

Quality Education Should Be Affordable

So you can focus on the opportunities ahead, without the financial burden of more expensive schools who are not as invested in your success. Learn more about paying for school.

Consumer Information

Disclosures

Maryland Residents learn more about costs, completion rates, median debt, and more.

 

1The University reserves the right to accept or deny credits according to policies outlined on our University website. Please see the University's transfer credit policy webpage for complete information.

*Cost Per Credit Hour

The Preferred Military Rate is $250 per credit hour for undergraduate and master's-level courses. This rate is available to all U.S. active-duty servicemembers, National Guard members, Reservists, and military families, including parents, spouses, legal partners, siblings, and dependents.

See all military student benefits.

Cost of Attendance

Learn more about American Public University's cost components and full cost of attendance