The Accelerated Online Bachelor in IT-Security (BBA in IT-Security) is a focused distance learning degree program that develops a thorough understanding of IT-Security in its manifold aspects. Delivered via eLearning it is ideal for candidates with practical experience who do not possess the appropriate academic qualifications, aiming to obtain them by expanding and formalizing knowledge in the various fields of IT-Security. The program is strongly oriented towards practical application, rather than theory. It is a combination of academic content adapted for the experienced working professional, coupled with extensive academic and industry related exposure. Graduates of this program may advance into SMC’s online MBA program.
The curriculum is a-la-carte. It’s portfolio of courses serves as the basis for establishing an individual academic plan, which is aligned with your previous academic credentials and professional experience. You will receive credits in all the fields where you can prove evident formalized knowledge, skill, and competence. In fields with related business experience, you will pursue the final exams only. The remaining courses will be pursued as normal.
This course provides students with the required skills to produce clear written communication which is concise and persuasive and which helps enhance the competitive advantage of the company. Topics include reports, proposals, tenders and letters, commercial correspondence and effective reports. Furthermore, the course examines the seven aspects of a dynamic presentation, shows methods of structuring, visualizing and delivering the message. The class will help you improve your confidence and will examine the theoretical and practical concepts and problems of public speaking. All presentations will be videotaped and handed out to you for analysis.
The course deals with theory and practice of managing and owning your business, problems of running a family business and how new businesses are started. The subject explores the entire process of creating and running operations, from a planning to an execution stage. It gives a thorough prospective of the process of building and presenting business plans, and applies it in cases of creating plans for companies.
This course includes measures of central tendency and variability, probability, random variables, normal and binomial distributions, confidence intervals, tests of hypotheses, correlation and simple linear regression, descriptive and inferential techniques and concepts.
This course introduces the student to the analysis, design, implementation, and operation of information of systems in a security context. Addressed are various approaches to analyzing information systems, and the steps necessary to gather information on the system requirements and to model business needs accordingly.
The course covers the management of core information security challenges such as: attack vectors, detection and prevention techniques, cryptography, firewalls, intrusion detection systems, security policies, risk management and incident response.
This course addresses the use of various cryptographic techniques for securing data from unauthorized access. The algorithms used for symmetric ciphers, asymmetric ciphers, and cryptographic data integrity are discussed. The students learn the practical use of algorithms for the encryption of data across various application scenarios.
This course addresses the importance of computer forensics and the procedures and responsibilities related to obtaining digital evidence through the analysis of computers and networks. Topics also include network surveillance and the handling of intrusion events.
Discusses the basic concepts of managing, delegating, analysis, decision making, job design, human resource management, communication planning and controlling in an organization. We thus explore not only the management process, but the different approaches to it and the external factors influencing it. Furthermore, the course explores the different structures that optimize management of firms and discusses the various sides of a business organization, namely marketing, accounting, finance, human resources, and information systems. We discuss how to combine conflicting interests in a company to achieve organizational goals. You will also be able to assess the best form of business organization and its structure in each environment.
This course covers the following topics: functions and functional notation, domain and ranges of functions, graphs of functions and relations, operations on functions, inverse functions, polynomial and rational functions, absolute value and radical functions, exponential and logarithmic properties, functions, and equations.
This course introduces students to the basics of computer networking using common network devices. The course covers the OSI model and industry standards, network topologies, IP addressing including subnet masks, and basic network design.
This course examines management approach to defining and implementing e-commerce solutions including management and regulatory challenges. Students will explore strategies to address online fraud, payment and mobile application challenges.
This course examines applications necessary to secure a network from intrusion including firewalls, bastion hosts, proxy servers, and honeypots. Applications to perform vulnerability testing to determine network weaknesses are also introduced.
Alternatively you may also choose to settle the entire tuition in a single payment of €1890 (no further costs apply).
The tuition can be settled via online payment or by bank transfer.
Taking Enrollments Now
READY TO CHALLENGE YOUR FUTURE?
We’re here to help answer your questions. Our student helpdesk is on hand to help inform you of every aspect regarding your topic. Simply fill the contact form if you need any support. We take great pride in using our expertise for you and look forward to hearing from you.
We are located at Bahnhofstraße 20, 6300 Zug, Switzerland.
You can also call us on +41 (0)41 500 16 22.