Beruflich Dokumente
Kultur Dokumente
MSISA
Accreditation
Western Governors University is the only university in the history of American higher education
to have earned accreditation from four regional accrediting commissions. WGU's accreditation
was awarded by (1) the Northwest Commission on Colleges and Universities, (2) the Higher
Learning Commission of the North Central Association of Colleges and Schools, (3) the
Accrediting Commission for Community and Junior Colleges of the Western Association of
Schools and Colleges, and (4) the Accrediting Commission for Senior Colleges and Universities
of the Western Association of Schools and Colleges. The universitys accreditation status is now
managed by the Northwest Commission on Colleges and Universities (NWCCU). The WGU
Teachers College is accredited by the National Council for Accreditation of Teacher Education
(NCATE). The nursing programs are accredited by the Commission on Collegiate Nursing
Education (CCNE). The Health Informatics program is accredited by the Commission on
Accreditation for Health Informatics and Information Management Education (CAHIIM).
MSISA
Students will vary widely in the specific skills and information they need to learn. For example,
some may be highly knowledgeable in a subject matter and would not need to engage in new
learning opportunities. Others may find that portions of the program require completely new
learning and that they may need to take an online class or participate in a study module to
acquire the knowledge and skills needed to pass the program competencies in that area. Some
individuals may be able to devote as little as 1520 hours per week to the program, while others
may have more time. For this reason, you will complete pre-assessments to help your mentor
form a profile of your prior knowledge and experience for use in creating your Degree Plan.
Orientation
The Orientation focuses on acquainting the student with WGUs competency-based model,
distance education, technology, and other resources and tools available for students. You will
MSISA
also utilize tutorials, message boards, online chats, and other activities to connect with other
students in your program. This orientation is completed before you start your first term at WGU.
assessments may be assigned three competency units while other assessments may be as
large as 12 competency units.
Satisfactory Academic Progress (SAP) is particularly important for financial aid students
because you must make SAP in order to maintain eligibility for financial aid. We will measure
your SAP quantitatively by reviewing the number of competency units you have completed each
term. As full-time students, WGU graduate students must enroll in at least eight competency
units each term, and undergraduate students must enroll in at least 12 competency units each
term. In order to remain in good academic standing, you must complete at least 66.67% of the
units you attempt over the length of your program including any assessments you add to your
term to accelerate your progress. Additionally, during your first term at WGU you must pass at
least three competency units in order to remain eligible for financial aid. We know that SAP is
complex, so please contact a Financial Aid Counselor should you have additional questions.
Assessments
Your Degree Plan will include the assessments needed to complete your program. To obtain
your degree you will be required to demonstrate your skills and knowledge by completing the
following assessments:
Performance Assessments contain, in most cases, multiple scored tasks such as projects,
essays, and research papers. Performance assessments contain detailed instructions and
rubrics for completing each task and are submitted in TaskStream, an online project
management and grading tool.
Objective Assessments are designed to evaluate your knowledge and skills in a domain of
knowledge. Most objective assessments include multiple-choice items, multiple-selection items,
matching, short answer, drag-and-drop, and point-and-click item types, as well as case study
and video-based items.
Certification Assessments are used to determine competency in specific IT skills. These
exams may include performance items, simulations, and/or objective exam questions. Each
certifying organization sets the passing score that WGU follows to award you credit for earned
competencies. More details on individual certification exams will be provided later in this
document.
Capstone Project: The Capstone Project is the culmination of the students WGU degree
program. It requires the student to demonstrate the integration and synthesis of competencies in
all domains required for the degree, particularly in the area of emphasis.
As mentioned earlier, we have assigned competency units (CUs) to each assessment in order
to measure your academic progress. As a graduate student, you will be expected to enroll in a
minimum of eight competency units each term. A standard plan, at eight units per term, would
look similar to the one that follows.
Your personal progress can be faster, but your pace will be determined by the extent of your
transfer units, your time commitment, and your determination to proceed at a faster rate.
MSISA
CUs
3
3
2
3
3
2
3
3
2
2
4
Term
1
1
1
2
2
2
3
3
3
4
4
In this example, the program will take four terms for the student to complete. The standard path
shown above lists the courses of study (assessments) and the associated competency units by
term. The Degree Plan will include greater detail about the courses of study, including the
assessments and their associated standard learning resources.
Learning Resources
You will work with your mentor to select the various learning resources needed to prepare for
the required assessments. In most cases, the learning materials you will use are independent
learning resources such as textbooks, e-learning modules, study guides, simulations, virtual
labs, and tutorials. WGU works with dozens of educational providers, including enterprises,
publishers, training companies, and higher educational institutions to give you high quality and
effective instruction that matches the competencies that you are developing. The cost of many
learning resources is included in your tuition, and you can enroll directly in those through your
Degree Plan as your mentor has scheduled them. Some resources (e.g., many textbooks) are
not covered by your tuition, and you will need to cover those costs separately. WGU has
excellent bookstore and library arrangements to help you obtain the needed learning resources.
Changes to Curriculum
WGU publishes an Institutional Catalogue, which describes the academic requirements of each
degree program. Although students are required to complete the program version current at the
time of their enrollment, WGU may modify requirements and course offerings within that version
of the program to maintain the currency and relevance of WGUs competencies and programs.
As these changes are implemented, WGU will ensure that the length of the students degree
program (i.e., total competency unit requirements) will not increase and that competency units
already earned will be applied to the updated program version. When program requirements are
updated, students returning from term break or returning after withdrawal from the University will
be expected to re-enter the updated version of the program.
MSISA
MSISA
The graduate integrates theories surrounding the adoption and diffusion of technology
into the evaluation of prospective technologies.
The graduate conducts a needs analysis of an organization that identifies issues and
problems for which an innovative technology might represent a solution.
The graduate analyzes potential organizational culture barriers to the adoption of new
technology for a given organization.
The graduate develops adoption plans that address organizational culture and potential
obstacles to the successful adoption of innovative technology.
Current and Emerging Technology
Performance assessment
Sample Learning Resources:
VitalSource provides an e-text version of the following texts:
Valacich, J.S., George, J.F., & Hoffer, J.A. (2012). Essentials of systems analysis and
design (5th ed.). Upper Saddle River, New Jersey: Pearson. ISBN: 0137067119.
(e-text, cost of this resource is included in tuition and fees).
White, M.A., & Bruton, G.D. (2007). The management of technology and innovation: A
strategic approach. Mason, Ohio: Thomson South-Western. ISBN: 0324144970.
(e-text, cost of this resource is included in tuition and fees)
Betz, F. (2011). Managing technological innovation: Competitive advantage from
change (3rd ed.). Hoboken, New Jersey: John Wiley & Sons Inc. ISBN:
9780470547823. (e-text, cost of this resource is included in tuition and fees)
SkillSoft provides an e-text version of the following texts:
Chew, E.K., & Gottschalk, P. (2009). Information technology strategy and management:
Best practices. Hershey, Pennsylvania: IRM Press. ISBN: 9781599048024. (etext, cost of this resource is included in tuition and fees).
Austin, R.D., Nolan, R.L., & ODonnell, S. (2009). The adventures of an IT leader.
Boston, Massachusetts: Harvard Business School Publishing. ISBN:
9781422146606. (e-text, cost of this resource is included in tuition and fees).
Davis, C.K. (2003). Technologies & methodologies for evaluating information
technology in business. Hershey, Pennsylvania: IRM Press. ISBN: 1931777489.
(e-text, cost of this resource is included in tuition and fees)
Lientz, B.P., & Rea, K.P. (2004). Breakthrough IT change management: How to get
enduring change results. Burlington, Massachusetts: Elsevier ButterworthHeinemann. ISBN: 0750676868. (e-text, cost of this resource is included in
tuition and fees)
WGU Library E-reserves provides access to other electronic items. (cost of this
resource is included in tuition and fees)
MSISA
evaluate provisions of both the 2001 and 2006 USA PATRIOT Acts. This course covers the
following competencies:
The graduate develops a legal analysis addressing legal issues, standards, policies,
legislation, and governance related to cybercrimes for enterprise systems.
The graduate evaluates the application of current laws and regulations in situations
involving constitutional controversy and authority, deterring terrorism, ethical
implications, or cybercrime.
The graduate selects appropriate business practices that ensure the protection of
intellectual property.
MSISA
Hacking
Hacking Countermeasures and Techniques
This course covers the following competencies:
The graduate evaluates techniques used in footprinting and implements industry best
practices to protect against this type of information asset vulnerability.
The graduate identifies known web server vulnerabilities and demonstrates industry best
practices to protect against this type of threat.
The graduate identifies common web application vulnerabilities and uses industry best
practices to protect against this type of threat.
Hacking Countermeasures and Techniques
Performance assessment.
Sample Learning Resources:
VitalSource provides an e-text version of the following texts:
International Council of Electronic Commerce Consultants (2009). Ethical hacking and
countermeasures: Attack phases. (Vol. 1). Course Technology, Cengage
Learning.
International Council of Electronic Commerce Consultants. (2009). Ethical hacking and
countermeasures: Threats and defense mechanisms. (Vol. 2). Course
Technology, Cengage Learning.
International Council of Electronic Commerce Consultants. (2009). Ethical hacking and
countermeasures: Web applications and data servers. (Vol. 3). Course
Technology, Cengage Learning.
Twelve hours of interactive training in Hacking Revealed 2008 provided by LearnKey
Ethical Hacking
This course covers the following competencies:
MSISA
The graduate analyzes ethical and legal issues related to the unauthorized or unwanted
access into and of information assets, including types of hacking technologies and
related skills.
The graduate evaluates techniques used in footprinting and implements industry best
practices to protect against this type of information asset vulnerability.
The graduate identifies known web server vulnerabilities and demonstrates industry best
practices to protect against this type of threat.
10
The graduate identifies common web application vulnerabilities and uses industry best
practices to protect against this type of threat.
The graduate evaluates industry best practices for securing a wireless network, identifies
the threats to wireless security, and associates threats with known countermeasures.
Ethical Hacking
EC-Council Certified Ethical Hacker Exam (312-50)
Sample Learning Resources:
VitalSource provides an e-text version of the following texts:
International Council of Electronic Commerce Consultants (2009). Ethical hacking and
countermeasures: Attack phases. (Vol. 1). Course Technology, Cengage
Learning.
International Council of Electronic Commerce Consultants. (2009). Ethical hacking and
countermeasures: Threats and defense mechanisms. (Vol. 2). Course
Technology, Cengage Learning.
International Council of Electronic Commerce Consultants. (2009). Ethical hacking and
countermeasures: Web applications and data servers. (Vol. 3). Course
Technology, Cengage Learning.
iLabs and iClass provided by EC-Council
Cryptography
Cryptography
This course covers the following competencies:
The graduate evaluates cryptographic methods for establishing and maintaining network
security.
MSISA
11
Vulnerability Assessment
Vulnerability Assessment
This course prepares the student to conduct internal threat assessments and to analyze their
risks and impact on an organization. It covers the following competencies:
The graduate recognizes common threats, identifies practical and legal issues of system
and network penetration testing, and uses best practices to evaluate penetration tests.
The graduate evaluates vulnerability assessments for risks, security threats, and system
and network testing.
The graduate evaluates security tests and best practices for analyzing the results of
penetration testing of a network system.
The graduate evaluates threats posed by social engineering, and determines common
techniques and methods to use when conducting or protecting against social
engineering.
Vulnerability Assessment
Performance assessment.
Sample Learning Resources:
SkillSoft provides an e-text version of the following texts:
Schifreen, R. (2006). Defeating the hacker: A non-technical guide to computer security.
John Wiley & Sons. ISBN: 9780470025550. (cost of this course is included in
tuition and fees)
Snedaker, S., & McCrie, R. (2007). The best damn IT security management book
period. Syngress Publishing. ISBN: 9781597492270. (cost of this course is
included in tuition and fees)
Tipton, H. F., & Krause, M. (2007). Information security management handbook (6th
ed.). Auerbach Publications. ISBN: 9780849374951. (cost of this course is
included in tuition and fees)
MSISA
The graduate evaluates a forensic investigation plan for modern information system
assets, including legal requirements related to computer forensics.
The graduate evaluates a computer forensic investigation on stored data, including the
use of tools and processes.
12
The graduate evaluates forensic investigations of physical and virtual devices that
include routers, e-mail servers, and personal digital assistants (PDAs).
Forensics and Network Intrusion
EC-Council Exam 312-49 for the Computer Hacking Forensics
Sample Learning Resources:
VitalSource provides e-text versions of the following texts which are paired with Student
Resource Guides provided by Cengage:
EC Council (2010). Computer forensics: Investigation procedures and response. (Vol.
1) . Course Technology, Cengage Learning. ISBN: 978-1-4354-8349-1. (cost of
this resource is included in tuition and fees)
EC Council (2010). Computer forensics: Investigating hard disks, file and operating
systems. (Vol. 2). Course Technology, Cengage Learning. ISBN: 978-1-43548350-7. (cost of this resource is included in tuition and fees)
EC Council (2010). Computer forensics: Investigating data and image files. (Vol. 3).
Course Technology, Cengage Learning. ISBN: 978-1-4354-8351-4. (cost of this
resource is included in tuition and fees)
EC Council (2010). Computer forensics: Investigating network instrusions and
cybercrime. (Vol. 4). Course Technology, Cengage Learning. ISBN: 978-14354-8352-1. (cost of this resource is included in tuition and fees)
EC Council (2010). Computer forensics: Investigating wireless networks and devices.
(Vol. 5). Course Technology, Cengage Learning. ISBN: 978-1-4354-8353-8.
(cost of this resource is included in tuition and fees)
iLabs and iClass provided by EC-Council
The graduate evaluates security threats and identifies and applies security controls
based on analyses and industry standards and best practices.
The graduate evaluates the practice of defining and implementing a security audit and
conducts an information security audit using industry best practices.
The graduate identifies and discusses the Information Assurance certification and
accreditation (C&A) process.
The graduate identifies and evaluates ethical issues germane to information and network
security.
Security Policy and Standards Best Practices
Performance assessment.
MSISA
13
Risk Management
Risk Management
Content focuses on categorizing levels of risk and understanding how risk can impact the
operations of the business through a scenario involving the creation of a risk management
program and business continuity program for a company and a business situation reacting to a
crisis/disaster situation affecting the company. This course covers the following competencies:
MSISA
The graduate applies the problem solving process to solve organizational and team
problems, and develops strategies to avoid decision-making pitfalls.
The graduate analyzes risks and values and uses a variety of decision analysis tools
and decision theory to evaluate alternatives during decision-making processes.
The graduate analyzes enterprise continuity plans and the continuity planning process to
ensure the inclusion of essential elements, processes, and stakeholder roles.
The graduate applies international standards to company operations and assesses and
recommends strategies for maintaining organizational stability and continuity in the
global marketplace.
The graduate develops and analyzes organizational contingency plans for responding to
sudden and rapid environmental changes.
The graduate evaluates internal and external risks and recommends risk mitigation
strategies and techniques to an organization.
The graduate develops and assesses enterprise risk management programs for
organizations and incorporates industry best practices in risk management processes
and programs.
14
The graduate uses risk control and risk optimization analytics and strategies to maximize
returns relative to risk for organizations.
The graduate makes ethical decisions for the use of information technology and creates
processes to maintain the security of data in information technology systems.
Risk Management
Performance assessment
Sample Learning Resources:
SkillSoft provides e-text versions of the following texts:
Spedding, L.S., & Rose, A. (2007). Business risk management handbook: A sustainable
approach. Burlington, MA: CIMA Publishing. ISBN: 0750681748. (cost of this
resource is included in tuition and fees)
Hiles, A. (Ed.). (2007). The definitive handbook of business continuity
management (2nd ed.). West Sussex, England: Wiley & Sons. ISBN:
0470516380. (cost of this resource is included in tuition and fees)
eBrary provides e-text versions of the following texts:
Blyth, M. (2008). Risk and security management: Protecting people and sites
worldwide. Hoboken, NJ: Wiley. ISBN: 9780470373057. (cost of this resource is
included in tuition and fees)
Merna, T. & Al-Thani, F.F. (2008). Corporate risk management (2nd ed.). Hoboken, NJ:
Wiley. ISBN: 9780470518335. (cost of this resource is included in tuition and
fees)
Disaster Recovery
Disaster Recovery Planning, Prevention and Response
This course prepares students to plan and execute industry best practices related to conducting
organization-wide information assurance initiatives and to preparing an organization for
implementing a comprehensive Information Assurance Management program. It covers the
following competencies:
MSISA
The graduate evaluates a communication plan that describes how upper management
can communicate to stakeholders issues related to the support and protection of network
technology; makes recommendations; analyzes and proposes budgets; and develops
procedures and protocols for joint enterprise continuity planning with the board,
investors, and other key stakeholders.
The graduate assesses risks and controls in the enterprise that relate to the recovery of
network systems and technology following a disaster.
The graduate identifies, evaluates, and applies network response procedures for attacks
with special circumstances.
15
The graduate assesses needs, threats, and solutions prior to and during a network
disaster.
Disaster Recovery Planning, Prevention and Response
Performance assessment.
Sample Learning Resources:
Disaster Recovery Planning, Prevention and Response delivered through Soomo
that provides access to Harvard Cases and other learning activities.
SkillSoft provides an e-text version of the following text:
Hiles, A. (2007). The definitive handbook of business continuity management (2nd ed.).
West Sussex: John Wiley & Sons. ISBN: 978-0-470-51638-6. (cost of this
resource is included in tuition and fees)
WGU Library E-Reserves provides electronic access to the following:
A Comprehensive, Best-Practices Approach to Business Resilience and Risk Mitigation
Resilient Infrastructure: Improving Your Business Resilience
Capstone Project
The Capstone Project is the culmination of the students WGU degree program. It requires the
student to demonstrate the integration and synthesis of competencies in all domains required
for the degree, particularly in the area of emphasis. It includes a work product specified in
consultation with and with the approval of the mentor. It may be a project, a set of policy
recommendations, a business plan, a marketing plan, action research, a strategic plan, a
product, or a service.
Information Security and Assurance Capstone Written Project
Students will be able to choose from three areas of emphasis, depending on personal
and professional interests. Students will complete a capstone project that deals with a
significant real-world business problem that further integrates the components of the
degree. Capstone projects will require an oral defense before a committee of WGU
faculty.
16
If you have inquiries or concerns that require technical support, please contact the WGU IT
Service Desk. The IT Service Desk is available Monday through Friday, 6 AM to 12 AM and
Saturday and Sunday, 10 AM to 7 PM, MT. To contact the IT Service Desk, please call 1-877HELP-WGU (877-435-7948) and select option 2 or email servicedesk@wgu.edu.
For the most current information regarding WGU support services, please visit the Help tab on
the Student Portal at http://my.wgu.edu.
MSISA
17