Skip to main content

Now accepting applications for the new Endeavor Program, a unique educational experience designed for you!

Learn More
A blue screen filled with computer programming code

Information Security

Program Overview

Program Overview

Protecting confidential information is a business obligation, and often an ethical and legal one. Governments, corporations, financial institutions, hospitals and private businesses all amass confidential information. That information is all about their employees and customers, products, research — and financial status. Our experienced faculty will guide you to success. On graduation day, you'll be ready to begin your career in information security.



General education requirement (38 hours)

Specific courses required:

  • BI 4213 - Biblical Ethics
  • LUSS 2093 - Impact of Internet Technologies on Society
  • Mathematics requirement satisfied by major

Required courses for the major area (79-81 hours)

  • AC 2503 - Financial Accounting
  • ENT 2503 - An Introduction to Business
  • CS 1122 - Introduction to Computer Science
  • CS 1213 - Introduction to Computer Programming
  • CS 1233 - Object-Oriented System Design and Programming
  • CS 2233 - Data Structures and Algorithms
  • CS 2243 - Database Management Systems
  • CS 2323 - Computer Organization
  • CS 3523 - Operating Systems
  • CCT 395V - Internship *
  • CCT 4613 - Senior Project
  • SEC 3113 - Fundamentals of Information Security
  • SEC 3313 - Introduction to Policy and Procedures
  • SEC 3323 - Crytography
  • SEC 3333 - Introduction to Business Continuity and Recovery Planning
  • SEC 4313 - Database Security
  • SEC 4323 - Network Security
  • IT 2223 - Web Application Development I
  • IT 3313 - Network Principles
  • IT 3323 - Wireless Networks and Mobile Systems
  • MK 3503 - Principles of Marketing
  • MA 1314 - Calculus I
  • MA 2103 - Discrete Mathematics
  • MA 2314 - Calculus II
  • MA 3123 - Mathematical Theory of Statistics

Concentration courses (9-10 hrs) (choose one concentration area)

Computer Systems:

  • CS 3333 - Mobile and Distributed Computing Systems

  • EECE 2423 - Principles of Computer System Design
  • EECE 3624 - Microprocessors: Principles and Applications

Game Development:

  • GD 3253 - Game Development I

  • GD 3263 - Game Development II
  • GD 3273 - Collaborative Serious Games Development

Information Technology Entrepreneurship:

  • MK 3403 - Strategic Internet Marketing
  • ENT 3543 - Entrepreneur Marketing
  • ENT 4503 - New Venture Creation

Mobile Computing:

  • CS 3243 - Mobile Device Programming

  • CS 3333 - Mobile and Distributed Computing Systems
  • CS 4013 - Future Mobile and Social Computing Systems

System Administration:

  • IT 3333 - Network Administration

  • IT 3343 - Database Administration 

  • SEC 3333 - Introduction to Business Continuity and Recovery Planning OR
  • BA 3703 - Business Communication

Web Application Development:

  • IT 3223 - Web Application Development II
  • IT 3233 - Web Server Technologies 
  • MK 3403 - Strategic Internet Marketing

**A general business minor is automatically satisfied by the information security major.


Become more competitive in the job market with an internship related to your interests. You’ll gain experience and boost your exposure. An internship will also help you learn whether you’ve chosen a career you’ll enjoy.

Job placement

With a top-tier university education on your resume, you’ll be in high demand, whether you choose to launch your career or begin graduate school. Most of our programs have a placement rate of at least 90 percent within six months of graduation.

Expert faculty, small class sizes

Learn from award-winning, experienced faculty who actually care about you. Our small class sizes allow us to get to know you personally. We lead an approachable community within our respective programs. Our faculty connections are the experts on their subject matter, too.

Our Faculty

  • Alfa Nyandoro headshot

    Alfa Nyandoro

    Interim Associate Dean and Associate Professor

    Alfa Nyandoro was awarded the Ph.D. in Computer Science & Engineering (2006) from the University of New South Wales - Australia. Prior to pursuing Ph.D. studies, he was a research...

    Meet Alfa Nyandoro
  • Ken Mayer

    Ken Mayer

    Assistant Professor

    Ken Mayer Jr. is an Assistant Professor in Cybersecurity and IT. Previously, he came from private industry working for several Fortune 500 companies including, Dell Inc., Mercedes-Benz North America, and...

    Meet Ken Mayer
  • Chris Simmons headshot

    Chris Simmons

    Associate Professor

    Chris Simmons is an Assistant Professor in the College of Computing and Technology. He obtained his Bachelor's degree from Tennessee State University, followed by a Master's degree in Information Technology...

    Meet Chris Simmons
  • Alan Cantrell

    Alan Cantrell

    Adjunct Faculty

    Alan Cantrell is an Instructor in the College of Computing and Technology at Lipscomb University. He is a Director of IT Service Management in the Infrastructure & Security department at...

    Meet Alan Cantrell
  • Bryan Thornton

    Bryan Thornton

    Adjunct Faculty

    Meet Bryan Thornton

Career Paths

Information Security Analysts

Information security analysts plan and carry out security measures to protect an organization’s computer networks and systems. Their responsibilities are continually expanding as the number of cyberattacks increases.

Computer and Information Research Scientists

Computer and information research scientists invent and design new approaches to computing technology and find innovative uses for existing technology. They study and solve complex problems in computing for business, medicine, science, and other fields.

Private Detectives and Investigators

Private detectives and investigators search for information about legal, financial, and personal matters. They offer many services, such as verifying people’s backgrounds and statements, finding missing persons, and investigating computer crimes.