Skip to main content
A blue screen filled with computer programming code

Information Security

Program Overview

Program Overview

Protecting confidential information is a business obligation, and often an ethical and legal one. Governments, corporations, financial institutions, hospitals and private businesses all amass confidential information. That information is all about their employees and customers, products, research — and financial status. Our experienced faculty will guide you to success. On graduation day, you'll be ready to begin your career in information security.

Courses

Courses

General education requirement (38 hours)

Specific courses required:

  • BI 4213 - Biblical Ethics
  • LUSS 2093 - Impact of Internet Technologies on Society
  • Mathematics requirement satisfied by major


Required courses for the major area (79-81 hours)

  • AC 2503 - Financial Accounting
  • ENT 2503 - An Introduction to Business
  • CS 1122 - Introduction to Computer Science
  • CS 1213 - Introduction to Computer Programming
  • CS 1233 - Object-Oriented System Design and Programming
  • CS 2233 - Data Structures and Algorithms
  • CS 2243 - Database Management Systems
  • CS 2323 - Computer Organization
  • CS 3523 - Operating Systems
  • CCT 395V - Internship *
  • CCT 4613 - Senior Project
  • SEC 3113 - Fundamentals of Information Security
  • SEC 3313 - Introduction to Policy and Procedures
  • SEC 3323 - Crytography
  • SEC 3333 - Introduction to Business Continuity and Recovery Planning
  • SEC 4313 - Database Security
  • SEC 4323 - Network Security
  • IT 2223 - Web Application Development I
  • IT 3313 - Network Principles
  • IT 3323 - Wireless Networks and Mobile Systems
  • MK 3503 - Principles of Marketing
  • MA 1314 - Calculus I
  • MA 2103 - Discrete Mathematics
  • MA 2314 - Calculus II
  • MA 3123 - Mathematical Theory of Statistics


Concentration courses (9-10 hrs) (choose one concentration area)


Computer Systems:

  • CS 3333 - Mobile and Distributed Computing Systems

  • EECE 2423 - Principles of Computer System Design
  • EECE 3624 - Microprocessors: Principles and Applications


Game Development:

  • GD 3253 - Game Development I

  • GD 3263 - Game Development II
  • GD 3273 - Collaborative Serious Games Development


Information Technology Entrepreneurship:

  • MK 3403 - Strategic Internet Marketing
  • ENT 3543 - Entrepreneur Marketing
  • ENT 4503 - New Venture Creation


Mobile Computing:

  • CS 3243 - Mobile Device Programming

  • CS 3333 - Mobile and Distributed Computing Systems
  • CS 4013 - Future Mobile and Social Computing Systems


System Administration:

  • IT 3333 - Network Administration

  • IT 3343 - Database Administration 

  • SEC 3333 - Introduction to Business Continuity and Recovery Planning OR
  • BA 3703 - Business Communication


Web Application Development:

  • IT 3223 - Web Application Development II
  • IT 3233 - Web Server Technologies 
  • MK 3403 - Strategic Internet Marketing

**A general business minor is automatically satisfied by the information security major.

Internship

Become more competitive in the job market with an internship related to your interests. You’ll gain experience and boost your exposure. An internship will also help you learn whether you’ve chosen a career you’ll enjoy.

Job placement

With a top-tier university education on your resume, you’ll be in high demand, whether you choose to launch your career or begin graduate school. Most of our programs have a placement rate of at least 90 percent within six months of graduation.

Expert faculty, small class sizes

Learn from award-winning, experienced faculty who actually care about you. Our small class sizes allow us to get to know you personally. We lead an approachable community within our respective programs. Our faculty connections are the experts on their subject matter, too.

Our Faculty

  • Alfa Nyandoro

    Alfa Nyandoro

    Associate Professor of Computer Science and IT

    Learn More
  • Ken Mayer

    Ken Mayer

    Assistant Professor

    Ken Mayer Jr. is an Assistant Professor in Cybersecurity and IT. Previously, he came from private industry working for several Fortune 500 companies including, Dell Inc., Mercedes-Benz North America, and...

    Learn More
  • Chris Simmons

    Chris Simmons

    Associate Professor

    Chris Simmons is an Assistant Professor in the College of Computing and Technology. He obtained his Bachelor's degree from Tennessee State University, followed by a Master's degree in Information Technology...

    Learn More
  • Alan Cantrell

    Alan Cantrell

    Instructor

    Alan Cantrell is an Instructor in the College of Computing and Technology at Lipscomb University. He is a Director of IT Service Management in the Infrastructure & Security department at...

    Learn More
  • Bryan Thornton

    Bryan Thornton

    Computing and Tech Adjunct

    Learn More

Career Paths

Information Security Analysts

Information security analysts plan and carry out security measures to protect an organization’s computer networks and systems. Their responsibilities are continually expanding as the number of cyberattacks increases.

Computer and Information Research Scientists

Computer and information research scientists invent and design new approaches to computing technology and find innovative uses for existing technology. They study and solve complex problems in computing for business, medicine, science, and other fields.

Private Detectives and Investigators

Private detectives and investigators search for information about legal, financial, and personal matters. They offer many services, such as verifying people’s backgrounds and statements, finding missing persons, and investigating computer crimes.