Skip to main content

Information Systems Infrastructure Security Management

two men in computer server room
COM SCI X 420.3

This course covers physical and logical cybersecurity for data centers and IT infrastructures. It defines a management program to protect assets across all levels of technology and the core components that support that information technology.

Duration
As few as 11 weeks
Units
4.0
Current Formats
Online
In Person
Cost
Starting at $1,100.00

Get More Info

 

What you can learn.

Characterize types of security breaches to address and overcome
Analyze Internet security issues
Examine fault tolerance design alternatives
Use the tools, methods, and procedures necessary to design and implement a disaster recovery plan
Investigate network security considerations
Identify secure applications

About This Course

This course explores both physical and logical cybersecurity practices essential for protecting technology assets and the core components that support modern IT infrastructures. Students will examine infrastructure security management, physical and logical threat vectors, policy and compliance requirements, disaster recovery strategies, and business continuity planning. The curriculum also addresses change‑management scenarios and the day‑to‑day security challenges faced by IT professionals, emphasizing practical approaches to safeguarding organizational systems.

In addition to foundational security principles, the course introduces current industry frameworks, governance models, and risk‑management methodologies used to evaluate and strengthen enterprise security postures. Learners will analyze real‑world case studies, assess vulnerabilities across diverse environments, and practice developing security controls aligned with organizational needs.

This course provides an in‑depth understanding of the knowledge domains required for the CISM certification, preparing students to engage with security governance, risk management, incident response, and program development at a professional level.

Summer 2026 Schedule

Date
Details
Format
 
-
Tuesday 6:00PM - 9:00PM PT
Instructor:
REG#
408800
Fee:
$1,100.00
In Personformat icon
UCLA
Updating...
Notes

Enrollment limited; early enrollment advised. Visitors not permitted.

Enrollment deadline: June 28th, 2026.

Deadline
No refunds after June 16, 2026
Course Requirements
(Optional) Fundamentals of Information Systems Security (2021) by David Kim & Michael G. Solomon
Principles of Incident Response and Disaster Recovery by Michael E. Whitman & Herbert J. Mattord
Schedule
Type
Date
Time
Location
Lecture
Tue Jun 23, 2026
6:00PM PT - 9:00PM PT
UCLA
Math Sciences 5127
Lecture
Tue Jun 30, 2026
6:00PM PT - 9:00PM PT
UCLA
Math Sciences 5127
Lecture
Tue Jul 7, 2026
6:00PM PT - 9:00PM PT
UCLA
Math Sciences 5127
Lecture
Tue Jul 14, 2026
6:00PM PT - 9:00PM PT
UCLA
Math Sciences 5127
Lecture
Tue Jul 21, 2026
6:00PM PT - 9:00PM PT
UCLA
Math Sciences 5127
Lecture
Tue Jul 28, 2026
6:00PM PT - 9:00PM PT
UCLA
Math Sciences 5127
Lecture
Tue Aug 4, 2026
6:00PM PT - 9:00PM PT
UCLA
Math Sciences 5127
Lecture
Tue Aug 11, 2026
6:00PM PT - 9:00PM PT
UCLA
Math Sciences 5127
Lecture
Tue Aug 18, 2026
6:00PM PT - 9:00PM PT
UCLA
Math Sciences 5127
Lecture
Tue Aug 25, 2026
6:00PM PT - 9:00PM PT
UCLA
Math Sciences 5127
Lecture
Tue Sep 1, 2026
6:00PM PT - 9:00PM PT
UCLA
Math Sciences 5127
-
This section has no set meeting times.
Instructor:
REG#
408799
Fee:
$1,100.00
Onlineformat icon
Updating...
Notes

Enrollment limited; early enrollment advised. Enrollment deadline: June 28th, 2026.

Deadline
No refunds after June 15, 2026
Course Requirements
CISM Review Manual by Isaca

This course applies toward the following programs

cybersecurity-ce0584

Cybersecurity

certificate
certificate Learn essential cybersecurity skills in our 4-course Cybersecurity Certificate. Quickly gain the knowledge you need to protect your technology infrastructure from physical and virtual threats.

Learn essential cybersecurity skills in our 4-course Cybersecurity Certificate. Quickly gain the knowledge you need to protect your technology infrastructure from physical and virtual threats.