30 Total Credits Required
Cybersecurity courses cover business strategy, ethics in IT, risk management, malware and intrusion analysis, IT project management, research in IT, and managing a secure enterprise.
The master’s in cybersecurity can be completed in five semesters, although your transfer credits and general education coursework will vary the time it takes you to finish.
Examine the interaction between information technology and business strategy to create innovative and sustainable competitive advantage. Learn to ethically apply these insights to develop and advance organizational mission and vision. This course draws upon current work, training or internship experience.
Explore real-world information technology dilemmas and frameworks to identify ethical problems and reach ethical decisions. Use these skills, grounded in ethical theory, to make informed decisions within fast-paced and emerging business environments.This course draws upon current work, training or internship experience.
As part of a research project identify the critical role I.T. plays in organizational development. This course will explore how to employ action learning to improve the competitiveness of the organization. Defining IT challenges from an operational and strategic perspective the class will explore adaptive learning technique by offering proven educational theories and practices to foster the required changes in your staff. Research of existing organizational learning theories and the historical problems that occur with companies will be conducted to understand how to research these issues and provide solutions for technology enablement of the business. This course draws upon current work, training or internship experience.
Analyze the different methods of project management, tools and techniques necessary in the technology environment. Schedule, risk, quality, communication, stakeholder, technical team and resource management skills will be demonstrated through case study application and simulation. This course draws upon current work, training or internship experience.
Integrate tools and techniques learned throughout the program. Demonstrate knowledge obtained by planning a project for implementation in industry. Ethically incorporate technical and business leadership skills through documented approaches to managing a technical product or process improvement while leading people through the changes brought by its implementation. This course draws upon current work, training or internship experience.
Learn how companies manage risk across their organizations utilizing audit and compliance methods to support regulatory/legal compliance to meet their business objectives. Identify how they use mechanisms such as Vendor Information Security Risk Assessments (VISRA), App Monitoring and Logging, Cloud Governance and Risk Remediation strategies to meet Compliance objectives. Examine how Policy Development and Management helps govern a best-in-class whole security solutions for an organization.
Examine how companies use Identity and Access Management to protect the assets of their company. Learn how Firewalls are managed by understanding how they work and how requests for changes in Firewall rules are executed. Determine how Security operations support enterprise networks
Examine how incident detection is coordinated, how they are analyzed and contained plus how incidents are mitigated and recovered. Learn how incident trends are used to determine better security strategies to thwart future incidents. Explore what technologies are used to scan enterprise environments, how vulnerabilities are discovered and how those vulnerabilities are remediated thru incident response and Patch Management. Learn about what Insider threats exist in organizations and how they are managed thru Security and Privacy Training, Compliance and Ethics Policies plus Intruder detection technologies.
Understand how Malware and Intrusion Analysis is conducted. Learn how security groups monitor daily events in their network and the countermeasures that are taken to combat Cyber-attacks and bad actors. Learn how tactical intelligence coordination is conducted plus how Forensic Investigations are done to determine enterprise attacks and vulnerabilities.
Examine how all the Security Services work together for overall protection of an organization. Understand how Security Departments engage the organization thru security services such as Security Communications, Resource Management, Product Management, Security Metrics and Reporting and Security Business Analysis.
Request More Information
By filling out the form, you’ll:
- Gain access to a dedicated enrollment counselor who is ready to answer all of your questions.
- Take one more step towards achieving your career goals.
Fill out the form to receive more information!