Master of Science in Cybersecurity Management
Description and Outcomes
The Master of Science in Cybersecurity Management will prepare graduates for leadership roles directing and protecting critical information infrastructures. You will learn to develop, implement, evaluate, and update the cybersecurity policies and practices that allow an organization to effectively respond to the dynamic cybersecurity landscape. Graduates will be adept in the management of information continuity, asset classification and control, compliance management, and the secure administration of IT infrastructure, as well as incident response.
The Master of Science in Cybersecurity Management program consists of a minimum of 60 quarter credit hours. Upon successful completion of the program, you will be awarded a master of science degree.
- Theory and Principles: Evaluate theories, framework, principles, and best practices related to cybersecurity science and technology by assessing and reviewing recent cybersecurity literature and industry publications.
- Industry Research: Demonstrate the maturity to develop research topics based on cybersecurity underlying principles learned throughout the MSCM program.
- Decision Analysis: Analyze data using statistical principles for the purpose of developing or/and supporting a hypothesis.
- Critical and Analytical Thinking: Apply appropriate theories, including Request for Comments (RFCs), within cybersecurity science and technology to evaluate and mitigate risk in contexts of uncertainty.
In addition to the discipline-specific outcomes, professional competencies are integrated throughout your academic program. You can review the professional competencies associated with your academic program in the graduate School of General Education section of this Catalog.
- Students entering the Master of Science in Cybersecurity Management program should already possess an in-depth knowledge of computer systems and networking technology, good mathematical and communication skills, and familiarity with Internet and wireless applications. Required information technology (IT) skillsets should be equivalent to a Bachelor of Science in Information Technology (BSIT) or similar degree, or an appropriate combination of IT professional certifications and experience.
- You are required to take and pass IT513 Writing and Critical Thinking for the IT Professional or the IT 513X course assessment in your first term. To register for a course assessment, you must contact your Education Advisor at least 1 week prior to the start of the first term. Refer to the Registration section for additional information.
- You may apply to use transfer credit to replace or substitute for up to 50 percent of the program by submitting a waiver form to the Dean of the School of Business and Information Technology. A waiver will be granted conditionally, based upon an evaluation of common learning outcomes.
- You may enroll in no more than one course per term for your first three terms. After completing your third term, you may enroll in two courses per term if your cumulative GPA is 3.5 or higher. Exceptions to this policy require the approval of the Dean of the School of Business and Information Technology or a designee.
- If, for any reason, you are required to complete additional capstone hours during your program, you may complete them during the normal course of study or you may contact your Education Advisor to secure an extension. IT596 IT Graduate Capstone Extension Course is taken after IT595 Master's Capstone in Cybersecurity Management and is for the specific purpose of providing a means for capstone project or thesis completion. Approval of the Dean or the Department Chair is required for enrollment in IT596 IT Graduate Capstone Extension Course. If an extension is granted, the University will not charge tuition for the extension course; however, you will be required to pay the normal technology fee.
|IT513||Writing and Critical Thinking for the IT Professional||4|
|IT527||Foundations in Data Analytics||4|
|IT528||Quantitative Risk Analysis||4|
|IT537||Introduction to Cybersecurity||4|
|IT540||Management of Information Security||4|
|IT541||Computer and Network Security||4|
|IT542||Ethical Hacking and Network Defense||4|
|IT544||Platforms, Applications, and Data Security||4|
|IT545||Wireless, Mobile, and Cloud Security||4|
|IT550||Computer Forensics and Investigations||4|
|IT590||Legal and Ethical Issues in IT||4|
|IT591||IT Security Auditing and Assessments||4|
|IT592||Financial Investment of Cybersecurity||4|
|IT595||Master's Capstone in Cybersecurity Management||4|
|Total Core Requirements||60|