Skip to Main Content

Cybersecurity Management

The fully online 36-credit MS in Cybersecurity Management prepares graduates for both initial placement and mid-level positions in career track jobs in cybersecurity, information assurance, and risk management fields.

Students may enroll in either a full-time or part-time schedule. Courses will be offered in eight-week modules, with six modules scheduled per year.

Below are the 8 core required courses and capstone course. Students will be able to select three electives from our extensive list of management courses. 

Curriculum & Schedules

Code Course Name Credit Hours
CBY510 Foundations of Cybersecurity Management 3

This course provides an understanding of IT infrastructure and services, their vulnerabilities as well as the size and complexity of security threats faced by enterprises. The Course will focus on the tenets of cybersecurity of confidentiality, integrity, availability and governance. Building on an understanding of these infrastructures, the development of security practices, policies, and awareness and compliance programs, with an introductory look at legal and regulatory issues will be examined in the context of assurance and security. Issues of access and authentication; data confidentiality and integrity; data availability; and networking and routing will also be addressed.

CBY620 Compliance & Legal Issues 3

This course examines legal, privacy and compliance environments facing US based organizations. Students will build an understanding of the complexities of these compliance and legal obligations starting with a general foundation of laws and industry standards that apply across most organizations. The course will review the legal aspects of customer information safeguards. Examination of industry verticals will expand the student's knowledge of particular federal and state regulatory and industry-based obligations. This course will also introduce the relevant laws and regulations with regard to law enforcement and civil investigation of digital crimes. 3 Credits

CBY625 Financing, Cost Control & Project Management of Cybersecurity 3

This course explores Information Assurance Management through finance and cost controls. The course will look at the strategic costs, financing and project management of important organizational IT functions. The course will also explore the aspects, methods, and alternatives in financing and cost control in information assurance management and compares/utilizes them with respect to non-IT-related expenses and costs. This seminar will also discuss and develop how to determine the costs and management of projects and compliance. The course also explores alternatives in building support and consensus for projects and activities and focuses heavily on adding value to the organization. Moreover, the course explores methods to build support and consensus for projects and activities while adding value to the organization. Financing and cost are explored both in terms of measuring business impact, problem solving and project management. 3 Credits

CBY630 Emerging Cyber Threats 3

This course examines the current topics of cybersecurity attacks and defenses from a global perspective. Security incidents will be analyzed and technologies and processes studied to better understand how to prevent or minimize a similar threat in the future. The course will be a mixture of traditional concerns around virus protection and spam prevention with new threats introduced by technology such as mobile devices and cloud computing. 3 Credits

CBY635 Human Organizational Aspects of Cybersecurity 3

This course investigates the relationships between human and organizational behavior and cybersecurity. Emphasis is on the human and OB elements of cyber-crimes. Topics will include ethics, psychology, sociology, hacker and organizational culture. Motivations for cybercrime and breaches of cybersecurity will be investigated. This course will consider social psychology and positive psychology and how behaviors influence the effectiveness of security practices. The courses will talk about best employment and risk management practices and policies to support information assurance and security including social network and email policies. The focus is on the ways that business objectives, user attitudes and user activities significantly influence both the development of an information assurance program and successful implementation of such programs.

CBY640 Information Assurance Management & Analytics 3

This seminar is arranged beginning with examining and exploring Information Assurance Management and Analytics from a strategy perspective and gradually narrowing down to the tactical level, including the management of projects and compliance; leadership and policy development; relationship building in an organization; and organizational education. The course will also review customer information safeguards. The curriculum explores the aspects, methods, and alternatives in information assurance management and compares/utilizes them with respect to non-IT-related management approaches and styles. Additionally, it explores alternatives in building support and consensus for projects and activities and focuses heavily on adding value to the organization. Developing an information assurance management plan is examined and is used to help identify techniques of improving the information assurance awareness. Analytics are explored both in terms of measuring business impact, and problem solving and project management techniques and alternatives are included.

CBY650 Strategic Cybersecurity Crisis Management 3

This course focuses on operational cybersecurity management issues in business continuity planning, disaster recovery, identity management, change management, metrics, accreditation, certification, and validation. The course examines in detail effective risk assessment programs, disaster recovery planning, how to interpret the sources and levels of risk, how to apply appropriate defensive systems employing security in depth and diversity concepts, and back-up and recovery procedures. Students are required to examine cybersecurity at a program and architectural level regarding issues such as risk management, audit, privacy, Information Security Management System (ISMS), and identify how management will respond to a disaster within an organizational context. Students will also be able to limit and mitigate loss, teach security awareness, metrics and develop educational strategies, and then present a plan to the executive board for approval. 3 Credits Prerequisite: CBY 640

CBY655 Digital Forensics 3

In this course, the student will accomplish in-depth studies of the theory and practice of digital investigations in criminal and civil cases on a local, state, national and global basis. Topics include cyber terrorism, cybercrime and cyber warfare. Discussions will also include identification, collection, acquisition, authentication, preservation, examination, analysis and presentation of evidence for prosecution purposes. In addition students will discuss the elements of management and leadership required in the field of investigation. 3 Credits

CBY670 Capstone I: Cyber Thesis 3

A study of an exercise in developing, leading, and implementing effective enterprise level cybersecurity programs in a real-life setting. Focus is on establishing programs that combine technological, policy, training, auditing, personnel, and physical elements. Challenges within specific industries are discussed. Topics include enterprise architecture, risk management, vulnerability assessment, threat analysis, crisis management, security architecture, security models, security policy development and implementation, security compliance, information privacy, identity management, incident response, disaster recovery, and business continuity planning. A project paper is the major focus of the learning experience as it will reflect integration and synthesis of the entire cybersecurity curriculum. As part of this project the student will be able to define a program for one or a variety of users and/or develop sophisticated implementation policies for companies, agencies or governments. Must be taken as the last course in the program. Students must take either CBY 670 or CBY 675, not both.