Cybersecurity Concentration

Cybersecurity Concentration 2018-03-27T16:14:11+00:00

Master of Science in Information Technology with a concentration in Cybersecurity

Network outages, hacking, viruses, malware, phishing, bots, worms, bombs – the list of cyber threats changes as fast as technology. With the number of mobile users, digital applications, and data networks on the rise, so are opportunities for exploitation.

Our fully online master’s degree in Information Technology includes an optional concentration in Cybersecurity that offers leading-edge skills that are in high demand. Cyberattacks often lead to revenue losses, reputation damage, regulatory fines, litigation, increased costs of cybersecurity protection, vulnerabilities to competitors, or even loss of life in the case of critical national infrastructure breaches.

Our curriculum also provides the knowledge to interact with upper management, finance, logistics, and other critical business functions. You’ll learn that cybersecurity encompasses a vast array of skills that span network services, software development, risk management, IT governance, disaster recovery & business continuity, supply chain management, database modeling & administration, computer forensics, and procurement.

Our program is:

  • Convenient – study when and where you want; it’s 100% Online.
  • Fast-paced – earn your graduate certificate in 1 year or your master’s in under 2 years.
  • Collaborative – learn beside professionals from the largest companies in the region.
  • Relevant – cybersecurity is one of the fastest growing professions.

Core Courses (21 credit hours)

INT 6113 – Database Modeling and Administration

INT 6123 – Systems Analysis and Design

INT 6143 – Enterprise IT Infrastructure

INT 7213 – Business Analytics & Intelligence

INT 7223 – Enterprise Systems Security

INT 7593 – Information Technology Integration

MBA 7063 – Project Management

Concentration Courses (9 credit hours)

INT 7233 – Advanced Network Security

Network Security course introduces the principles of computer and information security. Computers, mobile devices and computer networks are increasingly being used for storing and retrieving information. Information is an important asset to anyone who is using technology on daily basis. Sensitive information being exchanged through networks or stored in the cloud raises a lot of concerns. Consequently we need to have adequate security measures that can safeguard sensitive information and network. In this course, we will begin by investigating some of the security measures that can be employed to safeguard information. Cryptographic algorithms used to encrypt and decrypt the information going through the network. SSL protocol and how we can set it up for e-commerce websites. We will identify all the possible attacks and countermeasures on wired, wireless and cellular networks. Also our goal is to analyze privacy and security issues in mobile devices and cellular networks on application and network layer. During this course we will focus on the information security on both operating systems, Windows and Linux. Hands-on experience as a network administrator on Windows and Linux machine will be our goal. Virtual machine is another topic that we will cover during this course.

INT 7243 – Disaster Recovery and Business Cont.

Many organizations that encounter an unplanned outage can tolerate only a short amount of downtime before they experience a significant revenue loss or other adverse business impact. In the event of a security breach or natural disaster that halts day-to-day operations, organizations need to recover as quickly as possible. Not having a disaster recovery plan in place can put the organization at risk of significant financial costs, reputation loss, and unintended consequences to customers. This course prepares students to lead an organization’s disaster recovery and business continuity program development. Students will learn how to develop, implement, and evaluate a disaster recovery and business continuity program based on established industry standards. Program components include incident response, technical recovery, crisis management, work area recovery, and pandemic plans. Student will learn how to mitigate risk, protect vital records, data, human resources, physical assets, and communicate to managers, employees, customers, suppliers, regulators, and legal throughout an unplanned event.

INT 7263 – Threats, Vulnerabilities, Security Controls, and Countermeasures

This course requires students to develop, design, and test products/processes as part of a team. Professional skills/attributes such as oral and written communication, innovation, engineering standards, constraints, sustainability, and professional ethics are addressed. Student project teams work closely with a faculty advisor to meet project objectives.