Cybersecurity Management Graduate Specialization
Explores complexities involved with the adoption of security technologies, achieving regulatory compliance, and implementing cybersecurity programs to mitigate risks and secure information assets. Program enables professionals to effectively govern cybersecurity in an organization. The courses are aligned with the subject matter covered in ‘in-demand’ cybersecurity certifications of CISM, CRISC, and CISA. Must earn a C grade or higher in each class and maintain an overall cumulative GPA of 3.0.Additional Details
CYSM 6100 FUNDAMENTALS OF CYBERSECURITY TECHNOLOGIES: Examines fundamental cybersecurity technologies needed to ensure protection of critical information systems. Focus is on technical aspects of cybersecurity. Discusses cryptography, operating systems security, application security, and network security. Includes topics of principles of computer security, user authentication, access control, malicious software, denial-of-service attacks, intrusion detection, firewalls and Intrusion.
CYSM 6200 ENTERPRISE INFORMATION SECURITY: Provides understanding to effectively implement the information security vision and strategy set forth by executive management. Emphasis is on cybersecurity management including information security policy and development of a security program. Focuses on establishing security processes, information security standards, risk management (models), business continuity, contingency planning tools, and SETA (security education, training and awareness).
CYSM 6300 CYBERSECURITY GOVERNANCE: Investigates the challenges and opportunities of effectively governing an organization's information security requirements and resources. Cybersecurity governance lays out the vision for the cybersecurity program. Discusses what constitutes good cybersecurity governance, and development of an effective security strategy and policy. Also focuses on how to improve information security accountability and maturity.
CYSM 6400 CYBERSECURITY LAW AND CYBERCRIME: Examines data security and privacy laws and regulations that govern the collection, use, storage, and destruction of sensitive information. Learn about the nature of cybercrime, methods of investigating cybercrime, securing the crime scene, and collecting evidence of cybercrime. Explore the challenges involved with international cooperation in pursuing cybercrime offenders, and problems of enforcement between different international legal systems.