As information security breaches, cyberattacks, and online threats continue to make news around the world, organizations are looking for qualified executives with an advanced degree and experience in the field to lead the development of critical infrastructures. In fact, employment of information systems managers is projected to grow by 15% from 2014 to 2024.*
Kaplan University's master's degree program is designed to prepare you for leadership roles directing and protecting critical information infrastructures. You'll study how to develop, implement, evaluate, and update the security policies and practices that help organizations respond effectively to cyber attacks. As a graduate, you could be skilled in the management of information continuity, asset clarification and control, compliance management, incident response, and secure administration of information systems.
Program outcomes for this degree include:
Courses within the Master of Science in Cybersecurity Management could help students develop the following skills:
Earning your online master's degree in cybersecurity at Kaplan University may help you develop valuable skills that are applicable to a broad range of positions across the field, including†:
This course helps you develop effective academic writing skills and the ability to synthesize, evaluate, and discuss a variety of information technology concepts. The course emphasizes accurate grammar and standard punctuation, as well as the appropriate application of American Psychological Association (APA) style guidelines to produce logically structured academic papers that integrate refereed sources into the supporting arguments. You will achieve a comprehensive approach to graduate-level writing and research.
4
None
This course is intended to equip you with foundational skills in data analytics. These skills include problem/question definition, data identification and preparation, statistical and/or logical modeling, and evaluation and deployment. Both categorization and prediction modeling are covered, along with methods for selecting the most appropriate methods for a given question and data set. The course uses industry-standard software to enable you to learn analytical approaches such as linear and logistic regression, association rules, decision trees, k-Nearest Neighbors and k-means clustering, discriminant analysis, and other useful analytic techniques.
4
None
This course teaches you methodologies for using data analytics to detect, identify, and mitigate risk in a variety of forms. A variety of different quantitative risk assessment techniques are presented, including Failure Mode and Effects Analysis, fault tree analysis, expected payoffs, decision trees, and more. The case method is utilized to show real-world applications in finance, engineering, project management, loss/theft, loans, and fraud. The course will focus on formal risk processes. Issues of risk analysis ethics will also be included.
4
IT 527
This course introduces data communications and networking technologies from the business perspective by heavily utilizing case studies and the decision-making process. Topics consist of network operating systems, local and wide area networks, and voice and wireless networks, as well as security and the Internet. The focus will be on practical applications of these concepts, including support issues, administration, and management.
4
IT 513 or GB 512
This course provides an overview of cybersecurity concepts including data confidentiality, integrity, and availability, and an understanding of systems and applications software necessary for foundational understanding of cybersecurity. You will examine methods for network situational awareness and dynamic decision-making for predicting and assessing the impact of various cyber-attacks. Aspects of cyber-strong organizational structures and mitigation are emphasized. The course will also cover various risk assessment methodologies necessary for understanding cyber risk, organizational preparedness and gap areas, and identifying improvement processes for an organization’s decision makers.
4
IT 530
IT professionals must focus on a wide range of security-related issues and develop security systems that address constantly changing threats. This course takes the approach that security components and business functions work in tandem. Topics like asset identification, human factors, compliance with regulations, personnel security, risk assessment, and ethical considerations are covered, as well as computer and network security tools and methods.
4
IT 530
In today's world, protection of data is serious business. This course explains the concepts and techniques involved in keeping computers and networks secure. The course examines fundamentals such as viruses, worms, and other malicious software; authentication and encryption security; file security and shared resources; firewalls and border security; and physical and network topology security.
4
IT 540
An ethical hacker is a security expert who attacks a system on behalf of the system's owners. This course focuses on discovering network vulnerabilities that a malicious hacker can exploit. The course explores penetration testing, footprinting and social engineering, scanning and enumeration, operating system weaknesses, and the methods used to hack Web servers and wireless networks. You will perform hands-on projects using state-of-art hacking tools and techniques.
4
IT 541
In this course you will appraise platform/operating system software configuration strategies and techniques as related to cybersecurity. You will examine secure application development techniques and the role of application security throughout the software development life cycle (SDLC). This course will also include strategies and techniques for securing data at rest and in motion.
4
IT 542
This course examines strategies for managing the administration of wireless, mobile, cloud, and disruptive technological environments, such as social networking and the Internet of Things, in the context of cybersecurity.
4
IT 544
This course explores the expertise required to conduct digital forensic investigations. Topics include investigation methods, problem-solving techniques, current forensics analysis tools, digital evidence acquisition and control, and impact of ongoing technological changes on digital forensics. Student projects include scenario-based investigations in investigating cybersecurity breaches. This course explores the expertise required to conduct digital forensic investigations. Topics include investigation methods, problem-solving techniques, current forensics analysis tools, digital evidence acquisition and control, and impact of ongoing technological changes on digital forensics. Student projects include scenario-based investigations in investigating cybersecurity breaches.
4
IT 542
This course provides a detailed discussion of the legal and ethical issues associated with the information technology age. Topics covered in this course include: ethical theories related to information technology, protection of intellectual property, privacy, computer and network security, cybercrimes, and ethical behavior for working in the computer industry.
4
IT 513 or GB 512
In this course you will appraise all standards and information technology (IT) security audit processes, evaluate security controls, and examine governance of compliance and control responsibilities. Most organizations are required to comply with IT security regulations and/or standards resulting from the establishment of the Sarbanes-Oxley Act, General Computing Controls, the Gramm–Leach–Bliley Act (GLBA), the Federal Information Security Management Act (FISMA), and the Payment Card Industry Data Security Standard (PCI DSS), and you will become familiar with these standards and regulations.
4
IT 545
This course introduces you to budgetary and financial decision-making tools applicable to an organization’s cybersecurity strategy. Effective use of these decision-making tools will enable future information technology (IT) security leaders to justify resources needed to secure an organization’s information/data resources.
4
IT 540
The Master’s Capstone in Cybersecurity Management synthesizes knowledge gained throughout all courses in the degree plan, and its comprehensive research project demonstrates the student's mastery of this knowledge. The project will address a cybersecurity problem in either the research community or industry, and will indicate what the student now offers to industry, upon completion of this program.
4
IT 595