Skip to main content

M.S. Business Cybersecurity Management


Students will complete ten courses (30 credit hours). Courses will include the following subject matter:

  • Foundations for an understanding of Business Data Analytics, giving an overview of the field by covering key concepts including: foundations and technologies of business decision making, data mining, data warehousing, visual analytics, predictive modeling, text analytics, text mining, sentiment analysis, web analytics, business intelligence decision modeling techniques and solutions, expert systems, knowledge management and future technologies.
  • Understanding of database design concepts and logic, including data modeling, database design, and the logic of database queries. In order to analyze data, one must be able to access, organize and query databases. The course focuses on relational databases and queries, but also includes object-oriented databases, large volume databases, database performance, scalability and live streaming considerations. 
  • Learn effective leadership solutions related to the management of security risks and cyber threats in private and public sector organizations including the topics of risk analysis, security controls, risk exposure, risk transfer, quantification of risk such as annualized loss expectancy, attention to insider threat risk identification and reduction, the security auditing role, IT security governance, and security policy management.  Computer assisted audit tools will be introduced, and aspects of robust electronic commerce funds transfer mechanisms and security. 
  • Overview of corporate data communications networks, the TCP/IP model and related technologies of the data communications corporate infrastructure as well as a survey of the essential tools and strategies for the management of secure, effective business networks. Students will understand key concepts related to optimal, cost effective network architectures, network hardware, and network applications deployment. Requests for Proposal, Service Level Agreements, vendor contracts, issues of web hosting management will be covered.  Students will be encouraged to take and pass the Network+ Certification.  
  • Managerial and technical aspects of information security in corporate and organizational networks. The course covers security issues in information systems, software development, data center design, disaster recovery planning, business impact analysis, business continuity planning, security technologies, implementation, and security strategy.  Malware, attack vectors, threats and vulnerabilities will be discussed, along with coverage of the tools required to deliver confidentiality, integrity, authentication, non-repudiation and availability.  A variety of cryptographic techniques are included here, along with coverage of effective administration of business security operations.  Students will be encouraged to take and pass either the Security +, ISC2 SSCP, or the GIAC certifications (Security Leadership, Systems and Network Auditor or Information Security Professional certifications).  
  • Information ethics, including such topics as privacy protection and control, surveillance, link analysis, personally identifiable data, sensitive data, data anonymity, data privacy, data accessibility, data sharing, censorship, intellectual property, accuracy, virtual reality and artificial intelligence. Includes legal procedures and US and foreign laws of data collection and storage, security and law enforcement investigations, as well as compliance management for government, publicly held corporations and the healthcare industry sectors (laws of e-Discovery, compliance for SOX, HIPAA, Gramm-Leach-Bliley Act, CIPA, etc.).  
  • Managerial skills to manage, protect, defend, and audit the security of information systems through hands-on vulnerability assessments, statistical analysis, and risk-based decision making. Students will learn to explain Blue Team / Red Team test plans and will work in the virtual lab space to perform independent testing of safety and mission-critical software systems to ensure that systems will not malfunction and will respond in the desired way under adverse circumstances. Be able to plan, execute, upgrade, and monitor various security controls such as ACLs for the protection of computer networks and information.   
  • Computer-aided data analysis techniques for detecting and investigating fraud cases, issues related to the collection and use of digital evidence, and collection of data from electronic devices. 
  • Data and information visualization, including both theoretical and practical aspects. In addition to basic visualization techniques, the course covers the application of multivariate techniques in an environment that includes large data sets. Students are involved in both the creation of visualizations, as well as their interpretation. 
  • Experiential learning opportunities through which students can sharpen their Business Cybersecurity skills through teamwork, professional communication, problem solving, and engagement with a real world business cyber problem.  Project work will include working with a client organization to provide an analysis, data collection and recommended solution to a cybersecurity business problem.  Involves temporary placement with public or private enterprise for professional competence development.