Skip to content

Online Master of Science in Cybersecurity Curriculum

Curriculum Details

30 Total Credits Required

You will take 10 courses while earning your Master of Science in Cybersecurity online at Concordia University, St. Paul. Specialized cybersecurity coursework explores topics in auditing and compliance, identity and access management, incident detection, intrusion analysis, security policies, security training, tactical intelligence, and more.

Although you can complete the program in 18 months, your eligible transfer credits could affect the time it takes you to finish. You can transfer up to 15 credits to the online Master of Science in Cybersecurity program.

Required Courses

Credits

This course introduces strategic and operational planning for the application of information systems with heavy emphasis on the alignment of information strategy to business strategy. An introduction to the four schools of strategic thought and how they relate to strategic planning and decision-making is identified. A review of the application of strategic models for the purpose of deploying corporate strategy is explored and is married into how technology enablement supports those strategic decisions.
This course explores real-world information technology dilemmas and frameworks to identify ethical problems and reach ethical decisions. Its objective is to us these skills, grounded in ethical theory, to make informed decisions within fast-paced and emerging business environments.
As part of a research project identify the critical role I.T. plays in organizational development. This course will explore how to employ action learning to improve the competitiveness of the organization. Defining IT challenges from an operational and strategic perspective the class will explore adaptive learning technique by offering proven educational theories and practices to foster the required changes in your staff. Research of existing organizational learning theories and the historical problems that occur with companies will be conducted to understand how to research these issues and provide solutions for technology enablement of the business.
This course identifies how to deliver on new ideas and strategies by practicing traditional and agile methodologies and processes that help bring new products and services to the market. It builds on differing strategic approaches and project management techniques to manage innovation so that competitive strategy and new ideas can be realized. An understanding of the DevOps model that facilitates an effective organization and how it relates to delivering new products and how to leverage it will be explored.

This course integrates knowledge learned throughout the program. Demonstrate an understanding of technology management obtained by completing a research paper addressing an issue in an industry supported by technology. Ethically incorporate technical and business knowledge skills through identifying key issues by doing a thorough search of academic and practitioner knowledge to support a stated thesis. This course draws upon current work, training or internship experience.

Learn how companies manage risk across their organizations utilizing audit and compliance methods to support regulatory/legal compliance to meet their business objectives. Identify how they use mechanisms such as Vendor Information Security Risk Assessments (VISRA), App Monitoring and Logging, Cloud Governance and Risk Remediation strategies to meet Compliance objectives. Examine how Policy Development and Management helps govern a best-in-class whole security solutions for an organization.

Examine how companies use Identity and Access Management to protect the assets of their company. Learn how Firewalls are managed by understanding how they work and how requests for changes in Firewall rules are executed. Determine how Security operations support enterprise networks.

Examine how incident detection is coordinated, how they are analyzed and contained plus how incidents are mitigated and recovered. Learn how incident trends are used to determine better security strategies to thwart future incidents. Explore what technologies are used to scan enterprise environments, how vulnerabilities are discovered and how those vulnerabilities are remediated thru incident response and Patch Management. Learn about what Insider threats exist in organizations and how they are managed thru Security and Privacy Training, Compliance and Ethics Policies plus Intruder detection technologies.

Understand how Malware and Intrusion Analysis is conducted. Learn how security groups monitor daily events in their network and the countermeasures that are taken to combat Cyber-attacks and bad actors. Learn how tactical intelligence coordination is conducted plus how Forensic Investigations are done to determine enterprise attacks and vulnerabilities.

Examine how all the Security Services work together for overall protection of an organization. Understand how Security Departments engage the organization thru security services such as Security Communications, Resource Management, Product Management, Security Metrics and Reporting and Security Business Analysis.

Request More Information

By filling out the form, you’ll:

  • Gain access to a dedicated enrollment counselor who is ready to answer all of your questions.
  • Take one more step towards achieving your career goals.

Fill out the form to receive more information!