Enhance your expertise in enterprise-level technology management by earning a Master of Science in Cyber Security with a concentration in IT Management. The cyber security graduate program online focuses on network management and security, knowledge management and web fundamentals. With an IT management concentration, you’ll dive deeper into the management of varying aspects of information technology, including the relationships between structure and process in project management and the management of IT functions within an organization. Additionally, you’ll explore enterprise resource planning and the implications of cyber law and ethics.
The online Master of Science in Cyber Security program with an IT management concentration positions you to fill the significant marketplace demand, providing proactive preventive measures to quell the threat of breach and maintain public confidence. You’ll gain a competitive edge in this fast-growing, high-paying industry.
The MS in Cyber Security joins the university’s growing online portfolio of STEM programs. The cyber security graduate program online provides an in-depth learning experience, with a core focus on network management and security, knowledge management and web fundamentals. The cyber security and information assurance component includes information security management, intelligent agents and distributed decision-making, information security and assurance and an introduction to multisensory data fusion.
By electing the three-course IT management concentration, you’ll gain valuable expertise in project management, management of IT functions and resource planning. You’ll also learn to:
As a private, nonprofit university, SNHU has one mission – to help you see yourself succeed. The benefits of enrolling in the cyber security graduate program online at SNHU include:
Acceptance decisions are made on a rolling basis throughout the year for our five graduate terms. You can apply at any time and get a decision within days of submitting all required materials. To apply, simply contact an admission counselor, who can help you explore financial options. Your counselor can also walk you through the application process, which involves completing a graduate application ($40 fee) and providing undergraduate transcripts.
Candidates must also submit a professional resume.
The ever-growing skills of sophisticated hackers have raised the bar for equally skilled cyber security professionals in diverse settings throughout government, military and private sectors worldwide. What's more, the need for those professionals outweighs the number of well-qualified candidates to fill these critical roles.
The U.S. Bureau of Labor Statistics forecasts 37 percent growth in demand for information security analysts through 2022, far above the national average. CIO Journal puts the pace of demand for cyber security experts at 12 times the overall job market, making it one of the most sought-after fields in the country. The cyber security graduate program online at SNHU will give you a solid return on your MS degree investment by preparing you for such roles as chief security officer, information security analyst, cyber security manager or administrator, digital forensics analyst and other positions within the IT security sector.
The 36-credit cyber security graduate program online provides an in-depth learning experience, with a core focus on network management and security, knowledge management and web fundamentals and a strong emphasis on intelligence, computer forensics and cyber operations. The IT management concentration courses will expose you to the best practices in information technology management.
Telecommunications is a business resource that must be well managed. This includes the technical aspects and the application of telecommunications technology to solve specific business problems and enhance the strategic position of a business enterprise. Topics include the importance of telecommunication in today's business environment, the analysis, design and implementation of telecommunications systems, the scope of the telecommunications industry and current trends; telecommunications hardware, the OSI network model, networking technologies and telecommunications software, protocols and standards.
This course explores the basic concepts and prepares students with the foundation skills for the protection of networks, communication, and data, as well as the knowledge base for planning, implementing, and managing enterprise level security and system integrity. Topics include approaches in an organization to prevent, detect and recover from the loss of information, cryptography and its applications, security in networks and distributed environments.
This course examines the human factors present in cyber security related to ethics, integrity, practices, policies and procedures. Students will design information technology security awareness training and optimize information technology organizational factors to foster a healthy security culture within an organization. Additionally, students will recommend mitigation strategies to protect an organization from human behaviors that could potentially cause a security threat.
This course addresses ethical and legal issues related to e-commerce and e-business. Students will investigate government approaches to content control and rights, access and jurisdiction regarding personal information, digital property, U.S. and international law, antitrust law, fraud and more.
This course covers the fundamental skills and knowledge in evaluating internal and external threats to network security and design. It includes a broad range of topics from secure network fundamentals, protocols and analysis; threats and vulnerabilities; application, data and host security, access control and identity management. Students who have completed the course will have a full understanding of defensive measures taken to secure their organization's network along with the proper knowledge necessary to comprehend overall network security posture and the basic practices in vulnerability assessment. This course is Lab Intensive.
This course explores core areas of information security risk and planning, including risk analysis, business continuity, disaster recovery, incident response and security controls. The course will also explore risks as they relate to areas like financial regulations and privacy. Other topics include governance and internal and external partnerships, emerging threats and vulnerabilities, and emerging security capabilities.
This course provides students with the background and skills to manage information security incidents to minimize impact on business operations. Topics include detection, investigation, and response to different types of security incidents. Students explore these topics by developing incidence response plans; utilizing industry-standard processes and tools for investigating information security incidents; and recommending processes for incidence response that adhere to legal, regulatory, and organizational compliance. Students who have completed the course have a comprehensive view of cyber security incident detection and response.
In this course, students learn the theory, practice, and principles of digital forensics through investigation of computer, network, operating system, mobile device and other areas of digital forensics. Topics include identification, collection, acquisition, authentication, preservation, examination, analysis and presentation of digital forensic evidence.
This course focuses on the principles and practices underlying the analysis, design, implementation and management of information technology systems. Topics include information system development methodologies, systems planning, requirements analysis, systems implementation, software engineering, project management, and interface, database and process design.
This course is a detailed introduction to the major issues underlying the successful management of information technology in contemporary organizations. The course covers three major areas: (1) The interrelations between organizational structure and process, and the adoption of new information systems technologies; (2) The actual management of the IT function within the organization; and (3) IT project management which focuses on the operational steps in designing and carrying out specific IT projects. This course will utilize case studies as an introduction to real-world IT management best practices and strategies, and to guide students to understanding the impact of emerging technologies in business contexts.
This course combines the practice of business management with information technology at the point where technology integrates with fundamental business skills that support business objectives. Students will examine business management best practices and enterprise systems in organizations that support business functions. Emphasis will be placed on how information technology can support and enable integration of technology and business process re-engineering.
This capstone course integrates previous coursework and practical experience with a focus on authentic demonstration of competencies outlined by the program. Rather than introducing new concepts, students will synthesize prior learning to design, develop, and execute an analytics project on their chosen subject as a culmination of their studies. The course will be structured around this critical capstone assessment, so that students have the appropriate support and resources required to be successful.
For those who do not meet the minimum requirements, the following courses may be required:
This course familiarizes students with the basic concepts of information systems to strengthen their knowledge of hardware and software systems, including supporting information technology infrastructures. Students will gain an understanding of the application of fundamental information technology competencies related to computer networks, software and delivery systems for delivering products and service within an enterprise to customers, suppliers and clients. Additionally, students examine the skills and dispositions that shape their professional identities.
CD/DVD drive. External hard drive. Extra power cord. Headphones/earbuds
Tuition rates for SNHU's online degree programs are among the lowest in the nation. We offer a 30 percent tuition discount for active-duty service members and their spouses.
Application Fee ($40), Graduation Fee ($150), Books (course-by-course)
Southern New Hampshire University is a private, nonprofit institution accredited by the New England Association of Schools and Colleges as well as several other accrediting bodies. More...