Gain IT Management Expertise in the Cyber Security Graduate Program Online
Enhance your expertise in enterprise-level technology management by earning a Master of Science in Cyber Security with a concentration in IT Management. The cyber security graduate program online focuses on network management and security, knowledge management and web fundamentals. With an IT management concentration, you’ll dive deeper into the management of varying aspects of information technology, including the relationships between structure and process in project management and the management of IT functions within an organization. Additionally, you’ll explore enterprise resource planning and the implications of cyber law and ethics.
The online Master of Science in Cyber Security program with an IT management concentration positions you to fill the significant marketplace demand, providing proactive preventive measures to quell the threat of breach and maintain public confidence. You’ll gain a competitive edge in this fast-growing, high-paying industry.
SNHU's MS in Cyber Security IT Management program is recognized by the Professional Science Master's (PSM) national office as a Professional Science Master's program. The PSM is an innovative degree designed to allow students to pursue advanced training in science or mathematics while developing workplace skills valued by employers.
See Yourself Succeed in IT Management
The MS in Cyber Security joins the university’s growing online portfolio of STEM programs. The cyber security graduate program online provides an in-depth learning experience, with a core focus on network management and security, knowledge management and web fundamentals. The cyber security and information assurance component includes information security management, intelligent agents and distributed decision-making, information security and assurance and an introduction to multisensory data fusion.
By electing the three-course IT management concentration, you’ll gain valuable expertise in project management, management of IT functions and resource planning. You’ll also learn to:
- Facilitate best practices for managing information technology functions and interrelationships within an organization relating to organizational process and structure, adoption of new technologies and projects within the IT organizational unit
- Assess the effectiveness of information security governance policies and strategies for planning, preparing and responding to critical threats within diverse organizational contexts and situations in a manner aligned with cyber security standards and frameworks
- Develop risk management plans for conducting risk assessment and managing identified risk to align with the needs of internal and external controls, governing bodies, and vested stakeholders
- Develop strategic information security plans; strategies for establishing policies to guide internal and external influences that are aligned with national and international standards and practices
- Develop information security incident management and business continuity plans aligned with legal, regulatory and organizational standards for appropriately responding to incidents in consideration of diverse demographics
- Employ leadership strategies for ethical behavior, tech standards and emerging trends for advancing an organization’s strategic goals in diverse and multi-functional cyber security teams
- Enhance collaboration and communication by employing interpersonal communication skills and establishing communication plans and processes aligned to the needs of internal and external audiences
As a private, nonprofit university, SNHU has one mission – to help you see yourself succeed. The benefits of enrolling in the cyber security graduate program online at SNHU include:
- Accreditation. Programs are accredited by multiple governing agencies, including the New England Association of Schools and Colleges.
- Affordability. Take advantage of some of the most affordable tuition rates in the nation.
- Convenience. Attend class when it’s convenient for you – online education means 24/7 access.
- Efficiency and flexibility. Complete your graduate degree in as few as 15 months, with two courses per 10-week term.
- Expert instruction. Program development and instruction by well-respected practitioners in the field, with relevant, real-world experience.
- Minimal requirements. No GMAT or GRE required for admission.
- Networking. Tap into our nationwide network of alumni for tips and career opportunities.
- Student support. Count on the ongoing support of dedicated academic and career advisors specialized in your area of study.
Admission Requirements
Acceptance decisions are made on a rolling basis throughout the year for our five graduate terms. You can apply at any time and get a decision within days of submitting all required materials. To apply, simply contact an admission counselor, who can help you explore financial options. Your counselor can also walk you through the application process, which involves completing a graduate application ($40 fee) and providing undergraduate transcripts.
Candidates must also submit a professional resume.
Career Outlook
As cybercrime has grown in frequency and sophistication, the supply of cyber security talent has not been able to keep up with demand. In the U.S. alone, there were an estimated 350,000 unfilled cyber security jobs in 2017.*
The U.S. Bureau of Labor Statistics forecasts 28 percent growth in demand for Information Security Analysts through 2026, a pace much faster than the national average.* SNHU’s online master’s in cyber security prepares you for such roles as chief security officer, information security analyst, cyber security manager or administrator, digital forensics analyst and other highly sought-after positions within the IT security sector.
Curriculum
The 36-credit cyber security graduate program online provides an in-depth learning experience, with a core focus on network management and security, knowledge management and web fundamentals and a strong emphasis on intelligence, computer forensics and cyber operations. The IT management concentration courses will expose you to the best practices in information technology management.
Degree Courses
|
IT
640
Telecommunications and Networking
Telecommunications is a business resource that must be well managed. This includes the technical aspects and the application of telecommunications technology to solve specific business problems and enhance the strategic position of a business enterprise. Topics include the importance of telecommunication in today's business environment, the analysis, design and implementation of telecommunications systems, the scope of the telecommunications industry and current trends; telecommunications hardware, the Open Systems Interconnection (OSI) network model, networking technologies and telecommunications software, protocols and standards.
|
IT
549
Foundation in Information Assurance
This course explores the basic concepts and prepares students with the foundation skills for the protection of networks, communication, and data, as well as the knowledge base for planning, implementing, and managing enterprise level security and system integrity. Topics include approaches in an organization to prevent, detect and recover from the loss of information, cryptography and its applications, security in networks and distributed environments.
|
IT
552
Human Factors in Security
This course examines the human factors present in cyber security related to ethics, integrity, practices, policies and procedures. Students will design information technology security awareness training and optimize information technology organizational factors to foster a healthy security culture within an organization. Additionally, students will recommend mitigation strategies to protect an organization from human behaviors that could potentially cause a security threat.
|
IT
659
Cyberlaw and Ethics
This course addresses ethical and legal issues related to e-commerce and e-business. Students will investigate government approaches to content control and rights, access and jurisdiction regarding personal information, digital property, U.S. and international law, antitrust law, fraud and more.
|
IT
643
Network Assessment and Defense
Explore a broad range of topics from secure network fundamentals, protocols and analysis; threats and vulnerabilities; application, data and host security, access control and identity management. Examine defensive measures to secure an organization's network. Identify overall network security posture and the basic practices in vulnerability assessment.
|
ISE
510
Security Risk Analysis and Planning
This course explores core areas of information security risk and planning, including risk analysis, business continuity, disaster recovery, incident response and security controls. The course will also explore risks as they relate to areas like financial regulations and privacy. Other topics include governance and internal and external partnerships, emerging threats and vulnerabilities, and emerging security capabilities.
|
ISE
620
Incident Detection and Response
This course provides students with the background and skills to manage information security incidents to minimize impact on business operations. Topics include detection, investigation, and response to different types of security incidents. Students explore these topics by developing incidence response plans; utilizing industry-standard processes and tools for investigating information security incidents; and recommending processes for incidence response that adhere to legal, regulatory, and organizational compliance. Students who have completed the course have a comprehensive view of cyber security incident detection and response.
|
ISE
640
Investigation and Digital Forensics
In this course, students learn the theory, practice, and principles of digital forensics through investigation of computer, network, operating system, mobile device and other areas of digital forensics. Topics include identification, collection, acquisition, authentication, preservation, examination, analysis and presentation of digital forensic evidence.
|
IT
510
Advanced Information Technology
This course focuses on the principles and practices underlying the analysis, design, implementation and management of information technology systems. Topics include information system development methodologies, systems planning, requirements analysis, systems implementation, software engineering, project management, and interface, database and process design.
|
IT
550
Management of Information Technology
This course is a detailed introduction to the major issues underlying the successful management of information technology in contemporary organizations. The course covers three major areas: (1) The interrelations between organizational structure and process, and the adoption of new information systems technologies; (2) The actual management of the IT function within the organization; and (3) IT project management which focuses on the operational steps in designing and carrying out specific IT projects. This course will utilize case studies as an introduction to real-world IT management best practices and strategies, and to guide students to understanding the impact of emerging technologies in business contexts.
|
IT
657
Enterprise Resource Planning
This course combines the practice of business management with information technology at the point where technology integrates with fundamental business skills that support business objectives. Students will examine business management best practices and enterprise systems in organizations that support business functions. Emphasis will be placed on how information technology can support and enable integration of technology and business process re-engineering.
|
ISE
690
Cyber Security Capstone
This capstone course integrates previous coursework and practical experience with a focus on authentic demonstration of competencies outlined by the program. Rather than introducing new concepts, students synthesize prior learning to design, develop, and execute an analytics project on their chosen subject as a culmination of their studies. The course is structured around this critical capstone assessment, so that students have the appropriate support and resources required to be successful.
|
For those who do not meet the minimum requirements, the following courses may be required:
|
IT
505
Core Technologies
This course familiarizes students with the basic concepts of information systems to strengthen their knowledge of hardware and software systems, including supporting information technology infrastructures. Students will gain an understanding of the application of fundamental information technology competencies related to computer networks, software and delivery systems for delivering products and service within an enterprise to customers, suppliers and clients. Additionally, students examine the skills and dispositions that shape their professional identities.
|
Program Outcomes
- Facilitate best practices for managing information technology functions and interrelationships within an organization relating to organizational process and structure; adoption of new technologies; and projects within the IT organizational unit
- Assess the effectiveness of information security governance policies and strategies for planning, preparing, and responding to critical threats within diverse organizational contexts and situations in a manner aligned with cyber security standards and frameworks
- Develop risk management plans for conducting risk assessment and managing identified risk to align with the needs of internal and external controls, governing bodies, and vested stakeholders
- Develop strategic information security plans; strategies for establishing policies to guide internal and external influences that are aligned with national and international standards and practices
- Develop information security incident management and business continuity plans aligned with legal, regulatory, and organizational standards for appropriately responding to incidents in consideration of diverse demographics
- Employ leadership strategies for ethical behavior, tech standards, and emerging trends for advancing an organization's strategic goals in diverse and multi-functional cyber security teams
- Enhance collaboration and communication by employing interpersonal communication skills and establishing communication plans and processes aligned to the needs of internal and external audiences
Minimum Hardware Required Specifications
Component Type |
PC (Windows OS) |
Apple (Mac OS) |
Operating System
|
Windows 7 or newer
|
Mac OS X Snow Leopard (10.6) or newer
|
Memory (RAM)
|
4 GB or higher
|
4 GB or higher
|
Hard Drive
|
100GB or higher
|
100GB or higher
|
Office Suite
|
Office 2010 Professional or newer
|
Office 2011 for Mac
|
Antivirus Software
|
Required for on campus students. Strongly recommended for online students
|
Required for on campus students. Strongly recommended for online students
|
Optional Accessories
|
CD/DVD drive. External hard drive. Extra power cord. Headphones/earbuds
|
CD/DVD drive. External hard drive. Extra power cord. Headphones/earbuds
|
SNHU Purchase Programs
|
Visit Dell
|
Visit Apple |
Notes:
- Laptop or Desktop? Whichever you choose depends on your personal preference and work style though laptops tend to offer more flexibility.
- IMPORTANT NOTE: Chromebooks (Chrome OS) and iPads (iOS) do not meet the minimum requirements for coursework at SNHU, nor does the Microsoft Surface RT. These offer limited functionality and do not work with some course technologies. They are not acceptable as the only device you use for coursework. While these devices are convenient and may be utilized for some course functions they cannot be your primary device.
- Office 365 Pro Plus is available free of charge to all SNHU students and faculty. The Office suite will remain free while you are a student at SNHU. Upon graduation you may convert to a paid subscription if you wish. Terms subject to change at Microsoft's discretion.
- Antivirus software: Check with your ISP as they may offer antivirus software free of charge to subscribers.
- Optional Accessories:
- Many laptops on the market today do not include CD/DVD drives. While SNHU typically does not utilize CD/DVD content, this is a good accessory to have.
- External Hard Drive - it is always a good idea to back up your files and an external hard drive is a great way to do that.
- Extra power cord - if you have a laptop and are frequently on the move, many people find it useful to have a second power cord - one for home and one for your bag.
- Headphones/earbuds - many SNHU courses include audio and video content. These will make viewing and listening easier.
Tuition & Fees
Tuition rates for SNHU's online degree programs are among the lowest in the nation. We offer a 25 percent tuition discount for U.S. service members, both full and part time, and the spouses of those on active duty.
Online Graduate Programs
|
Per Course*
|
Per Credit Hour*
|
Degree/Certificates
|
$1,881 |
$627 |
Degree/Certificates
(U.S. service members, both full and part time, and the spouses of those on active duty)
|
$1,410 |
$470 |
*Tuition Rates are subject to change and are reviewed Annually.
Additional Costs:
$40 Application Fee, $150 Graduation Fee, Course Materials ($ varies by course)
University Accreditation
Southern New Hampshire University is a private, nonprofit institution accredited by the New England Association of Schools and Colleges as well as several other accrediting bodies. More...
*CyberSeek, Cybersecurity Supply/Demand Heat Map, on the Internet, at http://cyberseek.org/heatmap.html (viewed online December, 15, 2017). Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, on the Internet, at https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm (viewed online December 13, 2017). Cited projections may not reflect local and/or short-term economic or job conditions and do not guarantee actual job growth.