Ivan F.

Master of Science
in Cybersecurity,
Enterprise Cybersecurity
Management

computer icon

4-week
COURSES

calendar icon

Year-round
enrollment

graduation cap icon

230K+ Alumni Worldwide

Overview

The Master of Science in Cybersecurity provides managers and professionals with the knowledge and skills to ensure the security, confidentiality, integrity, authenticity, control, availability and utility of the world’s computing and information systems infrastructure. Core cybersecurity coursework supports the variety of backgrounds (both education and work experience) that students may bring to the program, while the specializations provide for study in particular domains of knowledge within the field.

The Enterprise Cybersecurity Management specialization focuses on programmatic management and governance skills for organizational cybersecurity. In addition to foundational knowledge and tools for securing network, cloud and wireless systems, you’ll learn to assess and manage the vulnerabilities and protections of these IT environments. This specialization focuses on larger organizations (often in government) that have codified standards, policies, and practices for their information systems.

Admission Requirements

All students who seek to enroll in the Master of Science in Cybersecurity program must interview with the appropriate faculty advisor prior to enrolling in the first course of the program.

Course Details

Foundation Courses

For the MS in Cybersecurity with a specialization in Enterprise Cybersecurity Management, you must complete nine foundation courses and four specialization courses.

Course Name

This course examines the fundamental concepts of cybersecurity and the associated technology. Topics of study include: securing the environment, security technologies in the environment, security threats, security responses, and the ethical and legal aspects of cybersecurity.

An introduction to the tools and techniques utilized in cyber defense and offensive cyber operations. Instruction will demonstrate the use of technical tools in virtual lab environments.

An analysis and evaluation of threat modeling and cyber threat intelligence to reduce risk and enhance cybersecurity posture. This course explores the development and use of threat models to identify threats to systems and applications. You’ll also examine methods for collecting and utilizing threat intelligence to identify organizational threats.

A comprehensive overview of wireless and mobile security. Coursework will survey the design, planning, installation, and maintenance of wireless network security infrastructures. Emphasis is placed on information warfare countermeasures relative to government, military, terrorist, rogue, and private enterprise demographics.

An introduction to the concepts of network security monitoring and incident response. This course analyzes and evaluates network security monitoring tools and techniques while also examining methods for conducting incident response.

An introduction to the concepts of cloud computing. Instruction and coursework examine the security implications of the cloud computing environment and the tools and techniques for implementing DevSecOps.

In this first course of a three-part master’s project sequence, you’ll begin creating an original project in your area of specialization using cybersecurity policy, regulatory, and testing frameworks. The project will integrate the concepts of cybersecurity and information assurance taught throughout the program. Throughout the process, project management techniques and collaboration will be emphasized along with ethical and legal aspects. Grading is H, S, or U only.

A continuation of CYB 699B, this is the second course of the three-part master’s project sequence. As you proceed with your specialized project work, you’ll integrate the concepts of cybersecurity and information assurance taught throughout the program. Project management, collaboration, and the legal and ethical aspects of your work will continue to be emphasized. Grading is H, S, or U only.

The final course in the three-part master’s project sequence, this class focuses on completing the original cybersecurity project you’ve worked on throughout CYB 699A and CYB 699B, and then presenting it to a panel for review. Again, project management, collaboration, and ethics will be emphasized throughout your project work. Grading is by H, S, or U only.

Specialization Courses

Course Name

This course explores the legal and regulatory requirements, ethical issues, basic methodology, and technical tools needed to conduct cybersecurity audits and assessments.

In this course, you’ll examine the development of legal and regulatory requirements for cybersecurity policy in commercial and government organizations.

An examination of the functions and processes that implement and monitor cybersecurity controls across an organization. Additionally, this course will also explore commercial and government cybersecurity compliance requirements.

A study of the methods and frameworks for implementing and managing an enterprise cybersecurity program. You’ll explore various frameworks and tools for developing and managing a cybersecurity program in support of an organizational mission.

Learning Outcomes

Students earning the MS in Cybersecurity with an Enterprise Cybersecurity Management specialization will learn to:

  • Prepare an IT risk mitigation and security plan
  • Prepare and create an enterprise disaster-recovery and business-continuity plan
  • Derive information assurance from an InfoSec perspective
  • Differentiate among the models, architectures, challenges and global legal constraints of secure electronic commerce technologies used to ensure transmission, processing, and storage of sensitive information
  • Prescribe how to provide message privacy, integrity, authentication, and non-repudiation using network security practices and infrastructure hardening techniques
  • Assess the relative demands of internet-openness, legislation and law-enforcement, and individual right-to-privacy from a national and global perspective
  • Forecast the impact of advancing technology and national and international cybersecurity legislation on the practice of cybersecurity
  • Practice critical thinking in analyzing and synthesizing enterprise and global cybersecurity issues through both individual and team projects
Program Disclosure

Successful completion and attainment of National University degrees do not lead to automatic or immediate licensure, employment, or certification in any state/country. The University cannot guarantee that any professional organization or business will accept a graduate’s application to sit for any certification, licensure, or related exam for the purpose of professional certification.

Program availability varies by state. Many disciplines, professions, and jobs require disclosure of an individual’s criminal history, and a variety of states require background checks to apply to, or be eligible for, certain certificates, registrations, and licenses. Existence of a criminal history may also subject an individual to denial of an initial application for a certificate, registration, or license and/or result in the revocation or suspension of an existing certificate, registration, or license. Requirements can vary by state, occupation, and/or licensing authority.

NU graduates will be subject to additional requirements on a program, certification/licensure, employment, and state-by-state basis that can include one or more of the following items: internships, practicum experience, additional coursework, exams, tests, drug testing, earning an additional degree, and/or other training/education requirements.

All prospective students are advised to review employment, certification, and/or licensure requirements in their state, and to contact the certification/licensing body of the state and/or country where they intend to obtain certification/licensure to verify that these courses/programs qualify in that state/country, prior to enrolling. Prospective students are also advised to regularly review the state’s/country’s policies and procedures relating to certification/licensure, as those policies are subject to change.

National University degrees do not guarantee employment or salary of any kind. Prospective students are strongly encouraged to review desired job positions to review degrees, education, and/or training required to apply for desired positions. Prospective students should monitor these positions as requirements, salary, and other relevant factors can change over time.