Master of Science - Information and Cyber Security
Total Degree Requirements 36 SH
| Code | Title | SHs |
|---|---|---|
| Degree Requirements | ||
| MSCC 610 | Information Technology Concepts | 3.00 |
| MSCC 630 | Enterprise Architecture | 3.00 |
| MSCC 697 | Information Technology Research Methods | 3.00 |
| MSIA 672 | Managing a Secure Enterprise | 3.00 |
| MSIA 678 | Risk Management | 3.00 |
| Specialization | ||
| Select 18 semester hours from one of the following specializations: | 18.00 | |
| Cyber Security Specialization 1 | ||
| Advancing to Cyber Security | ||
| Offensive Cyber Security | ||
| Computer Forensics | ||
Select three of the following: | ||
| Legal Basics-Cyber/ Information Security | ||
| Network Forensics | ||
| Advanced Forensics | ||
| Malware Analysis and Response | ||
| Information Assurance Policy Management Specialization 2 | ||
| Enterprise Information Assurance | ||
| Legal Basics-Cyber/ Information Security | ||
| Planning/Implementing Architecture Sec | ||
| Advancing to Cyber Security | ||
| IT Auditing | ||
600-Level MSIA elective course | ||
| Degree Completion Requirement | ||
| Select three of the following: | 3.00 | |
| Graduate Capstone | ||
| Graduate Thesis | ||
| Information Assurance Practicum I | ||
| Information Assurance Practicum II | ||
| Total SHs | 36 | |
The MS in Information and Cyber Security Program outcomes are designed to help students desiring to change or enhance their career to build a body of knowledge that will enable them to take on entry-level and potentially leadership positions either in the management of strategic or tactical cybersecurity operations or information assurance policy. Outcomes span leadership, ethical decision-making, critical thinking, and the maintenance of technological competency. The outcomes were designed to fully support the Regis Nine objectives.
- Demonstrate an ability to explain, analyze and evaluate the Information Assurance domain knowledge contained in the National Initiative for Cyber Security Education.
- Critically apply the use of current tools that support policy management and cybersecurity applications for Enterprise Information Assurance.
- Analyze and design information assurance architectures and security frameworks for compliance with regulatory organizational requirements.
- Implement and evaluate Information Assurance technology solutions for enterprise systems.
- Evaluate the impact of operational security technologies for their effectiveness, maintenance and sustainability to support the requirements of an organization.
- Demonstrate the ability to maintain technological competence in the face of rapid changes in Information Assurance and the domain of information technology systems.