Master of Science - Information and Cyber Security
Total Degree Requirements 36 SH
Code | Title | SHs |
---|---|---|
Degree Requirements | ||
MSCC 610 | Information Technology Concepts | 3.00 |
MSCC 630 | Enterprise Architecture | 3.00 |
MSCC 697 | Information Technology Research Methods | 3.00 |
MSIA 672 | Managing a Secure Enterprise | 3.00 |
MSIA 678 | Risk Management | 3.00 |
Specialization | ||
Select 18 semester hours from one of the following specializations: | 18.00 | |
Cyber Security Specialization 1 | ||
Advancing to Cyber Security | ||
Offensive Cyber Security | ||
Computer Forensics | ||
Select three of the following: | ||
Legal Basics-Cyber/ Information Security | ||
Network Forensics | ||
Advanced Forensics | ||
Malware Analysis and Response | ||
Information Assurance Policy Management Specialization 2 | ||
Enterprise Information Assurance | ||
Legal Basics-Cyber/ Information Security | ||
Planning/Implementing Architecture Sec | ||
Advancing to Cyber Security | ||
IT Auditing | ||
600-Level MSIA elective course | ||
Degree Completion Requirement | ||
Select three of the following: | 3.00 | |
Graduate Capstone | ||
Graduate Thesis | ||
Information Assurance Practicum I | ||
Information Assurance Practicum II | ||
Total SHs | 36 |
The MS in Information and Cyber Security Program outcomes are designed to help students desiring to change or enhance their career to build a body of knowledge that will enable them to take on entry-level and potentially leadership positions either in the management of strategic or tactical cybersecurity operations or information assurance policy. Outcomes span leadership, ethical decision-making, critical thinking, and the maintenance of technological competency. The outcomes were designed to fully support the Regis Nine objectives.
- Demonstrate an ability to explain, analyze and evaluate the Information Assurance domain knowledge contained in the National Initiative for Cyber Security Education.
- Critically apply the use of current tools that support policy management and cybersecurity applications for Enterprise Information Assurance.
- Analyze and design information assurance architectures and security frameworks for compliance with regulatory organizational requirements.
- Implement and evaluate Information Assurance technology solutions for enterprise systems.
- Evaluate the impact of operational security technologies for their effectiveness, maintenance and sustainability to support the requirements of an organization.
- Demonstrate the ability to maintain technological competence in the face of rapid changes in Information Assurance and the domain of information technology systems.