Call us Now: 1-866-827-8467
ADVANCE > INQUIRE NOW

Cybersecurity

Master of Science Degree

Compromised data, threats of malicious intruders and resulting outages are costing organizations millions. Professionals who can develop innovative policies and practices to project against attacks are in high demand. The Master of Science degree prepares you to be a leader with the knowledge and skills to recommend and implement solutions that safeguard an organization's information and technology assets.

Interested in this degree?  Start Here

Courses in the major include:

This course is designed as an overview of the investigative methods and tools associated with computer forensics. Topics include: processing crime and incident scenes, digital evidence controls, recovery of information, network forensics, data acquisition, and legal and ethical issues associated with investigations.
This course addresses the issues relating to successful information security management. Topics include access control systems, network and software security, management practices, risk management, protection mechanisms, business continuity planning, and legal and ethical issues. The course allows for analysis of current security management models.
This course presents an examination of effective security methodologies based on comprehensive assessment of threats and implementation of a layered system of physical and electronic protection. Threat identification, countermeasures, and prevention are explored.
This course provides an introduction to the fundamental components of security architecture. Topics include computer organization; hardware, software and firmware components; open and distributed systems; and protection mechanisms. Discussion also includes certification and accreditation; formal security models; and evaluation criteria. Assigned projects include designing a model secure system.
This course provides an exploration of the human aspects of Cybersecurity. Topics include human behavior and interaction, motivation and influence, and social engineering. Emphasis on the human element of cyber incidents in relation to protecting information and technology assets.
This course provides a technical study of offensive and defensive techniques for protecting cyber assets. Topics include security testing, risk mitigation techniques, and threat response. Discussion also includes penetration testing theory, techniques, and tools; network, systems, and application vulnerability scanning; risk analysis and response; and intrusion detection and response. Emphasis is placed on identification of system vulnerabilities and threats and techniques for preventing attacks.
This course provides an exploration of how organizations manage risks to information technology assets. Discussion includes the application of methodologies and models for managing such risks. Topics also include recognition of security threats and vulnerabilities and the analysis of associated risks. A systematic approach for acquiring and analyzing information to support decision-making in the protection of assets and the allocation of security resources is presented.
This course explores the concepts of governance and how it applies to information systems. Discussion includes the importance of compliance with laws, regulations, policies, and procedures as a means of minimizing risk through mandated security and control measures. Through this course, students also gain an understanding of Information Technology (IT) Auditing processes and principles.
This course presents an in-depth study of current trends in Cybersecurity threats. Discussion includes the identification and management of threats and vulnerabilities within an effective enterprise security program. Prior Cybersecurity education is synthesized through projects and assignments. Prerequisite: Recommend CYBR 515

Bellevue University Ranked Top 20 Master's Degrees

  • Business Analytics
  • Cybersecurity
  • Project Management

– Online Course Report 2017-2018

Inquire Now »

Looking for a Bachelor's degree?

Click Here

© Bellevue University. All rights reserved. | Privacy | Terms of Use | Accreditation | Consumer Information