The Social and Behavioral Sciences programs are designed for people with a passion for making a difference in the lives of others.
Whether you are on your way up the corporate ladder or just getting started, our business degree programs and certificates could help you prepare to take your business career to a higher level.
Whether you want to enter the field of criminal justice or need credentials to advance your career, Kaplan University's criminal justice degree programs are designed to help you achieve your goal.
Our degree programs and certificates could help prepare you to teach diverse learners a broad range of academic content and educational foundations.
Our comprehensive fire science programs offer the flexibility of online learning, ideal for individuals in the fire science and emergency management fields who may work inconsistent hours.
You could acquire real-world knowledge and practical skills and prepare for a career in the health care industry by earning a health sciences degree, diploma, or certificate.
Our programs in legal studies, paralegal studies, and environmental policy are designed to fit your educational goals.
Our nursing degree and certificate programs are taught by practicing professionals who are dedicated to helping you prepare for real-world challenges in nursing.
Kaplan University's IT programs are designed to prepare you with the knowledge and skills you need to start or advance your technology career.
Kaplan University offers over 180 degree and certificate programs all available to military, veterans, and spouses of active duty members. In addition, several programs have been developed to complement specific military occupations or programs established by the military.
The Kaplan University School of General Education courses support the academic, social, personal, and professional development of learners throughout their engagement with the University.
Open College at Kaplan University (OC@KU) offers individualized, affordable education that integrates technology and personalized service to help learners meet their career, academic, and personal goals.
Offering the flexibility of online education and support for military students.
Every day, talented individuals are proving it's never too late to think about the future.
Learn more about becoming an international student at US-based and accredited Kaplan University.
Learn about transferring your previously earned college credits to Kaplan University.
We have partnered with many employers and educational institutions to provide their employees and students with education opportunities.
Corporate and Academic Partners
Kaplan University is dedicated to the support, engagement, and involvement of our graduates.
Resources for current Kaplan University students.
We have 15 ground locations across the country. Explore our locations to see if we're in your neighborhood.
Learning Center Experience
As information security breaches, cyberattacks, and online threats continue to make news around the world, organizations are looking for qualified executives with an advanced degree and experience in the field to lead the development of critical infrastructures. In fact, employment of information systems managers is projected to grow by 15% from 2014 to 2024.*
Kaplan University's master's degree program is designed to prepare you for leadership roles directing and protecting critical information infrastructures. You'll study how to develop, implement, evaluate, and update the security policies and practices that help organizations respond effectively to cyber attacks. As a graduate, you could be skilled in the management of information continuity, asset clarification and control, compliance management, incident response, and secure administration of information systems.
Program outcomes for this degree include:
Access gainful employment information, including program length, tuition costs, financing options, and success rates.
Courses within the Master of Science in Cybersecurity Management could help students develop the following skills:
Earning your online master's degree in cybersecurity at Kaplan University may help you develop valuable skills that are applicable to a broad range of positions across the field, including†:
Kaplan University offers multiple start dates, giving you greater flexibility with your education, life, and work schedules.
Online Start Date
May 31, 2017
Online Start Date
Jul 12, 2017
Online Start Date
Aug 30, 2017
These sequencing guides are examples of how a degree plan will be mapped based on the number of classes you take per term. The guides can be used to help you when planning your schedule each term. We hope you find these resources useful in your academic planning and recommend that you share your goals with your Education Advisor upon enrollment.
This course helps you develop effective academic writing skills and the ability to synthesize, evaluate, and discuss a variety of information technology concepts. The course emphasizes accurate grammar and standard punctuation, as well as the appropriate application of American Psychological Association (APA) style guidelines to produce logically structured academic papers that integrate refereed sources into the supporting arguments. You will achieve a comprehensive approach to graduate-level writing and research.
Total Program Credits: 60
This course is intended to equip you with foundational skills in data analytics. These skills include problem/question definition, data identification and preparation, statistical and/or logical modeling, and evaluation and deployment. Both categorization and prediction modeling are covered, along with methods for selecting the most appropriate methods for a given question and data set. The course uses industry-standard software to enable you to learn analytical approaches such as linear and logistic regression, association rules, decision trees, k-Nearest Neighbors and k-means clustering, discriminant analysis, and other useful analytic techniques.
This course teaches you methodologies for using data analytics to detect, identify, and mitigate risk in a variety of forms. A variety of different quantitative risk assessment techniques are presented, including Failure Mode and Effects Analysis, fault tree analysis, expected payoffs, decision trees, and more. The case method is utilized to show real-world applications in finance, engineering, project management, loss/theft, loans, and fraud. The course will focus on formal risk processes. Issues of risk analysis ethics will also be included.
This course introduces data communications and
networking technologies from the business perspective by heavily
utilizing case studies and the decision-making process. Topics
consist of network operating systems, local and wide area
networks, and voice and wireless networks, as well as security
and the Internet. The focus will be on practical applications of
these concepts, including support issues, administration, and
IT 513 or GB 512
This course provides an overview of cybersecurity concepts including data confidentiality, integrity, and availability, and an understanding of systems and applications software necessary for foundational understanding of cybersecurity. You will examine methods for network situational awareness and dynamic decision-making for predicting and assessing the impact of various cyber-attacks. Aspects of cyber-strong organizational structures and mitigation are emphasized. The course will also cover various risk assessment methodologies necessary for understanding cyber risk, organizational preparedness and gap areas, and identifying improvement processes for an organization’s decision makers.
IT professionals must focus on a wide range of
security-related issues and develop security systems that address
constantly changing threats. This course takes the approach that
security components and business functions work in tandem. Topics
like asset identification, human factors, compliance with
regulations, personnel security, risk assessment, and ethical
considerations are covered, as well as computer and network
security tools and methods.
In today's world, protection of data is
serious business. This course explains the concepts and
techniques involved in keeping computers and networks secure. The
course examines fundamentals such as viruses, worms, and other
malicious software; authentication and encryption security; file
security and shared resources; firewalls and border security; and
physical and network topology security.
An ethical hacker is a security expert who attacks a system on behalf of the system's owners. This course focuses on discovering network vulnerabilities that a malicious hacker can exploit. The course explores penetration testing, footprinting and social engineering, scanning and enumeration, operating system weaknesses, and the methods used to hack Web servers and wireless networks. You will perform hands-on projects using state-of-art hacking tools and techniques.
In this course you will appraise platform/operating system software configuration strategies and techniques as related to cybersecurity. You will examine secure application development techniques and the role of application security throughout the software development life cycle (SDLC). This course will also include strategies and techniques for securing data at rest and in motion.
This course examines strategies for managing the administration of wireless, mobile, cloud, and disruptive technological environments, such as social networking and the Internet of Things, in the context of cybersecurity.
This course explores the expertise required to conduct digital forensic investigations. Topics include investigation methods, problem-solving techniques, current forensics analysis tools, digital evidence acquisition and control, and impact of ongoing technological changes on digital forensics. Student projects include scenario-based investigations in investigating cybersecurity breaches. This course explores the expertise required to conduct digital forensic investigations. Topics include investigation methods, problem-solving techniques, current forensics analysis tools, digital evidence acquisition and control, and impact of ongoing technological changes on digital forensics. Student projects include scenario-based investigations in investigating cybersecurity breaches.
This course provides a detailed discussion of
the legal and ethical issues associated with the information
technology age. Topics covered in this course include: ethical
theories related to information technology, protection of
intellectual property, privacy, computer and network security,
cybercrimes, and ethical behavior for working in the computer
IT 513 or GB 512
In this course you will appraise all standards and information technology (IT) security audit processes, evaluate security controls, and examine governance of compliance and control responsibilities. Most organizations are required to comply with IT security regulations and/or standards resulting from the establishment of the Sarbanes-Oxley Act, General Computing Controls, the Gramm–Leach–Bliley Act (GLBA), the Federal Information Security Management Act (FISMA), and the Payment Card Industry Data Security Standard (PCI DSS), and you will become familiar with these standards and regulations.
This course introduces you to budgetary and financial decision-making tools applicable to an organization’s cybersecurity strategy. Effective use of these decision-making tools will enable future information technology (IT) security leaders to justify resources needed to secure an organization’s information/data resources.
The Master’s Capstone in Cybersecurity Management synthesizes knowledge gained throughout all courses in the degree plan, and its comprehensive research project demonstrates the student's mastery of this knowledge. The project will address a cybersecurity problem in either the research community or industry, and will indicate what the student now offers to industry, upon completion of this program.
The 25% tuition reduction applies only to international students living outside of the United States. This discount does not apply to military students. Please check with your advisor to see if you are eligible.
Cost Per Credit
Number of Credits / Terms
Online & Learning Center
Some programs have additional associated fees that are not included in the price of tuition. Click here or check with an Admissions Advisor for more information.
Maine residents interested in enrolling in an online program: click here for tuition and fee information.
Learn More about Kaplan University Tuition and Fees
Kaplan University Learning Center students will only complete a portion of their program on site. You will need to complete at least 50% of the program requirements online, or through transfer credit awarded via prior learning assessment. If you have any questions about these requirements, please speak with an Admissions Advisor. Not all programs are available for enrollment at the Kaplan University Learning Center.
Learn more about grants and Kaplan University Scholarships that may help reduce the cost of your education.
Kaplan University tuition reductions (including military servicemember, spouse, and veterans tuition rates; scholarships; grants; vouchers; and alumni and alliance reductions) cannot be combined.
Kaplan University has significantly reduced many of our tuition rates and fees for servicemembers, their spouses, and veterans. Click here for more information.
* Source: U.S. Department of Labor, Bureau of Labor Statistics, Occupational Outlook Handbook, 2016-2017 Edition, Computer and Information Systems Managers, www.bls.gov/ooh/management/computer-and-information-systems-managers.htm. National long-term projections may not reflect local and/or short-term economic or job conditions, and do not guarantee actual job growth.
† Kaplan University cannot guarantee employment or career advancement.
KU Facebook Page
KU Twitter Page
KU YouTube Channel
KU Google+ Page
KU LinkedIn Page
KU Pinterest Page
KU Instagram Page
Registered User Login
Student Consumer Information
LEARNING AT KAPLAN UNIVERSITY