Master of Science in Cybersecurity Management

As information security breaches, cyberattacks, and online threats continue to make news around the world, organizations are looking for qualified executives with an advanced degree and experience in the field to lead the development of critical infrastructures. In fact, employment of information systems managers is projected to grow by 15% from 2014 to 2024.*  

Kaplan University's master's degree program is designed to prepare you for leadership roles directing and protecting critical information infrastructures. You'll study how to develop, implement, evaluate, and update the security policies and practices that help organizations respond effectively to cyber attacks. As a graduate, you could be skilled in the management of information continuity, asset clarification and control, compliance management, incident response, and secure administration of information systems.

Master of Science in Cybersecurity Management Program Highlights

Program outcomes for this degree include:

  • Theory and Principles: Evaluate theories, framework, principles, and best practices related to cybersecurity science and technology by assessing and reviewing recent cybersecurity literature and industry publications.
  • Industry Research: Demonstrate the maturity to develop research topics based on cybersecurity underlying principles learned throughout the MSCM program.
  • Decision Analysis: Analyze data using statistical principles for the purpose of developing or/and supporting a hypothesis.
  • Critical and Analytical Thinking: Apply appropriate theories, including Request for Comments (RFCs), within cybersecurity science and technology to evaluate and mitigate risk in contexts of uncertainty.
Expand to Learn More

Master of Science in Cybersecurity Management Professional Competencies

Courses within the Master of Science in Cybersecurity Management could help students develop the following skills:

  • Teamwork
  • Leadership
  • Personal presentation
  • Multiculturalism and diversity
  • Communications
  • Problem solving and critical thinking
Expand to Learn More

Higher Education at the Highest Standards

Kaplan University is accredited by The Higher Learning Commission (HLC) and committed to the highest standards. Our specific programs hold additional industry-relevant approvals and accreditations.

What are the Career Opportunities?

Earning your online master's degree in cybersecurity at Kaplan University may help you develop valuable skills that are applicable to a broad range of positions across the field, including†: 

  • Senior security policy analyst/specialist/manager
  • Senior security administrator/engineer
  • Security architect
  • Security programmer
  • Security researcher
  • Senior forensics analyst/investigator
  • Senior ethical hacker/penetration tester
  • Senior IT auditor

How Do I Get Started?

Kaplan University offers multiple start dates, giving you greater flexibility with your education, life, and work schedules.

11

Oct

Online Start Date

October 11, 2017

29

Nov

Online Start Date

November 29, 2017

17

Jan

Online Start Date

January 17, 2018

07

Mar

Online Start Date

March 07, 2018

18

Apr

Online Start Date

April 18, 2018

06

Jun

Online Start Date

June 06, 2018

18

Jul

Online Start Date

July 18, 2018

05

Sep

Online Start Date

September 05, 2018

17

Oct

Online Start Date

October 17, 2018

05

Dec

Online Start Date

December 05, 2018

Curriculum: All Tracks

  • Core

    Total Core Credits: 60

    Total Program Credits: 60

    • IT 513: WRITING AND CRITICAL THINKING FOR THE IT PROFESSIONAL Change

      This course helps you develop effective academic writing skills and the ability to synthesize, evaluate, and discuss a variety of information technology concepts. The course emphasizes accurate grammar and standard punctuation, as well as the appropriate application of American Psychological Association (APA) style guidelines to produce logically structured academic papers that integrate refereed sources into the supporting arguments. You will achieve a comprehensive approach to graduate-level writing and research.

      Credits:

      4

      Prerequisites Required:

      None

    • IT 527: FOUNDATIONS IN DATA ANALYTICS Change

      This course is intended to equip you with foundational skills in data analytics. These skills include problem/question definition, data identification and preparation, statistical and/or logical modeling, and evaluation and deployment. Both categorization and prediction modeling are covered, along with methods for selecting the most appropriate methods for a given question and data set. The course uses industry-standard software to enable you to learn analytical approaches such as linear and logistic regression, association rules, decision trees, k-Nearest Neighbors and k-means clustering, discriminant analysis, and other useful analytic techniques.

      Credits:

      4

      Prerequisites Required:

      None

    • IT 528: QUANTITATIVE RISK ANALYSIS Change

      This course teaches you methodologies for using data analytics to detect, identify, and mitigate risk in a variety of forms. A variety of different quantitative risk assessment techniques are presented, including Failure Mode and Effects Analysis, fault tree analysis, expected payoffs, decision trees, and more. The case method is utilized to show real-world applications in finance, engineering, project management, loss/theft, loans, and fraud. The course will focus on formal risk processes. Issues of risk analysis ethics will also be included.

      Credits:

      4

      Prerequisites Required:

      IT  527

    • IT 530: COMPUTER NETWORKS Change

      This course introduces data communications and networking technologies from the business perspective by heavily utilizing case studies and the decision-making process. Topics consist of network operating systems, local and wide area networks, and voice and wireless networks, as well as security and the Internet. The focus will be on practical applications of these concepts, including support issues, administration, and management.

      Credits:

      4

      Prerequisites Required:

      IT 513 or GB 512

    • IT 537: INTRODUCTION TO CYBERSECURITY Change

      This course provides an overview of cybersecurity concepts including data confidentiality, integrity, and availability, and an understanding of systems and applications software necessary for foundational understanding of cybersecurity. You will examine methods for network situational awareness and dynamic decision-making for predicting and assessing the impact of various cyber-attacks. Aspects of cyber-strong organizational structures and mitigation are emphasized. The course will also cover various risk assessment methodologies necessary for understanding cyber risk, organizational preparedness and gap areas, and identifying improvement processes for an organization’s decision makers.

      Credits:

      4

      Prerequisites Required:

      IT 530

    • IT 540: MANAGEMENT OF INFORMATION SECURITY Change

      IT professionals must focus on a wide range of security-related issues and develop security systems that address constantly changing threats. This course takes the approach that security components and business functions work in tandem. Topics like asset identification, human factors, compliance with regulations, personnel security, risk assessment, and ethical considerations are covered, as well as computer and network security tools and methods.

      Credits:

      4

      Prerequisites Required:

      IT  530

    • IT 541: COMPUTER AND NETWORK SECURITY Change

      In today's world, protection of data is serious business. This course explains the concepts and techniques involved in keeping computers and networks secure. The course examines fundamentals such as viruses, worms, and other malicious software; authentication and encryption security; file security and shared resources; firewalls and border security; and physical and network topology security.

      Credits:

      4

      Prerequisites Required:

      IT  540

    • IT 542: ETHICAL HACKING AND NETWORK DEFENSE Change

      An ethical hacker is a security expert who attacks a system on behalf of the system's owners. This course focuses on discovering network vulnerabilities that a malicious hacker can exploit. The course explores penetration testing, footprinting and social engineering, scanning and enumeration, operating system weaknesses, and the methods used to hack Web servers and wireless networks. You will perform hands-on projects using state-of-art hacking tools and techniques.

      Credits:

      4

      Prerequisites Required:

      IT  541

    • IT 544: PLATFORMS, APPLICATIONS, AND DATA SECURITY Change

      In this course you will appraise platform/operating system software configuration strategies and techniques as related to cybersecurity. You will examine secure application development techniques and the role of application security throughout the software development life cycle (SDLC). This course will also include strategies and techniques for securing data at rest and in motion.

      Credits:

      4

      Prerequisites Required:

      IT 542

    • IT 545: WIRELESS, MOBILE, AND CLOUD SECURITY Change

      This course examines strategies for managing the administration of wireless, mobile, cloud, and disruptive technological environments, such as social networking and the Internet of Things, in the context of cybersecurity.

      Credits:

      4

      Prerequisites Required:

      IT 544

    • IT 550: COMPUTER FORENSICS AND INVESTIGATIONS Change

      This course explores the expertise required to conduct digital forensic investigations. Topics include investigation methods, problem-solving techniques, current forensics analysis tools, digital evidence acquisition and control, and impact of ongoing technological changes on digital forensics. Student projects include scenario-based investigations in investigating cybersecurity breaches. This course explores the expertise required to conduct digital forensic investigations. Topics include investigation methods, problem-solving techniques, current forensics analysis tools, digital evidence acquisition and control, and impact of ongoing technological changes on digital forensics. Student projects include scenario-based investigations in investigating cybersecurity breaches.

      Credits:

      4

      Prerequisites Required:

      IT  542

    • IT 590: LEGAL AND ETHICAL ISSUES IN IT Change

      This course provides a detailed discussion of the legal and ethical issues associated with the information technology age. Topics covered in this course include: ethical theories related to information technology, protection of intellectual property, privacy, computer and network security, cybercrimes, and ethical behavior for working in the computer industry.

      Credits:

      4

      Prerequisites Required:

      IT 513 or GB 512

    • IT 591: IT SECURITY AUDITING AND ASSESSMENTS Change

      In this course you will appraise all standards and information technology (IT) security audit processes, evaluate security controls, and examine governance of compliance and control responsibilities. Most organizations are required to comply with IT security regulations and/or standards resulting from the establishment of the Sarbanes-Oxley Act, General Computing Controls, the Gramm–Leach–Bliley Act (GLBA), the Federal Information Security Management Act (FISMA), and the Payment Card Industry Data Security Standard (PCI DSS), and you will become familiar with these standards and regulations.

      Credits:

      4

      Prerequisites Required:

      IT  545

    • IT 592: FINANCIAL INVESTMENT OF CYBERSECURITY Change

      This course introduces you to budgetary and financial decision-making tools applicable to an organization’s cybersecurity strategy. Effective use of these decision-making tools will enable future information technology (IT) security leaders to justify resources needed to secure an organization’s information/data resources.

      Credits:

      4

      Prerequisites Required:

      IT 540

    • IT 595: MASTER’S CAPSTONE IN CYBERSECURITY MANAGEMENT Change

      The Master’s Capstone in Cybersecurity Management synthesizes knowledge gained throughout all courses in the degree plan, and its comprehensive research project demonstrates the student's mastery of this knowledge. The project will address a cybersecurity problem in either the research community or industry, and will indicate what the student now offers to industry, upon completion of this program.

      Credits:

      4

      Prerequisites Required:

      Last term or permission from the Dean.

Curriculum: Concentration

Can I Afford This?

Kaplan University is committed to helping you find more ways to save on college tuition. Our Tuition Cap, military reductions, and transfer and experiential learning credits are some of the ways we can help lower the cost of your tuition and help you graduate sooner.

Tuition and Fees

Tuition Rates

Select Your Options

Desired Track Only All Tracks is available for this program.
Enrollment Location:
Online, Rockville, Indiana, Missouri, Wisconsin
  • Online, Rockville, Indiana, Missouri, Wisconsin
  • Maine
  • Hagerstown
  • Iowa, Nebraska
Tuition Discount Options:
Select One
  • Select One
  • Active-Duty Military
  • Military Veteran
  • Military Spouse
  • International
  • Indiana Residents
  • Alumni

Online, Rockville, Indiana, Missouri, Wisconsin

$402.00 cost per credit
number of credits

Tuition does not include University fees and associated program fees. View tuition and fee information or contact an Admissions Advisor for more information.

Indiana resident military veterans: tuition for online undergraduate degree and certificate programs is $220.00 per quarter credit hour.

Ways to Save

Here are some of the ways we can help lower the cost of your tuition and help you graduate sooner.

Helpful Information

Whether you are on your way up the corporate ladder or just getting started, our degree programs and certificates could help you prepare to take your career to a higher level.

View Brochures

Request More Information

To receive the Kaplan University Program Guide, including areas of study and associated career paths, please complete this information form.
View notes and conditions

*Source: U.S. Department of Labor, Bureau of Labor Statistics, Occupational Outlook Handbook, 2016-2017 Edition, Computer and Information Systems Managers, www.bls.gov/ooh/management/computer-and-information-systems-managers.htm. National long-term projections may not reflect local and/or short-term economic or job conditions, and do not guarantee actual job growth.

Kaplan University cannot guarantee employment or career advancement.