Skip to main content

Cybersecurity, Enterprise Security and Core Course Descriptions

Core Class Course Descriptions

All students wishing to complete the Master of Security Management will complete all the courses in addition to the 5 courses in their chosen concentration.

SM 6360 Enterprise Security Management
SM 6362 Risk Analysis and Abatement
SM 6364 Legal Environment for Security Executives
SM 6365 Cyber Crime and Computer Forensics
MGT 6301 Management Leadership and Communications for Security Executives
MGT 6302 Human Resource Management for Security Executives
MGT 6332 Management Decision Making for Security Executives

Cybersecurity Concentration

Prerequisite: Acceptance into the MSM and/or approval from the Program Director.

This course focuses on the foundations of a risk based cyber security program. Students will focus on applying threat, vulnerability, risk analysis in order to manage an organization's IT security program.

Prerequisite: Acceptance into the MSM and/or approval from the Program Director.

This course focuses on treating an organization’s data as an asset that must be protected, ways to protect that data as an asset and the impact of data breach and/or theft of that data.

Prerequisite: Acceptance into the MSM and/or approval from the Program Director.

This course focuses on the security risks related to an organization's enterprise network connections to the external web and implementing technology to mitigate the identified security risks.

Prerequisite: Acceptance into the MSM and/or approval from the Program Director.

This course examines the role of business continuity as part of a comprehensive, threat based, risk management strategy by looking at standards, strategies, crisis management, employee orientation, plan development and testing.

Prerequisite: Acceptance into the MSM and/or approval from the Program Director.

This course focuses on identifying and using up-to-date intelligence in order to perform risk analysis, continuous monitoring and threat assessments to maintain security and reduce system vulnerabilities on a day to day basis.

Enterprise Security Concentration
Prerequisite: Acceptance into the MSM and/or approval from the Program Director.

This course focuses on the development and management of a corporate investigation team that is part of a complete enterprise security organization. Topics include: Mandated investigations, jurisdiction issues, legal exposure and ethical issues.

Prerequisite: Acceptance to Security Management Program or college approval.

Examines the development and implementation of global security policies, standards, guidelines, and procedures to insure ongoing maintenance of security. Special emphasis on changes in economics, geopolitics, organization design, and technology and how each relates to potential threats and risks to an organization.

PrerequisiteSix hours of graduate credit in the Security Management program or permission of the department.

This course is a survey of major security threats and methods for mitigating those threats in contemporary settings. The course activities will include review and analysis of recent security threats and/or events and identification of available strategies to mitigate the risk posed by those threats. Students will learn how to analyze a wide variety of threat scenarios, identify vulnerabilities, and determine which risk mitigation strategies work best for a given situation; and they will learn how threats and strategies for mitigating them are evolving over time.

Prerequisite: Acceptance into the MSM or permission of the college.

This course deals with problem solving under the supervision of faculty members. The student will design and complete an analytical examination of a security problem and a set of actionable recommendations designed to solve the problem(s) and or mitigate the impact. The student will present their analysis and recommendations in both a recorded presentation and a comprehensive written document.

Prerequisite: Admission into the MSM or permission of the college

This course focuses on the challenges of designing a comprehensive, risk based organizational protection program that takes advantage of all forms of protections, electronics and tactics available to the security professional.