Cybersecurity Degree - Master of Science
Major Requirements (36 credit hours)
(Click a course name below to view course details). Unless noted, all courses are 3 credit hours.
Core Requirements (27 credit hours)
CIS 607 Computer Forensics
This course is designed as an overview of the investigative methods and tools associated with computer forensics. Topics include: processing crime and incident scenes, digital evidence controls, recovery of information, network forensics, data acquisition, and legal and ethical issues associated with investigations.
CIS 608 Information Security Management
This course addresses the issues relating to successful information security management. Topics include access control systems, network and software security, management practices, risk management, protection mechanisms, business continuity planning, and legal and ethical issues. The course allows for analysis of current security management models.
CYBR 510 Physical, Operations, and Personnel Security
This course presents an examination of effective security methodologies based on comprehensive assessment of threats and implementation of a layered system of physical and electronic protection. Threat identification, countermeasures, and prevention are explored.
CYBR 515 Security Architecture and Design
This course provides an introduction to the fundamental components of security architecture. Topics include computer organization; hardware, software and firmware components; open and distributed systems; and protection mechanisms. Discussion also includes certification and accreditation; formal security models; and evaluation criteria. Assigned projects include designing a model secure system.
CYBR 520 Human Aspects of Cybersecurity
This course provides an exploration of the human aspects of Cybersecurity. Topics include human behavior and interaction; motivation and influence; and social engineering. Emphasis on the human element of cyber incidents in relation to protecting information and technology assets.
CYBR 525 Ethical Hacking and Response
This course provides a technical study of offensive and defensive techniques for protecting cyber assets. Topics include security testing, risk mitigation techniques, and threat response. Discussion also includes penetration testing theory, techniques, and tools; network, systems, and application vulnerability scanning; risk analysis and response; and intrusion detection and response. Emphasis is placed on identification of system vulnerabilities and threats and techniques for preventing attacks.
CYBR 610 Risk Management Studies
This course provides an exploration of how organizations manage risks to information technology assets. Discussion includes the application of methodologies and models for managing such risks. Topics also include recognition of security threats and vulnerabilities and the analysis of associated risks. A systematic approach for acquiring and analyzing information to support decision-making in the protection of assets and the allocation of security resources is presented.
CYBR 615 Cybersecurity Governance and Compliance
This course explores the concepts of governance and how it applies to information systems. Discussion includes the importance of compliance with laws, regulations, policies, and procedures as a means of minimizing risk through mandated security and control measures. Through this course, students also gain an understanding of Information Technology (IT) Auditing processes and principles.
CYBR 650 Current Trends in Cybersecurity
This course presents an in-depth study of current trends in Cybersecurity threats. Discussion includes the identification and management of threats and vulnerabilities within an effective enterprise security program. Prior Cybersecurity education is synthesized through projects and assignments.
Elective Courses (9 credit hours)
Choose three courses from those listed below. PS 639 OR CIS 610 may be taken but not both.
CIS 519 IT Strategy and Policy
This course provides an introduction to the strategic use of information technology from a business perspective at the enterprise level. Emphasis is placed on the internal management of information systems services from the point of view of the Chief Information Officer. Alternative strategies and tactics available to management to achieve business goals are examined.
CIS 520 Survey of System Development
This course introduces the concepts for information systems analysis and design with an emphasis on structured development combined with an introduction to object-oriented analysis and design principles.
CIS 537 Introduction to Cyber Ethics
This course provides a brief overview of the field of ethics, computer privacy and security, computer crime and software piracy, intellectual property and information ownership, computers and gender, computers and social justice, and civil liberties in cyberspace. Additionally, ethical questions concerning professional codes of conduct and issues of moral responsibility for computer professionals are presented.
CIS 605 Advanced Database Management
The subject of database management will be approached in its role as the back end of client/server technology. The focus will be on using a relational database as an enabling technology in the area of Online Transaction Processing and Online Analytical processing. The use of the PL/SQL as it relates to database administration and development will be studied. Issues of database security will be a secondary emphasis.
PS 639 Cyberwar and Cyberdeterrence
This course presents an examination of the arena of national security that meshes high-technology with traditional concerns of war and peace. Topics include war and deterrence in the cyber realm, attribution, threat assessment, retaliation, and offensive and defensive capabilities. Discussion also includes global politics related to cyber activity, and ethical issues linked to privacy, civil rights, national security and national defense.
CIS 610 Information Warfare
This course is designed as an overview of the fundamental processes associated with waging war in an electronic age. Topics include strategic planning and tactical analysis for target identification, reconnaissance, and tool selection. The intent of this course is to focus on individual, corporate and national forms of warfare.
CIS 611 Cloud Computing
This course focuses on the architecture and security associated with cloud computing. Emphasis in placed on key drivers which lead to cloud computing adoption and issues associated with cloud computing governance. Additional topics will include infrastructure security, identity and access management, cloud services, data security and storage, and auditing and compliance. Prerequisites: Graduate Standing
CIS 629 Managing Emerging Technologies
This course provides an exploration of emerging information technologies, including how to define them, how they evolve, their role in the technology life cycle, and their potential economic, social, and cultural relationships. Topics covered include disruptive technologies, successes and failures of past emerging technologies, and integrating emerging technologies into a sustaining technology system.
CIS 633 Information Technology Project Management
This course addresses the complex and unique issues related to effectively managing projects in an Information Technology context. Emphasis is placed on the nine knowledge areas specified by the Project Management Institute (PMI) in A Guide to the Project Management Body of Knowledge (PMBOK® Guide). Team-based and discovery-based learning methods are stressed. Development projects reflect actual problems provided by industry. A formal software project management plan detailing the process groups of initiating, planning, executing, controlling, and closing will be developed.
CYBR 545 White Collar Crime
This course explores common techniques, tools, and technologies for committing white-collar cyber crimes. Topics include fraud prevention, anti-money laundering, investigative methodologies, and protecting privacy. Case students will demonstrate real-world scenarios of white collar crimes, how to prevent or deter them, detection methods, and response techniques.
CYBR 613 Control System Security
This course explores risks associated with industrial control systems within and across critical infrastructure and key resource sectors. Topics include a comparative analysis of IT and control system architecture, security vulnerabilities, and mitigation strategies unique to the control system domain. This includes activities to reduce the likelihood of success and severity of impact of a cyber attack against critical infrastructure control systems through risk-mitigation activities.
CYBR 625 Business Continuity Planning and Recovery
This course provides the student with an opportunity to identify the processes associated with business continuity planning and disaster recovery. Business continuity topics such as project scope and planning, assessing risk, developing policy and procedures, conducting business impact analyses, recovery strategies, recovery plan development, and implementation are explored. Disaster recovery will be discussed in terms of recovery plan development, implementation, and restoration.
CIS 644 Managing Project Risks
This course is designed to teach the importance of risk management in projects and provide information about the tools needed to effectively assess and monitor risks throughout the project lifecycle. Emphasis is placed on managing risks associated with project changes and risks associated with information technology projects. Topics covered include recurring issues that lead to failure in IT projects, methods for addressing recurring issues, and assessing risk impact. Prerequisite: CIS 433 or CIS 633 or acceptance into the Master of Project Management (MPM) degree program.
MHA 602 Health Information Technology and Administration
This course examines the integration and application of health information technology (HIT) for improved organizational and patient outcomes. The course focuses on current changes for State and Federal mandates for HIT, leadership and administration of HIT, as well as specific HIT applications for individual healthcare organizations and patient care modalities.
Error while processing your submission.
There was an error while trying to process your submission. We are sincerely sorry for the inconvenience.
Please reach out to one of our Admission Counselors and they can answer any questions you have at 1-800-756-7920 (option 1). The Admissions office is open Monday through Thursday 8:00 a.m. to 8:00 p.m. (CST) and Fridays from 8:00 a.m. to 5:00 p.m. (CST).
Congratulations on taking your first step towards earning your degree!
At Bellevue University, our passion is to help you get started and support you all along the way. In fact, we’ve found that many students have benefited from our complimentary “Smarter Measure” Self-Assessment which will help you prepare for success. Again, this is a free service.
Your User Name: ready
Your Password: ready
Just click here to start. Smarter Measure
Thanks again. We look forward to working with you!