

online master's degree of threat assessment and management
Spring term classes start March.
Connect in person with faculty and peers.
Earn your degree on your schedule
$680 per credit hour.
32 total credit hours.
advance your expertise in public safety and threat management.
The Master of Science in Threat Assessment and Management program is designed for working professionals seeking to advance their expertise in public safety and threat management across law enforcement, educational institutions, juvenile justice, or corporate settings.
Join a cohort of future security leaders.
In this accelerated, cohort-based program, you’ll build critical skills alongside peers who share your commitment to safety and security. The cohort model allows you to take one course at a time in a structured sequence, with the same group of professionals throughout your studies—creating a collaborative and supportive learning environment. You’ll register once at the beginning of the program and progress through each course without the hassle of re-enrollment. This format makes it easier to balance your education with your career while expanding your professional network in the field of threat management.
Gain real-world skills for high-stakes scenarios.
The curriculum focuses on practical, real-world applications across a range of industries and threat environments. You’ll explore key topics such as ethical principles in threat management, threat countermeasures and response strategies, personnel management during crises, physical and information security, building threat assessment teams, and effective communication under pressure. By the end of the program, you’ll be equipped to lead multidisciplinary teams, develop proactive prevention strategies, and respond decisively to emerging threats—helping ensure safety and resilience in the organizations and communities you serve.
what you'll learn.
In this program, you’ll learn to assess, manage, and mitigate threats by applying security principles, conducting risk analyses, and developing effective emergency response strategies.
upon graduation, students will be able to:
- Apply basic security theories to threat events and activities.
- Prepare, manage, and critique personnel involved in threat events and countermeasures.
- Integrate organizational operating procedures to optimize management of threat events.
- Construct threat risk analyses and threat assessment reports.
- Develop effective business continuity and emergency response plans for threat countermeasures.
- Demonstrate communication skills and ethics when assessing and countering threat events
Awards




Bellevue Stories
Threat Assessment and Management degree courses
Current students please login to BRUIN and select “Academic Progress” for your curriculum requirements.
Requirements (32 credit hours)
This course discusses the processes used to identify assets and address areas of threats. This course will define threat assessment, and provide knowledge to determine the credibility and seriousness of a potential threat, as well as the probability that the threat will become a reality. It will cover how to manage the effects of a threat versus the threat itself and make the appropriate response. This will entail a collection of data, threat monitoring, safety of those involved as well as methods that are combined through various collaborations of assessments with internal and external entities based on sound security methods.
This course encompasses the personal and corporate standards of ethical behaviors that are expected. Studied topics in ethics will help security and threat professionals to uphold the expertise, commitment, responsibility, and objectivity in their work and to distinguish right from wrong in decision and align with their organization's culture.
This course will discuss the need for personnel to develop credentials for compliance towards various types of security, from physical security to security administration that focuses on the protection of assets and gain abilities in applying those processes. This course compares industry standards and practices for personnel security currently used in the workplace.
This course looks at risks to preempt waiting for a security breach leading to evaluating security procedures affecting both physical and informational security. Practicing proper assessment will be discussed as the foundation of physical security and why public and private organizations are falling victim to high-profile cyberattacks and ransomware. The course will show where physical security assessments will identify potential threats and major effects in your facility security systems and show the complexity of measures needed to protect networks, infrastructures, applications, products, and proprietary data.
This course discusses implementation of threat assessment and how inadequate threat assessments may result in compromised or unauthorized access. It also discusses how communication, its delivery, and protection needs to be of the highest standard to lead to more success and that a clear message is the most appropriate path to adequate communication. The course will include a discussion of security personnel contributions and how they guide and help develop an appropriate incident response plan based on the identified threats from threat assessment activities.
This course discusses the controls that are put in place in order to keep undesirable actions on the outside and desirable actions internal as this can expend a great deal of time and resources. The course looks at possible bad decisions on the part of users in the organization and how to nullify those decisions with appropriate countermeasures. The course helps students become aware of threats that are propagated through actions and behavior.
This course discusses aligning the Security Budget with overall business goals and concepts. As the budget should support the execution of the strategic plan, building a proper budget is a core competency of an effective security program. In addition to hiring and training good people, they need to adapt to the desired security culture. This course answers the question of why each item should be present within a budget and if it should be examined on a yearly or more regular basis. As it is critical to look at the organization's overall needs, understanding why security is vital to the organization's health is discussed at length.
This course identifies the needs of personnel that are assigned to a threat assessment team and to be able to study concerning behavior actions within an organization or individual. The threat assessment team is a group of officials convened to identify, assess, and address threats or potential threats to security. Team members learn how to evaluate and process situations against behavioral or unlawful actions. For this to occur, the establishment of a reporting system is imperative for past, present, and future determinations. Each of these positions are very important to manage a collaborative effort in identification, assessment, and counteraction of threat events. Students work to understand how important information sharing, as well as communication, is for a desired end result.
Certificates of Completion
(Click a course name below to view course details)
You can build a portfolio of 3 certificates as you complete the courses in the program, in Basics ofThreat Assessment and Ethics, Identification of Threats and the Human Element, and Physical and Informational Threat Assessment Procedures and Rules. The completion of certificates sends an important signal to your organization or employer that you are committed to developing skillsets that not only help you personally grow, but also help your organization.
The Basics of Threat Assessment and Ethics Certificate consists of two courses (8 credit hours) designed to meet the needs of online students in the fields of security and threat analysis and assessment. Courses included in the certificate introduce students to professional ethics in threat assessment and mediation, asset protection in the modern workplace, and contrasting the differences between qualitative and quantitative threat analysis.
This course discusses the processes used to identify assets and address areas of threats. This course will define threat assessment, and provide knowledge to determine the credibility and seriousness of a potential threat, as well as the probability that the threat will become a reality. It will cover how to manage the effects of a threat versus the threat itself and make the appropriate response. This will entail a collection of data, threat monitoring, safety of those involved as well as methods that are combined through various collaborations of assessments with internal and external entities based on sound security methods.
This course encompasses the personal and corporate standards of ethical behaviors that are expected. Studied topics in ethics will help security and threat professionals to uphold the expertise, commitment, responsibility, and objectivity in their work and to distinguish right from wrong in decision and align with their organization's culture.
The Identification of Threats and the Human Element Certificate consists of two courses (8 credit hours) designed to meet the needs of online students in the fields of threat analysis and threat assessment. Courses included in the certificate introduce students to building the protocols for threat analysis, examining physical and informational procedures for assessing potential threats, and information management and communication best practices.
This course discusses implementation of threat assessment and how inadequate threat assessments may result in compromised or unauthorized access. It also discusses how communication, its delivery, and protection needs to be of the highest standard to lead to more success and that a clear message is the most appropriate path to adequate communication. The course will include a discussion of security personnel contributions and how they guide and help develop an appropriate incident response plan based on the identified threats from threat assessment activities.
This course discusses the controls that are put in place in order to keep undesirable actions on the outside and desirable actions internal as this can expend a great deal of time and resources. The course looks at possible bad decisions on the part of users in the organization and how to nullify those decisions with appropriate countermeasures. The course helps students become aware of threats that are propagated through actions and behavior.
The Physical and Informational Threat Assessment Procedures and Rules Certificate consists of two courses (8 credit hours) designed to meet the needs of online students in the fields of threat analysis and threat assessment. Courses included in the certificate introduce students to building the protocols for threat analysis, examining physical and informational procedures for assessing potential threats, and information management and communication best practices.
This course will discuss the need for personnel to develop credentials for compliance towards various types of security, from physical security to security administration that focuses on the protection of assets and gain abilities in applying those processes. This course compares industry standards and practices for personnel security currently used in the workplace.
This course looks at risks to preempt waiting for a security breach leading to evaluating security procedures affecting both physical and informational security. Practicing proper assessment will be discussed as the foundation of physical security and why public and private organizations are falling victim to high-profile cyberattacks and ransomware. The course will show where physical security assessments will identify potential threats and major effects in your facility security systems and show the complexity of measures needed to protect networks, infrastructures, applications, products, and proprietary data.
Major Requirements Credits
= 32 total credits*
University Accreditation
Bellevue University is accredited by the Higher Learning Commission ( hlcommission.org ), a regional accreditation agency recognized by the U.S. Department of Education.
Whether a college, university, or program is accredited is important to students receiving financial aid, employers who provide tuition assistance, donors, and the federal government.
This program is considered a non-licensure degree/certificate program and is not intended for those seeking licensure or the practice of licensed profession. This program may be relevant to multiple occupations that do not require licensure and was not designed to meet educational requirements for any specific professional license or certification.
*Consult with an admissions counselor to determine your eligible credits, as well as to verify minimum graduation requirements for this degree. Transfer credits must be from a regionally accredited college or university. Bellevue University makes no promises to prospective students regarding the acceptance of credit awarded by examination, credit for prior learning, or credit for transfer until an evaluation has been conducted.
learn on your own time, from anywhere.
Flexible schedule.
Study on your own time with courses designed to fit your busy life—whether you're working, raising a family, or serving in the military.
Reliable technical support.
Access 24/7 tech support to keep you connected and focused on learning, no matter where you are.
Dedicated online student support.
From coursework access and connectivity issues to tutoring and resume assistance, we've got you covered.
Engaging online learning.
Enjoy interactive courses designed for real-world application, with multimedia content, discussions, and hands-on projects.

grow with faculty who’ve been where you are.


