as few as 12 months*
Prepare for management roles in information security across all industries with an MBA with a Concentration in Cyber Security – delivered 100% online. The demand for cyber security jobs is growing faster than the existing talent pool can supply, with job postings growing 74% from 2007-2013. Potential future job opportunities for graduates include careers in business-to-business consumer industries, including retail, healthcare and finance.
This concentration provides a strong managerial background, where all the current cyber security concepts are reviewed and analyzed through real threats and real case figures. Learn to define critical information, assess the risk of a business and make recommendations on how to reduce vulnerability.
*Average completion time is 18-24 months.
Students must take all 9 courses.
Focuses on leadership and development issues addressed by members of the top management team and other upper-level managers. Topics include coordination between and among units, managerial control systems, and the development of management talent within the firm.
Use of accounting data in the decision-making process and in the analysis and control of business operations.
Financial management of the firm with special emphasis on financial planning, capital concepts.
Analysis of the operations management functions from a manager's perspective. Quantitative techniques related to decision making such as linear programming, statistics and selected operational models are applied to operations management problems in both the service and manufacturing industries.
Investigation of issues managers face when trying to lead individuals and organizational units to achieve corporate objectives. Focus of the course emphasizes the individual and group levels of analysis.
Focus is on the role of HR managers and practices in developing competitive advantage for the firm. Considers the role of both specific HR practices and the overall HR architecture in enhancing firm performance.
An analysis of contemporary problems in marketing with emphasis on dynamic market characteristics.
Students adopt the top management’s view of the firm and focus on positioning the firm to gain strategic advantage in the competitive marketplace. Industry analysis, planning and implementation of competitive strategy, evaluation of strategy alternatives, utilization of appropriate controls, and the evaluation of the administrative process are emphasized.
An intensive study of the different aspects of international business including, but not limited to, international politics, culture, economics, finance, technology, marketing, ethical decision-making, strategic planning and management, and human resource development in a global environment.
This course will cover cryptography, network protocols and their application, including an overview of symmetric and asymmetric cryptographic algorithms and their use for authentication, e-mail, and e-commerce. Network security protocols covered with include Kerberos, SET, and SMIME.
This course will cover the techniques used to secure and manage computers, computer networks, and enterprise computer systems. Topics covered will include security policies, computer network management, and disaster recovery.
This course is designed to teach students the basics of information systems assessment, evaluation, and red teaming. The students use the National Security Agency’s ISAM Methodology to evaluate vulnerabilities and to develop appropriate responses to mitigate security risks. The students participate in a long term assessment/evaluation project in this course with an actual organization.