Cybersecurity Management Program
The Cybersecurity Management Minor and Professional Certificate Program in Cybersecurity Management are part of an interdisciplinary management approach to cybersecurity in public and private organizations. The primary objectives of this program are to provide students and professionals with the skills and confidence needed to identify problem areas related to cybersecurity and information technology management in an organization and identify solutions. The program is intended to enhance student and participant learning and career opportunities in information security management that can be applied to various organizational settings.
The focus of the course material is on cybersecurity management challenges in an organizational setting. Students will learn about the critical need for protection of data and information, and what to do in the event that protected information is breeched. The program is designed to capitalize on the intellectual strengths of students majoring in different disciplines that are consistent with the broad suite of professional management needs found in varied institutional settings. Students with background or academic areas of interest in: criminal justice, information technology, business, public administration, law, education, healthcare, the behavioral sciences and many other fields may link their area of interest to this program. The program will cover subject matter in information risk management, computer crime, homeland security, law, defense, terrorism studies, policy development and other topics as they relate to information management and security threats.
The course of study will provide students with the techniques and tools to deal with cybersecurity management, planning and threats. The methodology of the coursework will provide students and participants with skills to:
In this program, students will examine cybersecurity and information technology oversight;
management techniques and key components in developing cybersecurity plans (see above)
and search for strategic ways to protect organizations from cybercrimes and intrusions.
Student Learning Outcome assessments will be conducted by performing pre-and-post tests in ever class and by developing student learning performance profiles for each class. Hands-on simulation exercise and writing assignments will be used to measure proficiency.
Course |
Course Title |
Credits |
Term Offered |
CSM100 | INTRODUCTION TO CYBERSECURITY MANAGEMENT + This course introduces students to the growing Legal, technical, managerial, economic,
and social Issues surrounding crimes committed in cyberspace. The course discusses
the nature of cybercrime from A management and international perspective and Focuses
on how the borderless nature of cybercrime. Impacts law enforcement and cybersecurity
in Public and business organizations.
|
3 credit hours | FALL/SPRING/ALL YEARS |
CSM200 | FUNDAMENTAL OF COMPUTERS AND NETWORKING TECHNOLOGIES FOR CYBERSECURITY MANAGERS IN
ORGANIZATIONS:UNDERSTANDING COMPUTER HARDWARE, NETWORKS AND THE INTERNET + This course introduces students to the growing Legal, technical, managerial, economical
and Social issues surrounding crimes committed in Cyberspace. The course discusses
the nature of Cybercrime from a management and international Perspective and focuses
on how the borderless Nature of cybercrime impacts law enforcement and Cybersecurity
in public and business Organizations.
|
3 credit hours | FALL/SPRING/ALL YEARS |
CSM300 | CYBERSECURITY MANAGEMENT TOOLS AND TECHNIQUES + Cybersecurity has become a topic of critical Importance in today's networked and interconnected
Environment. The study of cybersecurity management Describes the tools, techniques,
methods, and Strategies used by information security Professionals and managers to
combat security Breaches and threats. This course provides an Overview of the field
of information security and In-depth knowledge of the complex nature of cyber Threats
and countermeasures. In this course Students will examine key strategies and Methodologies
used to increase information Continuity in business and government Organizations and
information security disaster Preparedness. Also presented are methods of Securing
information systems using organizational Security controls, policies, and best practices
With coverage extended to additional topics Including information privacy and regulations.
|
3 credit hours | FALL/SPRING/ALL YEARS |
CSM301 | CYBERCRIME AND DIGITAL FORENSICS + The global reach of the internet, the low marginal Cost of on-line activity, and the
relative Anonymity of information technology users have Contributed to a wide escalation
in cybercrimes. Consequently, information and communication Technologies (ict) are
being increasingly employed To instigate threats to government, business and Global
economies. This course provides an Overview of cybercrime and the forensic and Digital
law enforcement practices put in place to Respond to them. The course will focus on
the Types and extent of current cybercrimes, how Organizations respond to these crimes,
including Protections afforded to computer users, the Policies that govern cybercrime
detection and Prosecution, related law enforcement technologies.
|
3 credit hours | FALL/SPRING/ALL YEARS |
CSM302 | LEGAL ISSUES AND CASES IN CYBERSECURITY AND THE LAW: LOCAL, NATIONAL AND INTERNATIONAL + This course will introduce students to the key Issues in cybersecurity management
and the law and Help them develop a basic understanding of the Technical, legal and
ethical issues related to Cybersecurity . Case studies in cybersecurity Breaches and
their legal consequences shall be Presented, discussed and analyzed in this course.
At the end of the course, students will understand Today's cybersecurity legal and
privacy related Challenges faced by leaders and manager of public And business organization
(local national and International).
|
3 credit hours | FALL/SPRING/ALL YEARS |
A student may petition the Public Administration and Legal Studies Program for consideration to substitute a course they have completed that may be equivalent in content to a course required in the Cybersecurity Management program.