What You’ll Learn

Course subjects include a comprehensive breadth of both the technical and business skills you need to pursue a leadership role in information security. Real-world practitioners will guide you through best practices to manage zero-day vulnerabilities and attacks, malware and the Dark Web, the reverse engineering of malware and much more.

The program can be completed in as little as 18 months and includes:

  • Leadership and Management Principles for Cybersecurity Professionals
  • Security and Cyber Threats for IT Managers
  • Cyber Network and Telecommunications Security
  • Cybersecurity Law and Policy
  • IT Security Auditing and System Monitoring
  • Cryptography
  • Data and Database Security
  • Business Principles and IT Security Management
  • Cyber Incident Response and Forensics
  • Wireless, Mobile and Cloud Security
  • Software and Web Application Security
  • Cyber Threats and National Security
  • Enterprise Cybersecurity Management Capstone

The program also integrates the business skills required of cybersecurity managers:

  • Oral and written communication and presentation skills
  • Negotiation
  • Ethics
  • Personnel and team management
  • Procurement
  • Budget planning and risk management

This course provides you with advanced information on current threats to IT systems including an array of current and evolving exploitation methods and vulnerabilities. Through research and lectures, you will examine attacks and attackers to understand their motivation, purpose, goals, types and phases. This course also considers emergent technologies and technical uses (such as Blockchain, Internet of Things, and Quantum Computing) from the standpoint of threat and security.

This course takes a 360 degree study of cyber incident response and investigation from the standpoint of a cybersecurity manager. You will learn how to secure a cyber-incident scene, preserve digital evidence, establish and maintain chain of custody, safeguard evidence, forensic analysis and tools, as well as examine and review of evidence. As part of this review, you will consider decision matrices for notifying and working with government and law enforcement agencies.

This course will provide you with an in-depth understanding of ciphers, cryptology and encryption and their use in safeguarding information and systems in the enterprise. You will learn about the standard uses of encryption including access control, authentication, data application security, and virtual private networking and examines technical direction and trends in regards to the future of cryptology. You will also review legal decisions and implications of encryption in the debate on privacy and civil liberties versus business and security and safety goals.

Enterprise Cybersecurity Management Capstone

The culmination of your online experience in the MPS Cybersecurity Management program will be a capstone engineered for you to leverage the entire range of knowledge and skills acquired during your program journey, and apply them in the context of a modern organization.

You will use complex case study to address real-world based cybersecurity problem sets from the perspective of a CISO/CSO. You will need to consider budget, existing infrastructure, IT strategic direction, organization risk tolerance, industry best practice and existing policy and procedures in your responses and solutions. Additionally, you will need to consider implications of security decisions and direction beyond the IT Department, and fully in tune with organizational business strategy and goals, real-world restrictions, compliance laws, required reporting, and legal/litigation risk.

This course is designed to ensure that you have mastered the full range of security technologies and best practices necessary to be a cybersecurity leader and that you will be able to bring your newly developed skillset and knowledge into the labor market.