Skip to content

M.S. in Cybersecurity Operations Management: Curriculum

Curriculum Details

30 TOTAL CREDITS REQUIRED

The online M.S. in Cybersecurity Operations Management degree requires the completion of 10 courses, totaling 30 credit hours. The program can be completed in as little as two years by taking one class every eight weeks, and it will prepare you to take the CompTIA ® Project+ certification exam. No residency is required for this program.

Course abstracts on this page are meant to provide an overview and are subject to change based on term, faculty, and/or institutional requirements. View the official course descriptions as written in the Utica College Academic Catalog and in adherence to regional compliance. Select the appropriate Graduate Catalog from the dropdown.

National Center of Excellence

With cutting-edge programs, Utica College is a nationwide leader in cybersecurity education. We’re proud to be designated a National Center of Academic Excellence in Cyber Defense Education (CAE-CD) by the National Security Agency (NSA) and Department of Homeland Security (DHS). Utica College has met the increased demands of this new designation category with its Bachelor’s and Master’s in Cybersecurity programs. The NSA designation goes through academic year 2024.

The college has also earned designation as a National Center of Digital Forensics Academic Excellence (CDFAE) by the Defense Cyber Crime Center (DC3).

Core Courses

This course applies accounting and finance concepts to project management. The basic functions of management include planning, organizing, controlling, and evaluating, the results of operations. Fulfilling these functions requires managers to make a wide variety of decisions, and much of the information that managers must rely on to make these decisions is expressed in accounting and financial terms. This course is designed to increase fluency in understanding, selecting, analyzing, and using accounting and financial information in order to make various types of management decisions.
The knowledge and ability to manage complex projects in any industry is a vital skill for today’s business and government leaders. In this course students explore key concepts and principles of effective project management. Students are introduced to the initial stages of project management (defining, initiating, planning, and executing), concepts of project scope and time management, and issues in cost and procurement management using a series of case studies and analytical exercises. Course content is linked to the CompTIA ® Project+ certification exam.
In this course students explore key concepts and principles of effective project management leadership. Students explore the final stages of project management (monitoring and controlling, and closing stages), concepts of human resources and stakeholder management, effective risk and quality management, and approaches to project management leadership using a series of case studies and analytical exercises. Course content is linked to the CompTIA ® Project+ certification exam.

Investigate the various functions and ethical impacts of management within an organization. You’ll examine strategy, research and development, marketing, operations, and the supply chain.

Explore the following foundational concepts and processes for information security in cyberspace: incident response, reporting, containment, and restoration of the information infrastructure.

Examine major critical infrastructure protection issues, technologies, and approaches as they relate to telecommunications, energy, banking and finance, transportation, the internet, and emergency services.

Examine rules, regulations, and issues related to organizational risk management. You’ll explore risk assessment and management from healthcare, financial, privacy, data breach, and government perspectives.

Examine the legal and technical aspects of cybercrime investigations, then compare them with techniques of traditional investigations.

You’ll study the key components associated with threats and vulnerabilities to computers and networks. Develop your understanding of distributed systems and how they work, an appreciation for various methods of network and internet security, and the strategies necessary to promote successful business plans and policies. You’ll also become familiar with intersecting legal, ethical, and privacy issues.

This capstone course in cybersecurity is an opportunity for you to master a specialized field of your choice through a focused research project that is consistent with the graduate research proposal guidelines.

Additional Curriculum Requirements

Students who have not completed foundational computer software or networking courses, or who have no practical training and experience in computer software or networking, will be required to take CYB 505 – Foundations of Computing for Cybersecurity (3 credit hours) as a part of the program.

Request More Information

We’d love to get to know you and hear more about your educational and professional goals. If you’d like to learn more about one of our programs, fill out this form and we’ll be in touch:

Note: All fields required.