30 TOTAL CREDITS REQUIRED
The online M.S. in Cybersecurity Operations Management degree requires the completion of 10 courses, totaling 30 credit hours. The program can be completed in as little as two years by taking one class every eight weeks, and it will prepare you to take the CompTIA ® Project+ certification exam. No residency is required for this program.
Course abstracts on this page are meant to provide an overview and are subject to change based on term, faculty, and/or institutional requirements. View the official course descriptions as written in the Utica University Academic Catalog and in adherence to regional compliance. Select the appropriate Graduate Catalog from the dropdown.
National Center of Excellence
With cutting-edge programs, Utica University is a nationwide leader in cybersecurity education. We’re proud to be designated a National Center of Academic Excellence in Cyber Defense Education (CAE-CD) by the National Security Agency (NSA) and Department of Homeland Security (DHS). Utica University has met the increased demands of this new designation category with its Bachelor’s and Master’s in Cybersecurity programs. The NSA designation goes through academic year 2024.
The university has also earned designation as a National Center of Digital Forensics Academic Excellence (CDFAE) by the Defense Cyber Crime Center (DC3).
Investigate the various functions and ethical impacts of management within an organization. You’ll examine strategy, research and development, marketing, operations, and the supply chain.
Explore the following foundational concepts and processes for information security in cyberspace: incident response, reporting, containment, and restoration of the information infrastructure.
Examine major critical infrastructure protection issues, technologies, and approaches as they relate to telecommunications, energy, banking and finance, transportation, the internet, and emergency services.
Examine rules, regulations, and issues related to organizational risk management. You’ll explore risk assessment and management from healthcare, financial, privacy, data breach, and government perspectives.
Examine the legal and technical aspects of cybercrime investigations, then compare them with techniques of traditional investigations.
You’ll study the key components associated with threats and vulnerabilities to computers and networks. Develop your understanding of distributed systems and how they work, an appreciation for various methods of network and internet security, and the strategies necessary to promote successful business plans and policies. You’ll also become familiar with intersecting legal, ethical, and privacy issues.
This capstone course in cybersecurity is an opportunity for you to master a specialized field of your choice through a focused research project that is consistent with the graduate research proposal guidelines.
Additional Curriculum Requirements
Students who have not completed foundational computer software or networking courses, or who have no practical training and experience in computer software or networking, will be required to take CYB 505 – Foundations of Computing for Cybersecurity (3 credit hours) as a part of the program.
Request More Information
We’d love to get to know you and hear more about your educational and professional goals. If you’d like to learn more about one of our programs, fill out this form and we’ll be in touch:
Note: All fields required.