Targeted Courses to Suit Your Career Goals
Total credits: 36 credit hours
Cost per credit hour: $710
Estimated cost, plus fees: $25,560
In looking at other programs … there seemed to be an absence of cohesive curriculum design. Not with our program. While others are more a collection of disparate courses, our cyber curriculum was very intentionally put together to take a comprehensive approach.” – Bob Andersen, Director of Instructional Technology, Saint Mary’s University of Minnesota
The 36-credit online Master of Science in Cybersecurity equips you to manage information security programs in small, medium, and large organizations. This curriculum was crafted by professionals who understand the hiring needs for cybersecurity positions, including hiring managers, information security executives, and government officials.
Unlike most other colleges with cybersecurity courses, ours gives you the business leadership skills to manage security information functions and teams in business, finance, retail, nonprofit, healthcare, government, education, and other sectors. Through cybersecurity courses online, you’ll learn to apply risk management frameworks, methods, and strategies; enhance the protection of enterprise-wide information assets, and detect and plan for cyberattacks on networks and computer systems.
We also offer the online cybersecurity graduate certificates to specialize your skill set at an advanced level. In the online graduate certificate in Cybersecurity Management, you'll develop your leadership skills by focusing on topics that include effective security policy, operational strategy, and security architecture. Alternatively, the online graduate certificate in Cybersecurity Technology will prompt you to explore subjects that cover security policy, risk management, and security architecture.
Prerequisite Course
Students who have not taken a foundational computer networking course and/or lack previous experience in the networking technology field may be required to take CYBR 590 Computer Networking (3 cr.) as part of their program.
Core Courses
CYBR 600 Foundations of Cybersecurity (3 credits)
This course provides an overview and foundational understanding of concepts essential to the cybersecurity professional to evaluate best practices in implementing security systems within the enterprise. This course covers key bodies of knowledge in security, privacy, and compliance. Topics include security planning, risk management, security technologies, basic cryptography, digital forensics, application security, intrusion detection and prevention, physical security, and privacy issues.
Upon completion of the course, students are expected to be able to do the following:
- Apply the principles of information technology security.
- Analyze situations of computer and network usage from a security perspective to develop a security mindset.
- Explain information security’s importance in our increasingly computer-driven world.
- Identify appropriate strategies to ensure confidentiality, integrity, and availability of information.
- Express management’s role in the development, maintenance, and enforcement of an information security program.
- Describe the relationship among laws, regulations, and professional issues in information security.
- Articulate how cryptography serves as the central language of information security.
- Analyze how physical security fits within an information security program.
- Define the roles of computer forensics in information security.
- Apply basic software tools for assessing the security posture of a business.
- Explain how issues of privacy relate to business information security.
CYBR 605: Security Architecture (3 credits)
This course introduces the student to the importance of security architecture design in enterprise security. Students are presented with a structured approach to the steps and processes involved in developing comprehensive and layered security architectures. Students evaluate the principles, attributes, and processes used in designing and deploying architecture that supports the business objectives of the enterprise.
Upon completion of the course, students are expected to be able to do the following:
- Select from the dominant information security management models, including U.S. government sanctioned models, to meet an organization’s needs.
- Create a strategic plan to accomplish an organization’s strategic security objectives.
- Identify different methods, roles, responsibilities, and accountabilities of personnel, along with the governance and compliance of a security policy framework.
- Apply principles of corporate governance to the information security function.
- Utilize information security knowledge and infrastructure efficiently to manage resources.
- Measure and report information security metrics to ensure that organizational objectives are achieved.
- Optimize information security investments in support of organizational objectives.
CYBR 610: Network Security and Intrusion Detection (3 credits)
This course provides a comprehensive overview of network security and intrusion detection. Students focus on methods for securing networks, and utilize these methods in basic architectural design. Students will apply these methods to a cohesive network security strategy. Topics include investigation of areas such as network analysis, perimeter defense strategies, network monitoring, vulnerability and intrusion detection, and security in mobile and wireless environments.
Upon completion of the course, students are expected to be able to do the following:
- Implement secure design principles in network architectures.
- Integrate secure network components through knowledge of the operation of hardware, transmission media, network access control devices, endpoint security, and content-distribution networks.
- Implement secure communication channels according to design that involve voice, multimedia collaboration, remote access, data communications, and virtualized networks.
- Specify procedures to recover from attacks on network systems.
- Conduct logging and monitoring activities to support intrusion detection and prevention, and event management.
- Identify threats and vulnerabilities in networked systems.
CYBR 615: Cybersecurity Change Management (3 credits)
This course describes the business context in which a cybersecurity professional must function within an organization. Students examine the interplay between business process and cybersecurity issues in mitigating security threats. An overview of audit, compliance, regulation and liability for business security are provided, along with how to construct effective continuity and disaster recovery plans, is provided.
Upon completion of the course, students are expected to be able to do the following:
- Manage business decisions affected by changing and diverse external and internal security threats.
- Align security functions to business strategy, goals, mission, and objectives.
- Determine compliance requirements among contractual, legal, regulatory, privacy requirements, and industry standards.
- Outline legal and regulatory issues that pertain to information security in a global context in areas such as cyber-crimes and data breaches, licensing and intellectual property requirements, import/export controls, trans-border data flow, and privacy.
- Identify, analyze, and prioritize business continuity requirements through development of a scope and plan and business impact analysis.
- Implement disaster recovery processes and understand concepts of response, recovery personnel, communications methods, damage assessment, system restoration and training and security awareness.
- Address security concerns related to personnel safety, travel, security training and awareness, and emergency management.
- Develop a security awareness and training program.
CYBR 620: Operational Security Policy (3 credits)
In this course, students examine the roles of security policies, standards and procedures in addressing business and technical security risks. Students explore the types of policies that are part of an overall security strategy. Policies are discussed that drive computer security, including discretionary access control, mandatory access control, and role-based access control types of policies, and how these are used in organizations. Students develop policies and deployment plans as part of the comprehensive strategic plan for the enterprise.
Upon completion of the course, students are expected to be able to do the following:
- Develop high-level security policies that directly support the mission, vision, and direction of an organization.
- Develop issue-specific policies to control use of resources, assets, and activities to support the organization’s goals and objectives.
- Develop system-specific policies that express technical details for the implementation, configuration, and management of the system that includes configuration rules and access control.
- Develop, document, and implement security policy, standards, procedures, and guidelines.
- Create security procedures and administration controls for the enterprise.
- Evaluate physical and logical access to assets such as information, systems, devices, and facilities.
- Manage identification, authentication, and authorization of people, devices, and services.
CYBR 625: Risk Management (3 credits)
This course includes a study of the existing risk management frameworks, models, processes and tools to provide students with the theory and practical knowledge needed to operationalize risk management in an organization or government agency. Additionally, fundamental concepts in information technology security audit and control processes for an organization are discussed. Students learn to create a control structure and audit an information technology infrastructure.
Upon completion of the course, students are expected to be able to do the following:
- Perform a risk assessment to determine the extent that an organization’s technology assets are exposed to risk.
- Demonstrate the concepts of risk appetite and residual risk as they apply to information assets of an organization.
- Complete a threat assessment that identifies asset vulnerabilities and ranks threats based on likelihood and financial impact.
- Apply the risk control strategies of transfer, mitigation, acceptance, and termination and how a cost-benefit analysis is utilized in determining which strategy to implement.
- Employ risk assessment and analysis techniques that include risk response and countermeasure selection and implementation.
- Apply risk-based management concepts to the supply chain with an understanding of risks associated with hardware, software, and services.
- Conduct a security control testing plan that involves a vulnerability assessment, penetration testing, log reviews, synthetic transactions, code review, and interface testing.
- Verify controls are applied consistently.
- Define how business alignment, risk appetite, and risk aversion affect the security program implementation.
CYBR 630: Communication for Cybersecurity Professionals (3 credits)
This course introduces students to the foundations of communication in a business setting as a critical component for success in the workplace. Students develop a foundation for designing effective messages, both written and oral, from concept to delivery. This course emphasizes elements of persuasive communication: how to design messages for diverse and possibly resistant audiences and how to present that information in a credible and convincing way.
Upon completion of the course, students are expected to be able to do the following:
- Develop a persuasive argument to promote change.
- Apply the principles of communication theory as it applies to interpersonal and group communication.
- Deliver a message that is both transformational and motivational to an audience.
- Demonstrate a professional manner and style in all communications.
- Communicate priorities facing leaders in response to changing conditions in computer security.
- Establish and maintain a security awareness, education, and training program.
- Address conflict strategically to advance organizational security.
- Present data in a visual format.
CYBR 635: Data Privacy (3 credits)
This course introduces techniques for information distribution in such a way that data privacy is protected. It discusses models and frameworks for privacy protection that support privacy enhancements from economic, legal and policy perspectives. Fundamentals of cryptographic theory and practice along with its applications are introduced in topics such as classical and contemporary ciphers, encryption and decryption, breaking ciphers, cryptographic protocols, and analysis tools.
Upon completion of the course, students are expected to be able to do the following:
- Protect privacy and understand concepts such as data owners, processors, collection limitations, and ensure proper asset retention.
- Analyze key laws designed to protect privacy.
- Determine data security controls through an understanding of data states, standards selection, and data protection methods, and establish information and asset handling requirements.
- Develop data standards related to the data life cycle, control, specification, storage, archiving, and responsible personnel.
- Explain the basic principles of cryptography, including various cipher methods, hash functions, and cryptographic algorithms.
- Identify the major protocols used for secure communications for both wired and wireless networks.
CYBR 645: Incident Response and Investigation (3 credits)
This course introduces the principles and best practices for incident response, along with an overview of digital forensics. Students understand the goals of incident response and learn how to prepare and respond to information security incidents and understand how the incident occurred. Students understand the process of collecting and analyzing data, and the process of remediation. The course outlines the investigative and analysis process, tools, digital evidence and applicable law with a focus on computer, mobile, network and database forensics.
Upon completion of the course, students are expected to be able to do the following:
- Implement the basics of evidence collection and documentation, reporting, investigative techniques, digital forensics tools, and procedures.
- Interpret requirements for investigation types of administrative, criminal, civil, regulatory, and industry standards and the associated costs.
- Identify the implications of data location in responding to security incidents.
- Conduct incident management through all stages of a breach with knowledge of detection, response, mitigation, reporting, recovery, and remediation.
- Adjust preventative measures in response to security incidents.
- Implement recovery strategies such as backup, recovery sites, multiple processing sites, and system resilience via high availability, Quality of Service (QoS), and fault tolerance.
- Develop incident reports and analysis presentations.
CYBR 650: Ethical Hacking and Defense (3 credits)
This course includes a study of theoretical and practical aspects of network and web application penetration testing. Students are able to evaluate the security of a network or system's infrastructure and outline how hackers find and attempt to exploit any vulnerabilities. Included in the course are in-depth details on ethical hacking, including reconnaissance, vulnerability assessment, exploitation, maintaining access and covering tracks. Current tools and methodologies are stressed.
Upon completion of the course, students are expected to be able to do the following:
- Explain the regulatory/legal requirements and rationale for penetration testing.
- Interpret and differentiate cyber threats and exploits in a penetration testing context.
- Distinguish key phases of ethical hacking: reconnaissance, scanning, gaining access, maintaining access, and covering the tracks.
- Perform protocol analysis using packet captures and analysis data using a network sniffer.
- Investigate and uncover network devices, operating systems, and services.
- Discover network security issues using an intrusion detection tool.
- Leverage penetration testing applications to recognize information targets across operating systems and services.
- Implement scripts and tools to assist in penetration testing.
- Deploy and test exploits targeting operating systems and services.
- Identify and exploit various vulnerabilities in web applications.
CYBR 690: Security Operations and Leadership Capstone (3 credits)
Prerequisites: All required coursework completed or co-requisite.
This course provides an opportunity for students to integrate their learning across the program into a case study project. Students complete a risk analysis, vulnerability and threat analysis, security infrastructure requirements, logical design, physical design, management design, pricing, and implementation planning.
Upon completion of this course, students are expected to be able to do the following:
- Evaluate the information security needs of an organization.
- Use secure design principles through an understanding of the fundamental concepts of security models.
- Complete the risk management process that adequately protects an organization’s critical information and assets.
- Provide recommendations for logical, physical, and management design.
- Develop an implementation plan.
- Prepare complete documentation and executive summary of the case study analysis.
- Present case analysis with narrative and visual aids.
DIGA 625: Python Programming for Technology Applications (3 credits)
The course focuses on core programming concepts such as classes and objects, controlling flow, batch processing, and error handling while working in the context of data processing, analysis, and visualization. The course explores a variety of Python packages and integration for project development. Using Python to automate workflows and create custom visualizations is discussed, and students are able to explore tabular data, spatial data, and/or cybersecurity applications of Python.
Upon completion of the course students are expected to be able to do the following:
- Develop custom visualizations that communicate data and results of an analysis.
- Respond to specific scripting requirements to address analytical problems and improve workflows.
- Apply the concepts and logic of object-oriented programming.
Find out more about how the Master of Science in Cybersecurity from Saint Mary’s can benefit your career: call 877-308-9954 to speak with an enrollment counselor or request more information.
Current Degree Requirements
For current degree requirements, visit the Saint Mary's University of Minnesota Course Catalog.