Skip to content

Students learn to secure IT environments and infrastructure, design secure programs, lead forensic investigations across an organization, and manage cyber risks.

The program was developed with national leaders and incorporates the most current thinking and curriculum in cybersecurity. This innovative program positions cybersecurity graduates to immediately step into cybersecurity roles within the private and public sector.  The program is multi-disciplinary and integrates computer science and engineering, math, legal, and cyber-management courses.

It is further designed to align with the National Initiative for Cybersecurity Education (NICE) framework which is a partnership between government, private sector, and academia and is focused on education, training, and workforce development, and is led by the National Institute of Standards and Technology (NIST).  Courses are also aligned with the National Security Agency’s (NSA) and the Department of Homeland Security’s Center of Academic Excellence (CAE) criteria.

The program allows students to pursue the concentration best suited to their aptitude – this includes an option for a cyber management and leadership track or a cyber operations management track. It also includes extensive hands-on requirements in which you participate in applied and research-based projects, internships, and/or an occupational practicum to gain real-world experience.

Career Outlook

The demand in cybersecurity is high. Graduates of the program are prepared for careers in a wide-range of roles. These include: Director of Information Security, Information System Security Officer (ISSO), Cybersecurity Architect, Director/Manager of Governance, Risk, and Compliance, and Risk Manager/Analyst.

Program Goals

Graduates of the Cybersecurity Operations and Management program can:

Program Concentrations

Program Lead

 Lisa  Schlosser

Lisa Schlosser Corporate Faculty (Cybersecurity Operations and Management)

View Profile

Corporate Faculty

Lisa Schlosser

Corporate Faculty (Cybersecurity Operations and Management)

Brandon S. Keath

Corporate Faculty (Cybersecurity Operations and Management)

Program Courses

The following 11 courses comprise the required core courses of the Cybersecurity Operations and Management program. The credit value of each course appears in parentheses ( ).

CYOM 105 – Introduction to Cybersecurity (3 credits)

This course provides students with basic concepts of cybersecurity fundamentals. Students receive a basic awareness of threats to information systems, vulnerabilities inherent to modern architectures and the options available to mitigate threats within a system.

Prerequisites: None
Corequisites: None

CYOM 130 – Cybersecurity Ethics & Policy (3 credits)

This course provides students with an understanding of information security policy and how to apply industry and government best practice rules and guidelines. Students begin to create, implement, and institutionalize organization policies that ensure legal, ethical, privacy and compliance standards which are supported. The course compares and contrasts the role of government versus commercial security, to include funding, culture, stakeholders, and classified information protections.

Prerequisites: CYOM 105
Corequisites: None

CISC 120 – Programming I (4 credits)

This course introduces the concepts and techniques of computer programming. Emphasis is placed on developing the student’s ability to apply problem-solving strategies to design algorithms and to implement these algorithms in a modern, structured programming language. Topics include fundamental programming constructs, problem solving techniques, simple data structures, Object-Oriented Programming (OOP), program structure, data types and declarations, control statements, algorithm strategies and algorithm development.

Prerequisites: None
Corequisites: None

CYOM 215 – CritThinkReasng & Anly in CyberSec (3 credits)

Relating to people, process and technology this course provides students the methods to think through and solve complex global cybersecurity problems. Students are introduced to specific methodologies regarding systems engineering and processes, such as Shewhart cycle, OODA loop, and RPR diagnosis as they apply to networks and cybersecurity.

Prerequisites: None
Corequisites: None

MEBA 220 – Prin Business Mgmt (3 credits)

The student is provided with analytical tools to understand and synthesize the most current applications of theories and concepts in business management and is exposed to the debate on the dynamic of busniess environment, evolving business models, economic systems, and scale of domestic and global competition in the market place.

Prerequisites: None
Corequisites: None

CYOM 230 – Cyber Defense (3 credits)

This course provides students with a basic awareness of the options available to understand and mitigate threats within a system. It demonstrates the methodologies used by threat actors to exploit systems and how cyber security professionals can architect more secure systems that support business imperatives, while mitigating cyber risks. An overview of applications, networks, mobile devices, wireless security, and tool categories such as firewall, SIEM, and vulnerability management tools are discussed.

Prerequisites: None
Corequisites: None

CYOM 322 – Fund Security Design Principles (3 credits)

This course provides students with a basic awareness for building defense in depth architectures and security controls into an organization’s technology processes, workforce considerations and network architectures. As part of this course, students gain a preliminary understanding of cryptography and concepts such as authentication.

Prerequisites: None
Corequisites: None

CYOM 340 – Cybersecurity Systems Admin (3 credits)

This course provides students with foundational knowledge in secure networking concepts, technology, and administration. Network security is an essential requirement in building a secure resilient infrastructure. Students learn technical and administrative components of secure networks, how to apply secure design principles to configure network resources (routers, switches, firewalls, IPSes) and how to securely administer the network. Threats to network security are examined and security controls are designed to appropriately mitigate risks. Network and system administration policies and procedures are examined.

Prerequisites: None
Corequisites: None

CISC 225 – Information Syst Design & Analysis (3 credits)

This course is a foundation for database design and database security courses. Systems Analysis and Design is a fundamental, active field in which analysts continually learn new techniques and approaches to develop systems more effectively and efficiently. There is a core set of skills that all analysts need to know no matter what approach or methodology is used. All information systems projects move through the four phases of planning, analysis, design, and implementation; all projects require analysts to gather requirements, model the business needs, and create blueprints for how the systems should be built; and all projects require an understanding of organizational behavior concepts like change managememnt and team building. This course captures the dynamic aspects of the field by keeping the student focused on doing Systems Analysis and Design while presenting the core set of skills that the analysts needs to know.

Prerequisites: None
Corequisites: None

CYOM 410 – Cloud Cybersecurity and Governance (3 credits)

This course provides students with the design fundamentals of the compliance and management governing of the deployment of cloud services. The technologies and services that enable cloud computing, different types of cloud computing models and the security and legal issues associated with cloud computing are covered.

Prerequisites: None
Corequisites: None

CYOM 430 – Prin of Secure DB Design Systems (3 credits)

This course provides an overview of database security concepts and techniques and discusses new directions of database security. Topics covered include database application security models, database and data auditing, XML access control, trust management and privacy protection, encryption methods, virtual private databases, risk assessment and mitigation, vulnerability scanning and user access control. The focus is on the key components of information assurance as it relates to database systems – confidentiality, integrity, and availability, and how these components can be managed and measured. Students conduct security assessments and audits of an existing database.

Prerequisites: None
Corequisites: None

Take the Next Step

Get More Information

Questions about our programs? Reach out to a member of our team and get personalized answers.

Apply Now

Create an account and start your free online application to Harrisburg University today.

326 Market St, Harrisburg, PA 17101
P: (717) 901-5100 Contact Us