Master of ScienceCybersecurity Operations and Control Management
The 36-semester hour Master of Science degree in Cybersecurity Operations and Control Management focuses on architecture and engineering of computer network security.
Apply Now Request Info
Harrisburg University’s Cybersecurity Operations and Control Management program is designed to meet the demand for cybersecurity professionals to protect corporate IT assets, handling day-to-day cybersecurity operations in any organization. Program graduates work across diverse industry sectors in cybersecurity roles such as cybersecurity engineer or architect, cloud security analyst, cloud security engineer or architect, information privacy officer, information security officer or auditor, chief information security officer, or consultant.
Advanced individual course electives and the Capstone Project allow Students to become subject matters experts developing specialized skills areas of cybersecurity.
There are currently more than 1.15M million job openings in cybersecurity. A student graduating with a Master’s degree should expect a six-figure salary ($100,000) depending on work experience and location.
Program Goals
The student acquires the skills to secure network information, design computer security architecture, and data security engineering as well as obtain leadership skills, understanding of ethics, and compliance knowledge.
Graduates of the Master of Science in Cybersecurity Operations and Control Management program will be able to:
- Examine the many aspects and ramifications of the internet and the wide spectrum of applications;
- Differentiate the working elements of computer networks and infrastructures;
- Apply the latest advances in internet security to protect the networks for a variety of applications;
- Investigate emerging technologies of complex contemporary security measures; and,
- Explore common ethical and public policy problems that arise and how technology/law solve them.
Program Concentration
- Cybersecurity and Cyber Warfare
Program Courses
The following courses comprise the Master of Science in Cybersecurity Operations and Control Management – 36 semester hours. The semester hour value of each course appears in parentheses ( ).
CYOM 503 –
Principles of Computer Networking
(3 credits)
Information networking lays the groundwork for analysis of concepts that form the foundation to study Cybersecurity. The Internet contains a constant flow of information in the form of packets over interconnected network devices. This topic covers protocols, software, hardware, and functions that support networking services, such as switching/routing, virtual networking concepts, domain name services, directory services, and other Internet required protocols.
CYOM 521 –
Cybersecurity Architecture and Resiliency
(3 credits)
To understand security architecture, you must first understand architecture in general. At first glance, security and architecture are diametrically opposed. Security is freedom from, or resilience against, potential harm. Architecture is meant to build things up to make them more useful. Security architecture is the design, development, and implementation of resilient networks and systems to protect the information that is stored, transmitted, and processed.
CYOM 535 –
Principles of Cloud Security
(3 credits)
This course provides guidelines for data security utilizing cloud computing by determining the boundaries of the cloud service provider (CSP) responsible for ensuring that customer data is properly secured. Depending on the cloud services (i.e. IaaS, PaaS, SaaS), the security of the data is the responsibility of the Cloud Service Consumer (CSC) themselves. For example, in some cases the CSP may be responsible for restricting access to the data, while the CSC remains responsible for deciding which cloud service users (CSUs) should have access to it, and the behavior of any scripts or applications with which the CSU processes the data. This course identifies the security controls protecting CSC data that can be used in the different stages of the full data lifecycle.
CYOM 569 –
Securing Software and Application Environments
(3 credits)
Cybersecurity for applications and software provides the security architecture as it applies to the continuous development and deployment of application and software. This course demonstrates the techniques to improve the organization’s security at every level, including the application and software layer. By combining development operations and security with consideration for cloud services, an integrated approach is used to ensure the cyber protections are implemented at all levels of the infrastructure. This course will provide the skills to implement security at each layer, such as web application, cloud infrastructure, communication, and service delivery. Topics include exploring core security aspects of blocking attacks, fraud detection, cloud forensics, and incident response. Additionally, cybersecurity topics on extending development operations (DevSecOps) security practices, risk assessment, threat modeling, and continuous security monitoring.
CYOM 599 –
Leadership, Ethics, and Compliance in Cybersecurity Industry
(3 credits)
In this course, the student will explore leadership and ethical business decision making as related to the use of technology. Ethical obligations have both a professional and a personal dimension. Each are essential to consider; without a sense of personal ethics, one would be indifferent to their effect on the lives of others in circumstances where one’s professional code is silent. Personal leadership helps us to be sure that we take full responsibility for our moral choices and their consequences. This course addresses professional leadership and ethics in information technology as it applies to practical business managers and systems. This course teaches the student how to gain knowledge and understanding of a number of aspects, including: the types of harms the public can suffer as result of misuse of information technology; the importance of an individual privacy of information; legal and constitutional rights to protect information; and obligations of organizations to protect the public and ethical decision making.
CYOM 661 –
Principles of Cybersecurity & Cyber Warfare
(3 credits)
The course introduces the student to the interdisciplinary field of cybersecurity. Topics include the evolution of information security into cybersecurity and exploring the relationship of cybersecurity to organizations and society. Analysis of the threats and risks to/in these environments are examined. The ultimate goal of this course is for the student to acquire the advanced knowledge required to develop the skills needed to integrate knowledge from this course into a workplace environment. Cross-listed with CISC 661.
CYOM 662 –
Ethical Hacking Development Lab
(3 credits)
This course integrates cyber risk management into day-to-day operations. Additionally, it enables an enterprise to be prepared to respond to the inevitable cyber incident, restore normal operations and ensure that the enterprise assets and the enterprise’s reputation are protected. This course focuses the student on a broad range of topics relative to the tools used to protect the enterprise from today’s cyber-threats. The intent is to focus on creating risk-based assessment tools for modeling approaches to solve cybersecurity issues, so organizations can build security framework and sustain a healthy security posture. This course analyzes external and internal security threats, failed systems development and system processes, and explores their respective risk mitigation solutions through policies, best practices, operational procedures, and government regulations. Cross-listed with CISC 662.
CYOM 663 –
Cyber Risk Assessment and Management
(3 credits)
This course integrates knowledge accumulated from the prerequisites and serves as a capstone for the concentration in Computer Security. Attention is focused on the techniques for protecting critical information infrastructures and the process of identifying the risk to data and information using case studies, application development, and systems assessment. Cross-listed with CISC 663.
GRAD 695 –
Research Methodology & Writing
(3 credits)
This course guides the student to develop and finalize a selected research problem and to construct a proposal that effectively establishes the basis for either writing a thesis or launching an experiential capstone project. The course provides an overview of strategies for effective problem investigation and solution proposal. Research methodology is studies and applied as part of suggesting a solution to a problem. Writing and formatting techniques are also explored and applied as a communication tool for cataloging the investigation and recommending the solution.
Get More Information
Questions about our programs? Reach out to a member of our team and get personalized answers.
Apply Now
Create an account and start your free online application to Harrisburg University today.
© 2024 Harrisburg University of Science and Technology™, All rights reserved. (™) The name Harrisburg University of Science and Technology and all derivatives including emblem and customized font are trademarks pursuant to PA Trademark Act, 54 Pa.C.S.A.:1114.