Skip to content

Harrisburg University’s Cybersecurity Operations and Control Management program is designed to meet the demand for cybersecurity professionals to protect corporate IT assets, handling day-to-day cybersecurity operations in any organization. Program graduates work across diverse industry sectors in cybersecurity roles such as cybersecurity engineer or architect, cloud security analyst, cloud security engineer or architect, information privacy officer, information security officer or auditor, chief information security officer, or consultant.

Advanced individual course electives and the Capstone Project allow Students to become subject matters experts developing specialized skills areas of cybersecurity.

There are currently more than 1.15M million job openings in cybersecurity. A student graduating with a Master’s degree should expect a six-figure salary ($100,000) depending on work experience and location.

Program Goals

The student acquires the skills to secure network information, design computer security architecture, and data security engineering as well as obtain leadership skills, understanding of ethics, and compliance knowledge.

Graduates of the Master of Science in Cybersecurity Operations and Control Management program will be able to:

Program Concentration

Program Lead

 Bruce  Young, DIA

Bruce Young, DIA Academic Content Lead for SCE, Instructor and Program Lead of Cybersecurity & Information Assurance

View Profile

Program Courses

The following courses comprise the Master of Science in Cybersecurity Operations and Control Management – 36 semester hours. The semester hour value of each course appears in parentheses ( ).

CYOM 503 – Principles of Computer Networking (3 credits)

Information networking lays the groundwork for analysis of concepts that form the foundation to study Cybersecurity. The Internet contains a constant flow of information in the form of packets over interconnected network devices. This topic covers protocols, software, hardware, and functions that support networking services, such as switching/routing, virtual networking concepts, domain name services, directory services, and other Internet required protocols.

CYOM 521 – Cybersecurity Architecture and Resiliency (3 credits)

To understand security architecture, you must first understand architecture in general. At first glance, security and architecture are diametrically opposed. Security is freedom from, or resilience against, potential harm. Architecture is meant to build things up to make them more useful. Security architecture is the design, development, and implementation of resilient networks and systems to protect the information that is stored, transmitted, and processed.

CYOM 535 – Principles of Cloud Security (3 credits)

This course provides guidelines for data security utilizing cloud computing by determining the boundaries of the cloud service provider (CSP) responsible for ensuring that customer data is properly secured. Depending on the cloud services (i.e. IaaS, PaaS, SaaS), the security of the data is the responsibility of the Cloud Service Consumer (CSC) themselves. For example, in some cases the CSP may be responsible for restricting access to the data, while the CSC remains responsible for deciding which cloud service users (CSUs) should have access to it, and the behavior of any scripts or applications with which the CSU processes the data. This course identifies the security controls protecting CSC data that can be used in the different stages of the full data lifecycle.

CYOM 569 – Securing Software and Application Environments (3 credits)

Cybersecurity for applications and software provides the security architecture as it applies to the continuous development and deployment of application and software. This course demonstrates the techniques to improve the organization’s security at every level, including the application and software layer. By combining development operations and security with consideration for cloud services, an integrated approach is used to ensure the cyber protections are implemented at all levels of the infrastructure. This course will provide the skills to implement security at each layer, such as web application, cloud infrastructure, communication, and service delivery. Topics include exploring core security aspects of blocking attacks, fraud detection, cloud forensics, and incident response. Additionally, cybersecurity topics on extending development operations (DevSecOps) security practices, risk assessment, threat modeling, and continuous security monitoring.

CYOM 599 – Leadership, Ethics, and Compliance in Cybersecurity Industry (3 credits)

In this course, the student will explore leadership and ethical business decision making as related to the use of technology. Ethical obligations have both a professional and a personal dimension. Each are essential to consider; without a sense of personal ethics, one would be indifferent to their effect on the lives of others in circumstances where one’s professional code is silent. Personal leadership helps us to be sure that we take full responsibility for our moral choices and their consequences. This course addresses professional leadership and ethics in information technology as it applies to practical business managers and systems. This course teaches the student how to gain knowledge and understanding of a number of aspects, including: the types of harms the public can suffer as result of misuse of information technology; the importance of an individual privacy of information; legal and constitutional rights to protect information; and obligations of organizations to protect the public and ethical decision making.

CYOM 661 – Principles of Cybersecurity & Cyber Warfare (3 credits)

The course introduces the student to the interdisciplinary field of cybersecurity. Topics include the evolution of information security into cybersecurity and exploring the relationship of cybersecurity to organizations and society. Analysis of the threats and risks to/in these environments are examined. The ultimate goal of this course is for the student to acquire the advanced knowledge required to develop the skills needed to integrate knowledge from this course into a workplace environment. Cross-listed with CISC 661.

CYOM 662 – Ethical Hacking Development Lab (3 credits)

This course integrates cyber risk management into day-to-day operations. Additionally, it enables an enterprise to be prepared to respond to the inevitable cyber incident, restore normal operations and ensure that the enterprise assets and the enterprise’s reputation are protected. This course focuses the student on a broad range of topics relative to the tools used to protect the enterprise from today’s cyber-threats. The intent is to focus on creating risk-based assessment tools for modeling approaches to solve cybersecurity issues, so organizations can build security framework and sustain a healthy security posture. This course analyzes external and internal security threats, failed systems development and system processes, and explores their respective risk mitigation solutions through policies, best practices, operational procedures, and government regulations. Cross-listed with CISC 662.

CYOM 663 – Cyber Risk Assessment and Management (3 credits)

This course integrates knowledge accumulated from the prerequisites and serves as a capstone for the concentration in Computer Security. Attention is focused on the techniques for protecting critical information infrastructures and the process of identifying the risk to data and information using case studies, application development, and systems assessment. Cross-listed with CISC 663.

CYOM 683 – Special Topics in Cybersecurity Operations and Control Management (3 credits)

This course explores a topic or collection of topics of special interest that is timely and in response to critical or emerging topics in the broad field of Cybersecurity Operations and Control Management.

CYOM 693 – Current Topics in Cybersecurity Operations and Control Management (3 credits)

This course explores a topic or collection of current topics that are timely and in response to critical or emerging topics in the broad field of Cybersecurity Operations and Control Management.

CYOM 699 – Applied Project in Cybersecurity Operations and Control Management (3 credits)

This course allows the student to pursue an area of interest that is within the broad scope of Cybersecurity Operations and Control Management. A faculty member will supervise this study.

GRAD 695 – Research Methodology & Writing (3 credits)

This course guides the student to develop and finalize a selected research problem and to construct a proposal that effectively establishes the basis for either writing a thesis or launching an experiential capstone project. The course provides an overview of strategies for effective problem investigation and solution proposal. Research methodology is studies and applied as part of suggesting a solution to a problem. Writing and formatting techniques are also explored and applied as a communication tool for cataloging the investigation and recommending the solution.

International Admissions

Information for Students who want to come to the U.S.

The University is home to more than 5,000 international students representing 110 countries.

Take the Next Step

Get More Information

Questions about our programs? Reach out to a member of our team and get personalized answers.

Apply Now

Create an account and start your free online application to Harrisburg University today.