Master of ScienceCybersecurity Operations and Control Management
The 36-semester hour Master of Science degree in Cybersecurity Operations and Control Management focuses on architecture and engineering of computer network security.
Harrisburg University’s Cybersecurity Operations and Control Management program is designed to meet the demand for cybersecurity professionals to protect corporate IT assets, handling day-to-day cybersecurity operations in any organization. Program graduates work across diverse industry sectors in cybersecurity roles such as cybersecurity engineer or architect, cloud security analyst, cloud security engineer or architect, information privacy officer, information security officer or auditor, chief information security officer, or consultant.
Advanced individual course electives and the Capstone Project allow Students to become subject matters experts developing specialized skills areas of cybersecurity.
There are currently more than 1.15M million job openings in cybersecurity. A student graduating with a Master’s degree should expect a six-figure salary ($100,000) depending on work experience and location.
The student acquires the skills to secure network information, design computer security architecture, and data security engineering as well as obtain leadership skills, understanding of ethics, and compliance knowledge.
Graduates of the Master of Science in Cybersecurity Operations and Control Management program will be able to:
- Examine the many aspects and ramifications of the internet and the wide spectrum of applications;
- Differentiate the working elements of computer networks and infrastructures;
- Apply the latest advances in internet security to protect the networks for a variety of applications;
- Investigate emerging technologies of complex contemporary security measures; and,
- Explore common ethical and public policy problems that arise and how technology/law solve them.
- Cybersecurity and Cyber Warfare
Bruce Young, DIA Academic Content Lead for SCE, Instructor and Program Lead of Cybersecurity & Information Assurance
The following courses comprise the Master of Science in Cybersecurity Operations and Control Management – 36 semester hours. The semester hour value of each course appears in parentheses ( ).
Information networking lays the groundwork for analysis of concepts that form the foundation to study Cybersecurity. The Internet contains a constant flow of information in the form of packets over interconnected network devices. This topic covers protocols, software, hardware, and functions that support networking services, such as switching/routing, virtual networking concepts, domain name services, directory services, and other Internet required protocols.
To understand security architecture, you must first understand architecture in general. At first glance, security and architecture are diametrically opposed. Security is freedom from, or resilience against, potential harm. Architecture is meant to build things up to make them more useful. Security architecture is the design, development, and implementation of resilient networks and systems to protect the information that is stored, transmitted, and processed.
This course provides guidelines for data security utilizing cloud computing by determining the boundaries of the cloud service provider (CSP) responsible for ensuring that customer data is properly secured. Depending on the cloud services (i.e. IaaS, PaaS, SaaS), the security of the data is the responsibility of the Cloud Service Consumer (CSC) themselves. For example, in some cases the CSP may be responsible for restricting access to the data, while the CSC remains responsible for deciding which cloud service users (CSUs) should have access to it, and the behavior of any scripts or applications with which the CSU processes the data. This course identifies the security controls protecting CSC data that can be used in the different stages of the full data lifecycle.
Cybersecurity for applications and software provides the security architecture as it applies to the continuous development and deployment of application and software. This course demonstrates the techniques to improve the organization’s security at every level, including the application and software layer. By combining development operations and security with consideration for cloud services, an integrated approach is used to ensure the cyber protections are implemented at all levels of the infrastructure. This course will provide the skills to implement security at each layer, such as web application, cloud infrastructure, communication, and service delivery. Topics include exploring core security aspects of blocking attacks, fraud detection, cloud forensics, and incident response. Additionally, cybersecurity topics on extending development operations (DevSecOps) security practices, risk assessment, threat modeling, and continuous security monitoring.
In this course, the student will explore leadership and ethical business decision making as related to the use of technology. Ethical obligations have both a professional and a personal dimension. Each are essential to consider; without a sense of personal ethics, one would be indifferent to their effect on the lives of others in circumstances where one’s professional code is silent. Personal leadership helps us to be sure that we take full responsibility for our moral choices and their consequences. This course addresses professional leadership and ethics in information technology as it applies to practical business managers and systems. This course teaches the student how to gain knowledge and understanding of a number of aspects, including: the types of harms the public can suffer as result of misuse of information technology; the importance of an individual privacy of information; legal and constitutional rights to protect information; and obligations of organizations to protect the public and ethical decision making.
The course introduces the student to the interdisciplinary field of cybersecurity. Topics include the evolution of information security into cybersecurity and exploring the relationship of cybersecurity to organizations and society. Analysis of the threats and risks to/in these environments are examined. The ultimate goal of this course is for the student to acquire the advanced knowledge required to develop the skills needed to integrate knowledge from this course into a workplace environment. Cross-listed with CISC 661.
This course integrates cyber risk management into day-to-day operations. Additionally, it enables an enterprise to be prepared to respond to the inevitable cyber incident, restore normal operations and ensure that the enterprise assets and the enterprise’s reputation are protected. This course focuses the student on a broad range of topics relative to the tools used to protect the enterprise from today’s cyber-threats. The intent is to focus on creating risk-based assessment tools for modeling approaches to solve cybersecurity issues, so organizations can build security framework and sustain a healthy security posture. This course analyzes external and internal security threats, failed systems development and system processes, and explores their respective risk mitigation solutions through policies, best practices, operational procedures, and government regulations. Cross-listed with CISC 662.
This course integrates knowledge accumulated from the prerequisites and serves as a capstone for the concentration in Computer Security. Attention is focused on the techniques for protecting critical information infrastructures and the process of identifying the risk to data and information using case studies, application development, and systems assessment. Cross-listed with CISC 663.
This course explores a topic or collection of topics of special interest that is timely and in response to critical or emerging topics in the broad field of Cybersecurity Operations and Control Management.
This course explores a topic or collection of current topics that are timely and in response to critical or emerging topics in the broad field of Cybersecurity Operations and Control Management.
This course allows the student to pursue an area of interest that is within the broad scope of Cybersecurity Operations and Control Management. A faculty member will supervise this study.
This course guides the student to develop and finalize a selected research problem and to construct a proposal that effectively establishes the basis for either writing a thesis or launching an experiential capstone project. The course provides an overview of strategies for effective problem investigation and solution proposal. Research methodology is studies and applied as part of suggesting a solution to a problem. Writing and formatting techniques are also explored and applied as a communication tool for cataloging the investigation and recommending the solution.
Information for Students who want to come to the U.S.
Harrisburg University Hosts Cybersecurity Summit Aimed at Tackling Industry Challenges
October 4–5, Harrisburg University department of Professional Development kicked off Cybersecurity month, 2023 by hosting a Cybersecurity Summit in partnership…
Harrisburg University Expands Project Management Program with Concentrations in Cybersecurity and Healthcare Informatics
HARRISBURG, PA – October 4, 2023 – Harrisburg University is announcing a significant expansion of its Project Management program starting in…
Be careful on Cyber Monday
Estimates are that shoppers will spend more than $11 billion on Cyber Monday. HU professor Dr. Bruce Young offered tips…
Here’s the direction that technology is going in and how to use it safely
According to Pew Research Center, 77% of seniors report that they would require assistance when trying to learn how to…
Avoid Online Shopping Scams
Major retailers are rolling out holiday promotions as millions of Americans begin searching for the perfect gift. A Harrisburg University…
NuPaths awarded grant to help underserved students
NuPaths, an IT and tech workforce development training provider co-founded by Harrisburg University of Science and Technology, is one of…
Take the Next Step
Get More Information
Questions about our programs? Reach out to a member of our team and get personalized answers.
Create an account and start your free online application to Harrisburg University today.