Master of Science in Management - Information Systems Security Concentration

An almost continuous stream of security-related incidents is affecting millions of computer systems and networks throughout the world. Organizations are constantly experiencing these attacks and security incidents; they constitute a risk to their organizational mission. The loss or corruption of information systems can significantly impact the organization and result in a substantial loss of revenue. To address these threats, organizations, both private and government, are investing considerable funds to adopt security measures to make their organizations safe.

Course content includes a solid core of project management curriculum plus courses in information systems security. This program is designed to provide the student with the information system security skills necessary to manage and protect the vital technology assets of today’s organizations. The Master of Science in Management with a concentration in Information Systems Security (MSM-ISS) degree program is designed to prepare technical leaders in security management to combat threats in today’s environment through an understanding of security management, network security principles, and certification and accreditation requirements.

 

MSM Program prepares the student to:

  • Evaluate the appropriate leadership and management actions needed across disciplines and in various global environments
  • Synthesize theory and practice in day-to-day managerial decision making and organizational change
  • Apply appropriate strategic, technical, operational, and ethical principles to solve organizational challenges and meet organizational goals and objectives.

 

MSM- ISS program competencies:

  • Plan projects effectively and successfully, taking into consideration the quadruple constraints of time, cost, resources, and specifications
  • Develop from the basic project plan a work-breakdown structure to the lowest granularity permitted by cost
  • Determine and calculate project risks according to classical risk analysis
  • Plan and manage contractual purchasing issues, including, procurement and supply,
  • outsourcing and just-in-time acquisition
  • Evaluate and present project objectives, requirements, scope, and budgeting effectively to upper management
  • Define technical requirements for the implementation of an effective security infrastructure
  • Identify and describe the impact of implementing security components at all OSI layers
  • Develop effective enterprise level security policies, standards and procedures
  • Identify and develop necessary enterprise/government systems certification and accreditation procedures and best commercial practices

Degree Requirements

Courses: Core

MGMT690Strategic Management in Dynamic Environments

4

IT635Information Systems Auditing

4

PM600Project Management Processes in Organizations

4

PM610Project Planning, Execution and Closure

4

PM620Schedule and Cost Control Techniques

4

PM630Contracting and Procurement in Project Management

4

PM665Project Management Capstone

4

Total Credit Hours:28

Courses: Concentration

CS651Computer Systems Security Foundations

4

CS653Network Security

4

CS654Security Management

4

CS661Software Information Assurance

4

CS662System Security Certification and Accreditation

4

Total Credit Hours:20

Total Credit Hours: 48

The Master of Science in Management with a Concentration in Information Systems Security delivered at the applicable ground campuses is accredited by the PMI Global Accreditation Center for Project Management Education Programs (GAC).

CTU is a recognized provider with the Project Management Institute (PMI™) Educational Provider Program (PMI R.E.P.)

National Security Agency and Department of Homeland Security

The Department of Homeland Security and the National Security Agency have recognized Colorado Technical University as a National Center of Academic Excellence in Information Assurance and Cyber Defense (CAE IA/CD). The CTU cyber security curriculum was certified thereby to map to the DHS/NSA cybersecurity knowledge units. This recognition and certification is valid through 2021.

This CAE IA/CD designation is applicable to this degree program.

Locations

  • Colorado Springs
  • Aurora (Denver Area)
  • Virtual Campus

Area of Study

  • Business & Management
  • Information Technology