Overview
This Cybersecurity Management program from Strayer University covers the latest concepts in cybersecurity. You’ll learn to develop information technology strategies and mitigate the risk of cybercrimes to improve quality, timeliness and competitive advantage for organizations.
Careers
Your education can help you pursue your professional and personal goals. While Strayer cannot guarantee that a graduate will secure any specific career outcome, such as a job title, promotion or salary increase, we encourage you to explore the potential impact you can have in the cybersecurity field.
The cybersecurity management concentration applies current and emerging security management best practices to protect computing environments and reduce risk to organizations.
Concepts reviewed include theories of security management, IT risk management and Cybercrime Techniques and Response. Students will be able to develop information technology strategies to improve quality, timeliness and competitive advantage for organizations.
In addition, students who complete this concentration will be prepared to:
- Control computer file access to protect information and monitor how data files are used.
- Create strategies to protect computer files from accidental or unauthorized access, changes or destruction.
- Discuss computer data access needs, security breaches and programming changes with users.
- Encrypt data transmissions and set up firewalls to hide confidential information while it’s being sent and prevent harmful digital transfers.
- Evaluate potential risks and perform data processing system tests to ensure data processing activities and security measures are working properly.
- Keep and manage special communication and support systems needed for specific land, sea and underwater operations.
- Make changes to computer security files to include new software, fix mistakes or adjust access permissions.
- Manage virus protection system updates and monitor computer virus reports.
- Monitor computer security procedure violations and review the procedures with those who violated them to prevent future incidents.
- Raise awareness about security and train staff to keep the IT system safe and enhance server and network efficiency.
- Record policies, procedures and tests related to computer security and emergency measures.
- Take the Systems Security Certified Practitioner exam.
- Work with company staff and external vendors to organize the implementation of computer system plans.
Programme Structure
Courses include:
- Information Systems for Decision-Making
- Theories of Security Management
- IT Risk Management
- Cybercrime Techniques and Response
- Strategic Management
- Business Communications
- Managerial Economics and Globalization
- Financial Management
Key information
Start dates & application deadlines
- StartingApplication deadline not specified.
- StartingApplication deadline not specified.
- StartingApplication deadline not specified.
Language
Prepare for Your English Test
AI-powered IELTS feedback. Clear, actionable, and tailored to boost your writing & speaking score. No credit card or upfront payment required.
- Trusted by 300k learners
- 98 accuracy using real exam data
- 4.9/5 student rating
Credits
Delivered
Campus Location
- Herndon, United States
Disciplines
Management Studies Master in Business Administration (MBA) Cyber Security View 404 other Masters in Master in Business Administration (MBA) in United StatesWhat students do after studying
Academic requirements
English requirements
Prepare for Your English Test
AI-powered IELTS feedback. Clear, actionable, and tailored to boost your writing & speaking score. No credit card or upfront payment required.
- Trusted by 300k learners
- 98 accuracy using real exam data
- 4.9/5 student rating
Other requirements
General requirements
- A completed application and enrollment agreement, as applicable.
- Proof of a completed baccalaureate degree from an accredited college or university with a cumulative GPA of 2.50 out of 4.0.
- Official copies of transcripts from all other colleges or universities attended.
- A valid, current and legible government-issued photo ID.
Tuition Fees
-
International Applies to you
Applies to youNon-residents2985 USD / module≈ 2985 USD / module - Out-of-State2985 USD / module≈ 2985 USD / module
-
Domestic
Applies to youIn-State2490 USD / module≈ 2490 USD / module
Additional Details
Cost per course.
Funding
In order for us to give you accurate scholarship information, we ask that you please confirm a few details and create an account with us.
Scholarships Information
Below you will find Master's scholarship opportunities for Cybersecurity Management.
Available Scholarships
You are eligible to apply for these scholarships but a selection process will still be applied by the provider.
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility