Earn your Cybersecurity Degree from University of Fairfax
Master of Cybersecurity Management
The accredited Master of Science in Cybersecurity Management (MSCSM) degree program consists of 12 online courses.
Learn from seasoned security practitioners and utilize cutting edge curriculum to take your cybersecurity credentials to the next level. The University of Fairfax Master’s program was developed by industry experts and allows you to explore the full spectrum of the cybersecurity field.
Degree Program Objectives
The MSCSM degree program develops professionals who:
- are recognized as knowledgeable and qualified practitioners in a specialized field of information security
- possess a depth of knowledge in current cybersecurity practices
- apply critical thinking and problem-solving skills in the analysis of issues relevant to the cybersecurity community
- utilize secondary research competencies in the investigation and selection of best-practice solutions to information security challenges
- demonstrate the knowledge and skills necessary to address a specialized area of information security management
Degree Program Outcomes
Upon completion of the MSCSM degree program, you will be able to:
- compile, analyze, and assess the applicability of best practices in addressing information security issues relevant to the cybersecurity community
- evaluate the impact of business constraints and processes on the implementation of information security programs
- integrate principles and techniques of risk analysis, project planning and change management in the development of information security strategies
- demonstrate secondary research skills in the investigation and selection of best practice solutions to address information security challenges
- demonstrate mastery of theory, concepts and skills in addressing specialized aspects of information security management
Please wait while flipbook is loading. For more related info, FAQs and issues please refer to DearFlip WordPress Flipbook Plugin Help documentation.
This program is offered in both a full distance education and a hybrid delivery format which allows students to take a portion of their coursework in a residential setting.
IA7000 Security in the Digital Age
In this course, students explore the eight domains of the (ISC)2 Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK) in information security as a framework to critically analyze security awareness issues and to evaluate best practices in implementing security systems within the enterprise. (3 credits)
IA7401 Ethical Hacking
This class will evaluate the security of a network or system’s infrastructure and outline how hackers find and attempt to exploit any vulnerabilities to determine whether unauthorized access or other malicious activities are possible. (3 credits)
IA8020 Security Policies, Standards, and Procedures
In this course, students examine the role of security policies, standards, and procedures in addressing business and technical risks and develop a security governance report to evaluate compliance across the enterprise. (3 credits)
IA8030 Design, Development and Evaluation of Security Controls
In this course, students transform high-level policies and procedures into quantifiable and measurable controls and mechanisms that enforce data and process integrity, availability and confidentiality. (3 credits)
IA8050 Security Risk and Vulnerability Assessment
In this course, students explore advanced techniques and tools for identifying and categorizing vulnerabilities which allow penetration of networked systems and environments. (3 credits)
IA8060 Intrusion Detection, Attacks, and Countermeasures
In this course, students examine common attack methods, technologies, and countermeasures. Students also gain skills needed to recognize various stages and methods of attack on the enterprise. (3 credits)
IA8070 Design and Development of Security Architectures
In this course, students evaluate the principles, attributes, and processes used in designing and deploying a comprehensive and resilient layered security architecture that supports the business and technical objectives of the enterprise. (3 credits)
IA8080 Security Solution Implementation
In this course, students compare, contrast, and evaluate contemporary practices in the implementation of security solutions. (3 credits)
IA8125 Information Security Policy Planning and Analysis
In this course, students develop information assurance policies and deployment plans as part of the comprehensive strategic plan and operational objectives for the enterprise. (3 credits)
Research Methods Courses
RM8250 Web-Based Research Methods in Information Security
In this course, students acquire information retrieval skills and research competencies to identify and evaluate industry-relevant sources of information for the purposes of analysis and research information security. Students compare and contrast the utility of publicly-available and subscription-based information sources for the purposes of meeting academic and professional requirements. (3 credits)
Electives 2 of 3 Classes
PM8100 Information Security Project Management
In this course, students utilize PMI’s Project Management Body of Knowledge (PMBOK) as a framework, to apply project management concepts in the information security arena. Each student develops a project plan for a security assessment which incorporates the technical and behavioral characteristics of high-performance teams. (3 credits)
IA8210 Risk Management and Compliance
In this course, students evaluate the procedures and results of risk analysis, as well as compliance processes which address the regulatory requirements that drive the need for risk analysis within the enterprise. Security related regulations such as SOX, GLBA, FISMA and HIPAA are examined. (3 credits)
IA8140 Business Continuity Planning and Recovery
In this course, students explore tools and strategies for Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP) activities. Topics include business impact assessment methods, recovery strategy approaches and solutions and continuity planning. (3 credits)
IA7402 Information Security Management
In this course, students explore the five domains of the Certified Information Security Manager (CISM). This framework will include areas in information security governance, risk management, program development, program management, and incident management and response. (3 credit hours)
Potential Careers for Master of Science in Cybersecurity Management Graduates:
An I.T. Strategist is responsible for a business’s technology strategy and for I.T. security. This is critical for a business because of the myriad ways that technology can reduce costs yield greater efficiency and profit for an organization. The strategist evaluates where the business and its clients can benefit from innovative technologies and implements this technology, ensuring compliance with security regulations.
When you graduate with a MSCSM at University of Fairfax, you will be prepared for many exciting careers in this growing industry. Our graduates have gone on to work in high-level positions in the United States Navy, the Department of Veterans Affairs, Lockheed Martin, Cisco Systems, Wells Fargo, and more!
Whether you want to work as a Chief Technology Officer, Cybersecurity Technician, Engineer, Manager, or Incident Analyst, we will help you develop the skills to succeed in your chosen career.
A maximum of 18 semester credits equivalent to our courses in content, credit and level and taken for graduate credit, as part of a degree or graduate certificate program, from an accredited institution may be transferred.
Cybersecurity Education Path
Distinguish yourself and advance your cybersecurity career by following the University of Fairfax Online Cybersecurity Education Path. No matter which graduate program you pursue, all of your courses will explore relevant cybersecurity policy and management issues, and you will complete a cybersecurity project in each course. You can apply what you learn and make significant contributions in your workplace right away.