Lindenwood’s Master’s in Cybersecurity Management program requires you to complete 12 cybersecurity courses online including a capstone course or optional internship in cybersecurity management.
Requirements (3 hours)
This course will tie together components of managing cybersecurity. Students will prepare a paper and a presentation to demonstrate how they will implement the policy document they developed in cybersecurity class. The paper and presentation will show how students can identify organizational cybersecurity technology needs and successfully acquire and deploy that technology using the policy. Finally, the paper and presentation will show how students will create awareness among employees to facilitate implementation and ensure smooth enterprise-wide adoption of the policy. Must be taken upon completion of all coursework or concurrent with last course.
This course will be the culminating project for the degree program. The instructor will mentor students and guide them to completion of an internship, demonstrating successful completion of the degree. Procurement of the Internship site will be the responsibility of the student. Must be taken upon completion of all coursework or concurrent with last course.
Core Courses (33 hours)
The rules of digital evidence, as statutory and constitutional law prescribes them, are examined in this course. The long – standing history of proper evidentiary procedure is explored in depth and is made relevant through examination of related Supreme Court cases.
This class will focus on the overarching responsibility of securing a network. It will include both physical security, data security, and a detailed evaluation of managing security in a corporate environment.
This course reviews industry accepted standards and the frameworks that provide the cornerstones of IT compliance and management in organizations, which serve as the foundation for the development of IT policies to manage IT resources and the relationship between IT and other organizational entities. Several standards and frameworks will be examined, such as COBIT, ITIL, Zachman, PCI DSS, ISO 2700 series, NIST 800 series, and others, focusing on how they are used to develop IT policies and procedures to manage and protect organizational IT resources and the relation between IT and other business entities in an ethical fashion.
In this course students will analyze frameworks and best practices for managing IT projects, including agile and waterfall, to achieve organizational goals and objectives. Topics to be covered include definition of project scope, time and cost, trade-off analysis, cost estimation techniques, and learning curves. Students will define the requirements for a software development or network security deployment project, including the technical requirements; business user requirements; reporting and data requirements; security, access control, and compliance requirements; and/or service level requirements, as applicable for the type of project. Students will also create a project plan for their software development or network security deployment project as their major assignment in the course.
This course integrates theory, research, and applications that provide the cornerstones for the study of managing within organizations. The functions of management, human behavioral studies, and leadership styles are examined. In addition, IT and its relationship to other departments is considered.
This course is designed to introduce students to the convention and expectations of graduate coursework and to the business and technological communication of IT professionals. Topics will include: academic integrity, academic formatting, paraphrasing, citation, and referencing; thesis writing; presentation, support, and development of ideas; coherence, language formality, language accuracy, and voice; types of academic, business, and IT writing. The goal of this course is to develop students? abilities to communicate accurately and effectively in their academic and professional careers.
In this course, students will use four of the eight domains of (ISC)2 CISSP’s Common Body of Knowledge (CBK) in information security as a framework to conduct critical analysis and evaluation of the relationship between cybersecurity and business systems. Students will perform a detailed analysis of managing cybersecurity in a corporate environment and how that impacts corporate strategic decision-making and business performance.
In this course, students will use the remaining four of the eight domains of the (ISC)2 CISSP’s Common Body of Knowledge (CBK) in information security as a framework to further analyze and evaluate the relationship between cybersecurity and business systems and focus on the overarching responsibility of securing organizational information assets.
In this course, students will build on their experience and knowledge from IIT 56501 and dig further into perimeter defense; application vulnerabilities; threat agents and vectors; the relationship between risk, threat, and vulnerability; and penetration testing concepts. Various means through which systems are hacked or compromised, countermeasures, and areas such as business continuity and forensics evaluation best practices will also be explored. Lab fee may be required.
In this course, the student will research current topics surrounding security by consulting relevant trade journals and the World Wide Web. Developing an awareness of and the ability to effectively communicate a solution to senior management regarding current security risks will be a key component of this class. Some current risks include phishing, identity theft, user awareness, man in the middle attacks, and distributed denial of service attacks.
Most, if not all, contemporary cybersecurity issues begin with underlying software problems. Consequently, secure development of software has become more critical than ever to the fight against cybercrimes and other cybersecurity issues. This course exposes students to secure development of applications by exploring implementation of security controls in developing underlying software for applications such as web, mobile, and transactional applications.
As you’re making your decision about pursuing an online degree, you are likely to have questions. From program information to details about the application process, we’re here to help you find the answers you need.