MBA with an Information Security Concentration
“I was able to stand out in my interview process because I had a technical background and a business background.”
- Taso Triantafillos, DeVry University and Keller Alumnus
Learn more about the advantages of studying at Keller. Request more information
MBA in Information Security
With information systems and digital information comes risk; global businesses need people who understand those risks. Keller's MBA in Information Security allows you to tailor your courses to match your interests and career goals in this field, and it's just one of 17 concentrations that can enhance your MBA degree program.
Our MBA in Information Security was designed to give you the sought-after skills and knowledge to fill this increasingly important role in today's business world, including information security coursework in information protection, intrusion detection, security procedures and legal and ethical considerations within the field.
Want to know more? Request information and a member of our team can help answer your questions.
Learn on campus, online or a mix of both
At Keller, we've integrated on campus and online learning so you can attend any of our 90+ campus locations, take your graduate classes online or do a combination of both.
Study at Keller on campus, online or a mix of both
We give you the flexibility to attend classes at any of our 90+ campus locations, take all of your graduate courses online or even do a combination of both.
Locations nearest you:- or -
Explore online learning
At Keller, we offer online graduate classes taught with the same focus on personal attention and academic rigor as classes taught on campus. And because courses are offered online, you can schedule working on your education around working on your career not the other way around.
On campus and online
For those students who need the flexibility of studying online to balance work, school and life, but also want a classroom experience, we offer a mix of both on campus and online learning. Take some courses online and some at a location convenient for you, whichever best fits your schedule.
Tuition, fees and expenses†
MBA with an Information Security Concentration1
- Total Required Credit Hours: 48
- Number of Standard Three-Semester-Credit Hour Courses: 16
- Tuition per Standard Three-Semester-Credit Hour Course: $2,298
- Textbook and Materials Expense2: $2,800
- Total Program Cost3: $39,608
Note: Tuition for Canadian residents enrolled in U.S.-based programs delivered online is charged in Canadian dollars at rates shown.
† Effective beginning July 2012.
1 Availability varies by location.
2 At average estimated per-course expense for textbooks and materials of $175; average estimated per-course expense does not apply to exam-prep courses, the per-credit-hour cost for which includes textbook and materials expense.
3 At current tuition rates and credit hours shown; includes $40 application fee ($30 for applicants at locations in Florida, Georgia and Tennessee), and average estimated textbook and materials expense.
Experience the real value of a graduate education
Not only will you be learning skills that could help you rise to the top of your field, you'll also be gaining a valuable credential that may affect your entire career. A graduate education could change your earning potential, ability to be promoted and more.
There are many scholarships and other financial aid options available for qualifying students that may help make your graduate education more affordable. Click one of the links below for more info.
MBA in Information Security Graduation Requirements
Total program length varies based on the number of courses taken per 8-week session. That means that if you take 1 class per session, you could complete your degree program in as few as 32 months.
- Total credit hours: 48
- Required program: 30
- Information Security concentration: 12
- Elective: 6
MBA in Information Security Coursework
Required program courses (30 credit hours)
We've designed the core program courses in our MBA to provide you with the fundamentals to make an impact in the business world. See MBA Required Program Courses for a list of required coursework.
Information Security concentration courses (12 credit hours)
The concentration coursework is designed to further focus your MBA curriculum to better prepare you for success in a specific field or industry. To add a concentration to your MBA degree program, you may choose courses totaling 12 credit hours from the following list:
Click on a course name below for its full description.
- Principles of Information Security and Privacy (SEC571) - 3 credit hours
- This course provides a broad overview of security in information systems. Covered are various aspects of security in computing, including security threats and controls; basic cryptography and its applications; network intrusion detection and prevention; security administration and planning; anonymity and privacy; legal issues; protection; and ethics. Coursework also examines controls in information systems, and addresses security issues surrounding information systems and computer-generated data. No prerequisite
- Network Security (SEC572) - 3 credit hours
- This course addresses concepts and industry standards of computer networking, including the OSI Reference Model, TCP/IP and network routing concepts, and inherent risks in their use. Also addressed are digital cryptography principles and practices; major electronic email security standards; and methods by which networks may be attacked. Students use a networking software tool to build a secure network, as well as prepare to assist in incident response and management activities in the event of a network breach. Prerequisite: MIS589, or a technical undergraduate degree and/or associated professional experience with preparation equivalent to or beyond MIS589
- E-Business Security (SEC573) - 3 credit hours
- This course covers issues involved in protecting an e-business from external threats while safeguarding customer privacy. Students examine external threats to a company's systems and learn how to react if systems and business goals conflict. Prerequisites: SEC571
- Database Security (SEC574) - 3 credit hours
- This course provides an overview of security issues in database systems and shows how current and future commercial systems may be designed to ensure secrecy and confidentiality. Security models, basic security mechanisms and software, database security, intrusion detection and security models for next generation databases are covered. Prerequisites: a technical undergraduate degree and/or associated professional experience with preparation equivalent to or beyond MIS582
- Information Security Law and Ethics (SEC575) - 3 credit hours
- This course, geared toward non-attorney managers and executives, provides a broad survey of federal and state laws and judicial systems governing and/or affecting information security. Coursework addresses the effects of cyber business regulation on information security, conducting business on the Internet, privacy laws, taxation, protection of intellectual property, electronic privacy, wiretapping and cybersquatting. In addition, students examine ethical issues, forensics and evidence of cyber crime. No prerequisite
- Risk Mitigation and Contingency Planning (SEC576) - 3 credit hours
- This course identifies vulnerabilities and inherent risks of computer systems. It also introduces cost-effective risk analysis techniques for identifying and quantifying accidental and malicious threats to computer systems, and developing contingency and recovery plans. The qualitative risk analysis process, using techniques such as the practical application of risk analysis (PARA) and the facilitated risk analysis process (FRAP), is covered. Prerequisites: a technical undergraduate degree and/or associated professional experience with preparation equivalent to or beyond PROJ586
- Cryptography and Security Mechanisms (SEC577) - 3 credit hours
- This course introduces cryptography, focusing on information systems security issues, and mechanisms and devices to address these issues. Also examined are cryptosystems, algorithms and certificates. Students gain applications-oriented experience in developing and implementing several cryptography applications or algorithms. Access controls are presented as a collection of security mechanisms that work together to protect information system assets. Students complete lab assignments and a term project. Prerequisite: SEC571, or a technical undergraduate degree and/or associated professional experience with preparation equivalent to or beyond SEC571
- Practices for Administration of Physical and Operations Security (SEC578) - 3 credit hours
- This course examines security management, management tools, and physical and operations security in an organization's environment. Security management addresses identifying information assets and developing, documenting and implementing policies, standards, procedures and guidelines for asset protection. Management tools such as data classification and risk assessment/analysis are used to identify system vulnerabilities and implement controls. Physical and operations security addresses control mechanisms and protection techniques for facility, resource and overall system operation. Prerequisites: SEC571, or a technical undergraduate degree and/or associated professional experience with preparation equivalent to or beyond SEC571
- Security in Systems Architecture and Applications (SEC579) - 3 credit hours
- This course addresses concepts, principles, structures and standards used to design, monitor and secure operating systems, equipment, networks, databases, applications and controls that enforce various levels of availability, integrity and confidentiality. Coursework also focuses on security concepts that apply to application software development, addressing the software design and development environment and explaining software's critical role in providing information system security. Prerequisites: SEC571, or a technical undergraduate degree and/or associated professional experience with preparation equivalent to or beyond SEC571
- Disaster Recovery/Forensics and Security (SEC591) - 3 credit hours
- This course focuses on preserving and recovering business operations in the event of outages, disasters or work force interruptions. Measures and technologies used for forensics, as well as computer crime and security investigation, are addressed. Prerequisites: MIS589 and SEC571, or a technical undergraduate degree and/or associated professional experience with preparation equivalent to or beyond MIS589 and SEC571
- IT Governance (SEC592) - 3 credit hours
- This course introduces principles of information technology governance, focusing on IT control objectives (COBIT) and related internal controls. Coursework explores best practices for managing IT processes; meeting multiple needs of enterprise management by bridging gaps between business risks; technical issues; control needs; and performance measurement requirements. Students explore IT industry standards, and develop governance skills relating to creating and maintaining corporate information systems policy. Prerequisite: SEC571
Elective courses (6 credit hours)
You can take your electives in a variety of career fields. Students may choose any electives for which they meet the prerequisites. Download the Academic Catalog and view "Course Offerings" for a complete list of courses that could satisfy your elective requirements.
RESOURCESKeller Graduate School of Management
Academic Catalog (PDF)
See all courses offered at Keller.Download the latest version of Adobe Acrobat Reader