Request Info
MBA in information Security Courses & Tuition
Master of Business Administration <br />

Master of Business Administration

Information Security Concentration

MBA in Information Security Coursework

Required program courses (30 credit hours)

We've designed the core program courses in our Information Security MBA to provide you with the fundamentals to make an impact. See MBA Required Program Courses for a list of required coursework.

Information Security concentration courses (12 credit hours)

The concentration coursework is designed to further focus your Information Security MBA curriculum to better prepare you for a specific field or industry. To add a concentration to your MBA degree program, you may choose courses totaling 12 credit hours from the following list:

Click on a course name below for its full description.

Principles of Information Security and Privacy

Network Security

E-Business Security

Database Security

Information Security Law and Ethics

Risk Mitigation and Contingency Planning

Cryptography and Security Mechanisms

Practices for Administration of Physical and Operations Security

Security in Systems Architecture and Applications

Disaster Recovery/Forensics and Security

IT Governance

Principles of Information Security and Privacy
SEC571 – 3 credit hours
This course provides a broad overview of security in information systems. Covered are various aspects of security in computing, including security threats and controls; basic cryptography and its applications; network intrusion detection and prevention; security administration and planning; anonymity and privacy; legal issues; protection; and ethics. Coursework also examines controls in information systems, and addresses security issues surrounding information systems and computer-generated data.
Network Security
SEC572 – 3 credit hours
This course addresses concepts and industry standards of computer networking, including the OSI Reference Model, TCP/IP and network routing concepts, and inherent risks in their use. Also addressed are digital cryptography principles and practices; major electronic email security standards; and methods by which networks may be attacked. Students use a networking software tool to build a secure network, as well as prepare to assist in incident response and management activities in the event of a network breach.
E-Business Security
SEC573 – 3 credit hours
This course covers issues involved in protecting an e-business from external threats while safeguarding customer privacy. Students examine external threats to a company's systems and learn how to react if systems and business goals conflict.
Database Security
SEC574 – 3 credit hours
This course provides an overview of security issues in database systems and shows how current and future commercial systems may be designed to ensure secrecy and confidentiality. Security models, basic security mechanisms and software, database security, intrusion detection and security models for next generation databases are covered.
Information Security Law and Ethics
SEC575 – 3 credit hours
Coursework addresses the effects of cyber business regulation on information security, conducting business on the Internet, privacy laws, taxation, protection of intellectual property, electronic privacy, wiretapping and cybersquatting. In addition, students examine ethical issues, forensics and evidence of cyber crime.
Risk Mitigation and Contingency Planning
SEC576 – 3 credit hours
This course identifies vulnerabilities and inherent risks of computer systems. It also introduces cost-effective risk analysis techniques for identifying and quantifying accidental and malicious threats to computer systems, and developing contingency and recovery plans. The qualitative risk analysis process, using techniques such as the practical application of risk analysis (PARA) and the facilitated risk analysis process (FRAP), is covered.
Cryptography and Security Mechanisms
SEC577 – 3 credit hours
This course introduces cryptography, focusing on information systems security issues, and mechanisms and devices to address these issues. Also examined are cryptosystems, algorithms and certificates. Students gain applications-oriented experience in developing and implementing several cryptography applications or algorithms. Access controls are presented as a collection of security mechanisms that work together to protect information system assets. Students complete lab assignments and a term project.
Practices for Administration of Physical and Operations Security
SEC578 – 3 credit hours
This course examines security management, management tools, and physical and operations security in an organization's environment. Security management addresses identifying information assets and developing, documenting and implementing policies, standards, procedures and guidelines for asset protection. Management tools such as data classification and risk assessment/analysis are used to identify system vulnerabilities and implement controls. Physical and operations security addresses control mechanisms and protection techniques for facility, resource and overall system operation.
Security in Systems Architecture and Applications
SEC579 – 3 credit hours
This course addresses concepts, principles, structures and standards used to design, monitor and secure operating systems, equipment, networks, databases, applications and controls that enforce various levels of availability, integrity and confidentiality. Coursework also focuses on security concepts that apply to application software development, addressing the software design and development environment and explaining software's critical role in providing information system security.
Disaster Recovery/Forensics and Security
SEC591 – 3 credit hours
This course focuses on preserving and recovering business operations in the event of outages, disasters or work force interruptions. Measures and technologies used for forensics, as well as computer crime and security investigation, are addressed.
IT Governance
SEC592 – 3 credit hours
This course introduces principles of information technology governance, focusing on IT control objectives (COBIT) and related internal controls. Coursework explores best practices for managing IT processes; meeting multiple needs of enterprise management by bridging gaps between business risks; technical issues; control needs; and performance measurement requirements. Students explore IT industry standards, and develop governance skills relating to creating and maintaining corporate information systems policy.

Elective courses (6 credit hours)

You can take your electives in a variety of programs. Students may choose any electives for which they meet the prerequisites. Download the Academic Catalog and view "Course Offerings" for a complete list of courses that could satisfy your elective requirements.

FINANCING OPTIONS

There are many scholarships and other financial aid options available for qualifying students that may help make your graduate education more affordable. Click one of the links below for more info.