Information Security (Master's)
Become an expert in determining Return on Security Investment (ROSI) and develop security policies and procedures that protect organizations from internal and external threats. This master's concentration prepares you lead the strategic, planning, and management efforts of safeguarding information and ensure continuity of operations. You’ll learn how to:
- Analyze security needs
- Provide effective security solutions
- Secure a network and servers
- Handle information security incidents
Fill a critical niche in organizations and gain practical, hands-on experience in this concentration geared for security professionals looking for advanced knowledge in information security.
MS in Security Management with a concentration in Information Security requires completion of 48 credit hours (12 courses)Core courses - 20 qtr. hrs
Core courses help students to understand the scope of activity, historical development, future direction and trends, and typical types and roles of organizations that operate within a career field. The Capstone course is the culminating academic endeavor of our degree programs, in which students explore a problem or issue within their field of study.
- SMGT 4050 - Security Concepts Overview
- SMGT 4100 - Business Function of Security
- SMGT 4350 - Business Assets Protection
- SMGT 4910 - Research Practices and Applications
- SMGT 4901 - SMGT Capstone Project
- SMGT 4902 - Capstone Seminar
- SMGT 4904 - Interdisciplinary Capstone Seminar
Concentration courses allow students to focus on a specific professional area within the larger industry sector in which they are working or wish to work, and master the skills needed to excel in that area.
- SMGT 4200 - Integrated Security Systems
- SMGT 4250 - IS: Threats in Security
- SMGT 4450 - Legal and Ethical Issues in Security Management
- SMGT 4500 - Human Factors in Security
Electives may be chosen from among all courses in Security Management programs. You may also select courses from other University College graduate programs with approval from the academic director.
After you submit your academic plan, your academic advisor will help you select electives that align with your career and personal goals, and your advisor will obtain any necessary approvals from the academic director.
Popular electives for students pursuing Security Management programs include:
Design Your Custom Plan
Start Customizing Your Degree
View the tutorial or start building your plan now.Design Your Custom Plan!
Careers in Information Security
Chief Information Security Officer, Information Security Analyst, Information Systems Administrator, Information Technology Specialist, Network Administrator, Network Architect, Network Security Analyst, Security Officer
Assessing data and network vulnerability; conducting network penetration tests; designing information security systems; developing information security standards and best practices; documenting, investigating, and reporting on information security breaches; installing and updating data encryption programs and firewalls; keeping abreast of information security developments and trends; monitoring networks for security breaches; providing end-user technical support and training; recommending security upgrades
As more and more data is collected and stored electronically, the demand for professionals who can help organizations safeguard their digital infrastructure and shield their intellectual property continues to explode. Employment levels for Information Security Analysts are expected to grow by 37% between 2012 and 2022, the Bureau of Labor Statistics predicts. A 2013 article on ComputerWorld.com indicates that the need for “information security experts in the United States is outstripping the available supply by a widening margin,” and as a result, employers are willing to pay top dollar for well-educated and experienced professionals.
Careers In Security Management
Secure your future.
Security Magazine reports that a growing trend in the security management field includes business continuity and crisis management, as well as going green—from using hybrid cars to creating green systems for IT. Emergency management is seeing an increase in career opportunities, with a 21% job growth projected through 2018. Whether you are pursuing a career in IT security or physical security, the security management field is bustling with opportunity, particularly homeland security. Information security and cybersecurity continues to grow as a priority among businesses and the government, and a graduate degree in the field is becoming the minimum requirement, according to a 2010 Career Trends survey. Research shows a huge shortage of IT security professionals, making this a profession worth pursuing to secure your future.
Find your niche!
Security today is complex and in a burgeoning integrative world, effective professionals are in high demand to forge the way past the potential threats. So what are the emerging security trends? Extensible Threat Management Systems (XTM's), Two Factor Authentication, Encryption, Hosted Security, Internet Filtering, Endpoint Security, Low Footprint Anti-Virus, VoiP Security, Compliance, Convergence of Voice and Data. In the cybersecurity world, web applications account for 55% of threats, according to the IBM X-Force Mid-Year Trend and Risk Report. Beyond the IT realm of security, environmental threats and disasters also need the proper planning and management, for incidents such as hurricanes, oil spills, and fires. For job opportunities dealing with these threats, look to the government, military, financial institutions, educational facilities, or hospitals.
Where are they now?
University College alumni who graduated from the Security Management program have job titles such as Software Engineer, Senior Manager, Correctional Systems Officer, Supervisory Special Agent, and Investigator II at companies and organizations such as the FBI, Office of the Attorney General for Colorado, Lockheed Martin, Federal Bureau of Prisons, and Bristol Myers Squibb.
Trends: Extensible Threat Management Systems (XTM's), Two Factor Authentication, Encryption, Hosted Security, Internet Filtering, Endpoint Security, Low Footprint Anti−Virus, VoiP Security, Compliance, Convergence of Voice and Data
Ready to Apply
It's time to gather your materials and apply to your program of choice. Remember to include:
How to Apply
Need More Information
Interested in attending University College, but need additional information before you make a decision? No problem−we're here to help. You may request additional information about a specific program and specialty, review and ask questions in our Frequently Asked Questions section, or contact University College directly.
- Request additional information
- Ask a question
- Email University College or call 303-871-2291 or 800-347-2042
Want to Take a Class
Even if you missed the application deadline, you can start taking courses for one quarter before you have to submit a completed application. We know how important it is to get started when you're ready, so review the class schedule or start the registration process now.