Academics
Format
Classes are offered in person and online. Students can complete the program on campus or schedule a mix of in-person and online courses. Adjustments can be made from semester to semester.
Online Option
If students wish to complete their cybersecurity degree entirely online they should pursue the UOnline option.
Schedule
Our MS in Cybersecurity Management is offered at a full-time and part-time pace. Full-time students can complete the program in just three semesters (12 months) while part-time students graduate in four or more semesters (15+ months).
To accommodate busy professionals, our classes are primarily offered in the evening and online, allowing students to work full-time while in the program. Once admitted, you will work with your academic advisor to map out a course of study that fits with your other life commitments.
Students can begin the program in the fall or spring semester.
Curriculum
The MSCM curriculum is rooted in real-world cybersecurity applications and industry feedback. Students complete over 100 unique cybersecurity labs using industry-recognized software such as Open Source, Palo Alto Networks, Cisco, and more. Additionally, elective options allow students to specialize in the field of cybersecurity that best suits their career interests.
Our curriculum contains 30 total credits, comprised of 21 core credits and 9 elective credits:
Core Courses
Course Number: IS 6410
Credits: 3
Modern organizations operate on computer-based information systems, from day-to-day operations to corporate governance. This course introduces a systemic way of planning, analyzing, designing, and implementing a computer-based information system for automating and enhancing business processes in organizations. In this course, we learn the systems analysis and design methodology as well as techniques and tools for analyzing, modeling, and designing information systems.
Course Number: IS 6570
Credits: 3
Properly designed and implemented information security is essential to protecting corporate data assets. This course covers the broad topic of cybersecurity with details including; access control, network security, operating systems security, software security, physical security, workforce security, security management, and regulatory compliance. Theoretical understanding is supported by the hands-on implementation of cybersecurity controls.
Course Number: IS 6572
Prerequisite: IS 6570
Credits: 3
Robust cybersecurity programs ensure strong network defenses and well-established security operations to detect and respond to attackers. This course focuses on the technical aspects of daily network operations such as firewalls, intrusion detection, malware detection, activity logging and analysis, SIEMs, threat intelligence, threat hunting, security operations centers (SOC), and incident response.
Prerequisite: IS 6570
Credits: 3
Proactively managing vulnerabilities in information technology is essential to reducing the risk of data being compromised. This course first reviews the tactics, techniques, and procedures that attackers use to exploit vulnerabilities. The course then discusses strategies for eliminating vulnerabilities and techniques for deploying safeguards to reduce the risk of inherent vulnerabilities.
Course Number: IS 6574
Prerequisite: IS 6570
Credits: 3
Successful security programs utilize risk management techniques to make effective security control decisions. Regulations, such as GDPR, force companies into adopting security best practices to protect sensitive data. This course covers many compliance and risk management topics, which are necessary to understand in order to be an effective cybersecurity leader and build an effective cybersecurity program.
Course Number: IS 6640
Credits: 3
An introduction to the design, operation, and management of IT systems including Windows Server, cloud services, and networking. This course provides instruction in data communications and computer network definitions, concepts, and principles, including (but not limited to); topologies; protocols; standards; and fundamental concepts related to data communication networks, such as routers, switches, and cabling; Windows Server technologies including Server install and configuration, Active Directory, DHCP/DNS, and Group Policy Objects. This technology-intensive course includes hands-on labs working with networks, Windows Server, and cloud services. It prepares students to make intelligent and informed decisions about data network design/management, by analyzing the benefits, drawbacks, effects, tradeoffs, and compromises related to various data communication technologies. You will learn how to make policy, design, and installation decisions.
Course Numbers: IS 6821, IS 6822, IS 683
Credits: 3 total
Students can choose from a number of mid- to upper-level certification options that are approved to meet the capstone requirements. Certification exams are completed individually, though students are encouraged to work together when studying. Exam and study material costs are paid by the student. Some certification options may have pre- or co-requisite MSCM course requirements.
Elective Courses
Course Number: IS 6465
Credits: 3
The objective of the course is to provide knowledge and skills needed to create Web-based applications. It covers a broad set of technologies and tools that have led to the successful use of the World Wide Web for various businesses. This includes Java programming, JSP, HTML, XML, HTTP, Web servers and databases.
Course Number: IS 6471
Credits: 3
This course focuses on helping students explore emerging digital technologies, where both development and practical applications are still largely unrealized, such that they are appearing into prominence from a background of nonexistence or obscurity. These technologies, often perceived as capable of changing the status quo, are generally new but may also include older technologies that are still relatively under-developed in potential.
Course Number: IS 6480
Prerequisite: IS 6420
Credits: 3
The data generated from ongoing operations of businesses and not-for-profit enterprises continues to grow. Using the data to diagnose problems and assess opportunities is becoming more and more of a competitive advantage in today’s business environment. Before analysis can take place, existing data must be modeled in ways that facilitate reporting. This course briefly presents the data models of existing operational systems and then contrasts those models to dimensional models used in data warehouses and analytic processing engines. Business reporting needs are analyzed, data warehouses are modeled based on the reporting needs, and then SQL is used to create and populate tables based on dimensional models. Once in place, the data warehouse is used as a backend for a reporting tool to create reports that answer business questions.
Course Number: IS 6481
Credits: 3
This course introduces database technologies for building scalable data warehouse systems and technologies for user-oriented, interactive data analysis. Data warehouse systems differ from on-line transaction processing systems in time span and access mode of the data, and in query types and purposes.
Course Number: IS 6482
Credits: 3
This course introduces data mining technologies that assist in discovery of reliable, understandable and useful patterns in structured, semi-structured and unstructured data. Students will practice core data mining technologies, analyze cases, and explore real world applications and issues.
Course Number: IS 6489
Prerequisite: IS 6487
Credits: 3
This is a graduate level course in statistics, with an emphasis on developing predictive models using an open source statistical programming language. The engaged student should expect to develop foundational skills for data analysis. Topics covered will include some or all of the following: descriptive statistics, nonparametric regression, probability distributions, linear and logistic regression, tree-based methods, model assumptions and model checking, cross-validation, simulation, resampling, visualization, and reproducible research.
Course Number: IS 6491
Credits: 1.5
Data Visualization is the graphical representation of information. Data Visualization and related technologies create value within organizations by providing insight from complex sets of data by communicating key aspects therefrom. This course focuses on how to increase the likelihood of action based on insights from data by telling stories with data that leverage effective Data Visualizations. The course includes a mix of theory and hands-on application using contemporary processes and Data Visualization technologies.
Course Number: IS 6493
Prerequisite: IS 6489
Credits: 3
Successful corporations can utilize data science techniques to help drive business decision making by analyzing datasets of varying sizes. In this course, a hands-on practitioner’s approach is taken to learning the fundamental knowledge, techniques and tools required for leading data science teams and analyzing big data. This course will utilize popular open source technologies and libraries in use today to learn how to collect, pre-process and visualize data, as well as build and test models for inference and prediction. We will examine the unique challenges posed by big data and complex models, and learn how to address them using distributed computing frameworks such as Dask, Hadoop and Spark. The course is taught in Python, and will offer a bootcamp in the first few weeks to help everyone get comfortable with the language.
Course Number: IS 6572
Prerequisite: IS 6570
Credits: 3
Robust cybersecurity programs ensure strong network defenses and well-established security operations to detect and respond to attackers. This course focuses on the technical aspects of daily network operations such as firewalls, intrusion detection, malware detection, activity logging and analysis, SIEMs, threat intelligence, threat hunting, security operations centers (SOC), and incident response.
Course Number: IS 6573
Prerequisite: IS 6570
Credits: 3
Proactively managing vulnerabilities in information technology is essential to reducing the risk of data being compromised. This course first reviews the tactics, techniques, and procedures that attackers use to exploit vulnerabilities. The course then discusses strategies for eliminating vulnerabilities and techniques for deploying safeguards to reduce the risk of inherent vulnerabilities.
Course Number: IS 6574
Prerequisite: IS 6570
Credits: 3
Successful security programs utilize risk management techniques to make effective security control decisions. Regulations, such as GDPR, force companies into adopting security best practices to protect sensitive data. This course covers many compliance and risk management topics, which are necessary to understand in order to be an effective cybersecurity leader and build an effective cybersecurity program.
Course Number: IS 6641
Credits: 3
Cloud Computing is a fundamental component of modern IT infrastructure and application design. This course focuses on the advanced skills that are required to design and implement public, private or hybrid Cloud Computing environments. The topics covered include large scale visualization, application platforms and advanced IT infrastructure components. Theoretical understanding is supported by extensive hands-on work implementing the concepts in a lab environment
Recommended Prerequisite: IS 6640
Course Number: IS 6850
Prerequisite: IS 6420
Credits: 1.5
Focuses on advanced SQL queries and optimization techniques for database management.
Course Number: MKTG 6487
Credits: 1.5
This course introduces students to the main elements of business analytics. The domains include framing the business problem, framing the analytics problem, managing data, selecting the methodology, building the model, deployment and life cycle management. Students will learn and practice the domains using small projects.
Course Number: OSC 6425
Credits: 3
Six Sigma is a philosophy and set of concrete tools designed to reduce variation in all critical processes to achieve continuous and breakthrough improvements that impact the bottom line of an organization and increase customer satisfaction. In this course, we will study the five phase DMAIC (Design-Measure-Analyze-Improve-Control) approach in detail with a combination of lecture, small group breakout sessions, and hands-on practice. Course topics will include a review of statistics, process improvement tools, statistical process control, measurement system evaluation, capability analysis and design of experiments. Statistical software such as Minitab will be required and used throughout the class.
Course Number: OSC 6610
Credits: 1.5
Managerial decisions – regardless of their functional orientation – increasingly leverage quantitative models to approximate business problems and provide insights. This course takes a managerial approach to analytical modeling to analyze problems in a wide array of fields such as finance, marketing, operations, information systems, etc. The tools covered in this class are deterministic optimization techniques including linear programming, network models and integer programming.
Course Number: OSC 6611
Credits: 1.5
Like OIS 6610, this course takes a practical approach to analytical modeling. While the emphasis in Analytical Decision Models 1 was on deterministic optimization techniques, models in the course will be probabilistic in nature. The main topics for the course are advanced queuing and simulation. Applications will encompass problems from a variety of business disciplines including production/operations management, marketing, and finance.
Course Number: OSC 6620
Credits: 1.5
Production of services and goods typically involves many process steps that are spread across multiple firms or departments. In supply chain management (SCM) we examine how to improve performance by considering the actions of multiple members within this chain of activities. SCM addresses not only the flow of materials from upstream to downstream members in the supply chain, but also the flow of information and funds. Advancements in information technology allow the supply chain to achieve performance improvements previously beyond reach, and may change the optimal structure of the supply chain. Class discussion is motivated by case studies that examine successful emerging supply chain strategies.
Course Number: OSC 6660
Credits: 3
Project management has become the way of life in many industries. Whether it is development of a new product, organizational-wide implementation of a new IT tool, or execution of a merger, project management skills are required to manage cross-functional teams subject to strict deadlines and tight budget constraints. In this course we discuss all three phases of project management: project conception, execution, and closure. Issues related to project leadership, budgeting, and scheduling will be addressed in the course, and case discussions will highlight state of the art project management practices. Project management software will be introduced (possibly including group project using MS Project Software).
Course Number: OSC 6680
Credits: 3
Product Managers are involved in setting and implementing a product roadmap, from product design to end of-life. Knowledge of project management, forecasting, and process design are important for a product manager. This role necessitates interfacing with production, design engineers, customers, marketing specialists, strategists, and others. The product manager helps define product features, breadth of product line, and design architecture (modularity vs. integrality), and works with product development and production engineers to execute the plan.
Recommended Preparation
Students who are new to cybersecurity should consider studying foundational IT concepts before starting the program. There are numerous free and affordable resources available online. A popular option is this free online CLEP Information Systems course from Modern States.
Specialization Opportunities
Our top priority is helping students land quality jobs in cybersecurity; Specialization opportunities can give students a competitive edge and help them stand out in the job market.
Areas of Focus
Students can specialize their education by selecting elective credits within an area of focus. Although it is completely optional, this tailored approach has proven to be a valuable asset for many graduates seeking to set themselves apart and specialize in a specific field of cybersecurity.
In a world of costly, problematic data breaches there is an increasing need for cybersecurity professionals with a strong background in data management. By focusing on data, cybersecurity professionals can proactively identify and mitigate threats, optimize security measures, and respond effectively to incidents.
Common Data Security Job Titles
- Data Security Analyst
- Cybersecurity Data Analyst
- Data Privacy Analyst
- Database Administrator
- Incident Response Analyst
- Threat Intelligence Analyst
- Data/Cloud Architect
- Security Operations Center Analyst
Data Security Courses
- IS 6420 Database Theory & Design (3)
- IS 6480 Data Warehousing (3) Prerequisite: IS 6420
- IS 6481 Business Intelligence & Analytics (3)
The intersection of cybersecurity and leadership is a high-demand field with significant growth potential. As cyber threats become increasingly sophisticated, organizations need leaders who can bridge the gap between technical expertise and strategic thinking. This unique combination positions professionals for high-level roles with attractive compensation and the opportunity to make a substantial impact on organizational security.
Common Cybersecurity Leadership Titles
- Security Architect
- Security Team Lead
- Digital Forensics Lead
- Penetration Testing Lead
- Information Security Manager
- Cybersecurity Program Manager
- Governance, Risk, and Compliance Manager
- Security Operations Center (SOC) Manager
- VP of Cybersecurity
- CISO (Chief Information Security Officer)
- CSO (Chief Security Officer)
- Cybersecurity Director
Cybersecurity Leadership Courses
- OSC 6660 Project Management (3)
- IS 6850 Product Management (3)
A technical focus can position students for long-term career growth in high-demand, specialized roles (often accompanied by competitive salaries). Technical cybersecurity professionals often focus on intellectually stimulating, cutting edge technology with unique challenges and rewards.
Common Technical Cybersecurity Job Titles
- Security Engineer
- Penetration Tester
- Incident Response Analyst
- Threat Intelligence Analyst
- Security Analyst
- Malware Analyst
- Digital Forensics Analyst
- Cloud Security Engineer
- Network Security Engineer
- Application Security Engineer
Technical Cybersecurity Courses
- IS 6465 Web Based Applications (3)
- IS 6641 Cloud Computing (3) Prerequisite: IS 6640
Graduate Certificates
MSCM students can pair their degree with a graduate certificate to diversify their skill set.
The Graduate Certificate in Business Analytics (GCBA) allows graduate students to gain specialized knowledge in both data analytics and management. Obtaining a graduate-level analytics certificate will provide an advantage to those seeking to advance their careers in the rapidly growing market for data and analytics professionals. Certificate electives and faculty are shared with the Master of Science in Business Analytics (MSBA) program and provide the same high level of instruction and interaction.
How to Apply
Students can apply for the GCBA as soon as they are admitted to the program.
Additional Information
For more information visit the GCBA page or meet with an admissions advisor.
Completing a Graduate Certificate in Information Systems (GCIS) with an MSCM gives students the opportunity to increase skills within the broader field of technology. There is great demand for technological knowledge in the current business climate. This knowledge, paired with specialized skills in management, IT security, and other cybersecurity-specific knowledge, allows students to stand out as distinguished technology professionals. By choosing the required elective credits, MSCM students can earn a GCIS with no additional credit hours.
How to Apply
Students can apply for the GCIS as soon as they are admitted to the program.
Additional Information
For more information visit the GCIS page or meet with an admissions advisor.
The Graduate Certificate in Operations and Supply Chain Management allows graduate students to gain specialized knowledge about how firms create and capture value. Students will learn how to maximize quality relative to expenses, optimize supply chain activities, and lower production costs while managing process flows. The courses will explore strategic choices for different industries and operational objectives. Students will learn how to manage inventory effectively, utilize information systems with their supply chains, and gain real-world practice in presenting operational results to management and/or other operations personnel.
How to Apply
Students can apply for the GCOSC as soon as they are admitted to the program.
Additional Information
For more information visit the GCOSC page or meet with an admissions advisor.
It’s estimated that by 2040, the Mountain West will double in population to more than 30 million people with nearly 20 million jobs. Most of the existing built environment will be rebuilt. Several trillion dollars will be spent on development in the region over the next generation and professionals with real estate expertise will play a leading role in the transformation.
How to Apply
Students can apply for the GCRE as soon as they are admitted to the program.
Additional Information
For more information visit the GCRE page or meet with an admissions advisor.
Concurrent Degrees
Our MSCM program can be completed concurrently with an MBA degree for a robust, multifaceted education.
Students can pursue an MBA concurrently with an MSCM. Accelerate your career in cybersecurity management by combining both degrees. You’ll exit the program with a world-class education and the the leadership skills needed to land positions at the top of the field.
Completion Time
- Full-time MBA students can complete the program in 4 semesters.
- Professional MBA and MBA Online students can complete the program in 8-9 semesters.
Let’s Connect
Our admissions specialists are happy to discuss any questions or concerns you might have about the application process, admissions requirements, or any other aspect of the program. We’re eager to meet you and provide personalized support as you explore our program.
MSCM@Utah.edu
David Eccles School of Business
Robert H. and Katherine B. Garff Building, Room 2350