Academics

Format

Classes are offered in person and online. Students can complete the program on campus or schedule a mix of in-person and online courses.

Online Option

If students wish to complete their cybersecurity degree entirely online they should pursue the UOnline option.

Schedule

Our MS in Cybersecurity Management is designed for working professionals, offering most courses in the evening and all courses online. You can complete your degree in just four semesters (16 months), with convenient spring and fall start options.

  • Where Can We Take You?

    Thursday, February 20 | 

    12:00 pm - 1:00 pm MT

     | Online

Curriculum

The MSCM curriculum is rooted in real-world cybersecurity applications and industry feedback. Students prepare for professional success by completing over 100 unique cybersecurity labs using industry-recognized software.

Our 30 credit program features a lockstep curriculum, where every student takes the same courses in the same order. This cohort-based approach allows students to forge deeper connections with classmates and follow a predictable path to graduation where each semester builds upon the previous one.

First Semester Courses

Course Number: IS 6570
Credits: 3

Properly designed and implemented information security is essential to protecting corporate data assets. This course covers the broad topic of cybersecurity with details including; access control, network security, operating systems security, software security, physical security, workforce security, security management, and regulatory compliance. Theoretical understanding is supported by the hands-on implementation of cybersecurity controls.

Course Number: IS 6640
Credits: 3

An introduction to the design, operation, and management of IT systems including Windows Server, cloud services, and networking. This course provides instruction in data communications and computer network definitions, concepts, and principles, including (but not limited to); topologies; protocols; standards; and fundamental concepts related to data communication networks, such as routers, switches, and cabling; Windows Server technologies including Server install and configuration, Active Directory, DHCP/DNS, and Group Policy Objects. This technology-intensive course includes hands-on labs working with networks, Windows Server, and cloud services. It prepares students to make intelligent and informed decisions about data network design/management, by analyzing the benefits, drawbacks, effects, tradeoffs, and compromises related to various data communication technologies. You will learn how to make policy, design, and installation decisions.

Course Number: IS 6465
Credits: 3

The objective of the course is to provide knowledge and skills needed to create Web-based applications. It covers a broad set of technologies and tools that have led to the successful use of the World Wide Web for various businesses. This includes Java programming, JSP, HTML, XML, HTTP, Web servers and databases.

Second Semester Courses

Course Number: IS 6641
Credits: 3

Cloud Computing is a fundamental component of modern IT infrastructure and application design. This course focuses on the advanced skills that are required to design and implement public, private or hybrid Cloud Computing environments. The topics covered include large scale visualization, application platforms and advanced IT infrastructure components. Theoretical understanding is supported by extensive hands-on work implementing the concepts in a lab environment.

Course Number: IS 6572
Credits: 3

Robust cybersecurity programs ensure strong network defenses and well-established security operations to detect and respond to attackers. This course focuses on the technical aspects of daily network operations such as firewalls, intrusion detection, malware detection, activity logging and analysis, SIEMs, threat intelligence, threat hunting, security operations centers (SOC), and incident response.

Course Number: IS 6573
Credits: 3

Proactively managing vulnerabilities in information technology is essential to reducing the risk of data being compromised. This course first reviews the tactics, techniques, and procedures that attackers use to exploit vulnerabilities. The course then discusses strategies for eliminating vulnerabilities and techniques for deploying safeguards to reduce the risk of inherent vulnerabilities.

Third Semester Courses

Course Number: IS 6574
Credits: 3

Successful security programs utilize risk management techniques to make effective security control decisions. Regulations, such as GDPR, force companies into adopting security best practices to protect sensitive data. This course covers many compliance and risk management topics, which are necessary to understand in order to be an effective cybersecurity leader and build an effective cybersecurity program.

Course Number: IS 6410
Credits: 3

Modern organizations operate on computer-based information systems, from day-to-day operations to corporate governance. This course introduces a systemic way of planning, analyzing, designing, and implementing a computer-based information system for automating and enhancing business processes in organizations. In this course, we learn the systems analysis and design methodology as well as techniques and tools for analyzing, modeling, and designing information systems.

Fourth Semester Courses

Course Numbers: IS 6821, IS 6822, IS 6823
Credits: 3 total

Students will complete a capstone experience involving career development, planning, and execution as the culmination of their degree. Students will choose an impactful IT or cybersecurity certification with real-world applications. This allows students to put their classroom knowledge to work, prepare for a career in cybersecurity, and gain an industry-recognized IT security certification. These certifications are key for standing out to potential employers, and often required for certain cybersecurity positions.

Students can choose from a number of mid- to upper-level certification options that are approved to meet the capstone requirements. Certification exams are completed individually, though students are encouraged to work together when studying. Exam and study material costs are paid by the student. Some certification options may have pre- or co-requisite MSCM course requirements.

Course Number: OSC 6660
Credits: 3

Project management has become the way of life in many industries. Whether it is development of a new product, organizational-wide implementation of a new IT tool, or execution of a merger, project management skills are required to manage cross-functional teams subject to strict deadlines and tight budget constraints. In this course we discuss all three phases of project management: project conception, execution, and closure. Issues related to project leadership, budgeting, and scheduling will be addressed in the course, and case discussions will highlight state of the art project management practices. Project management software will be introduced (possibly including group project using MS Project Software).

Recommended Preparation

Students who are new to cybersecurity should consider studying foundational IT concepts before starting the program. There are numerous free and affordable resources available online. A popular option is this free online CLEP Information Systems course from Modern States.

  • Experience Class for Yourself

    Monday, February 24 | 

    5:30 pm - 7:00 pm MT

     | On Campus

Specialization Opportunities

Our top priority is helping students land quality jobs in cybersecurity; Specialization opportunities can give students a competitive edge and help them stand out in the job market.

Areas of Focus

Students can specialize their education by selecting elective credits within an area of focus. Although it is completely optional, this tailored approach has proven to be a valuable asset for many graduates seeking to set themselves apart and specialize in a specific field of cybersecurity.

In a world of costly, problematic data breaches there is an increasing need for cybersecurity professionals with a strong background in data management. By focusing on data, cybersecurity professionals can proactively identify and mitigate threats, optimize security measures, and respond effectively to incidents.

Common Data Security Job Titles
  • Data Security Analyst
  • Cybersecurity Data Analyst
  • Data Privacy Analyst
  • Database Administrator
  • Incident Response Analyst
  • Threat Intelligence Analyst
  • Data/Cloud Architect
  • Security Operations Center Analyst
Data Security Courses
  • IS 6420 Database Theory & Design (3)
  • IS 6480 Data Warehousing (3)  Prerequisite: IS 6420
  • IS 6481 Business Intelligence & Analytics (3)

The intersection of cybersecurity and leadership is a high-demand field with significant growth potential. As cyber threats become increasingly sophisticated, organizations need leaders who can bridge the gap between technical expertise and strategic thinking. This unique combination positions professionals for high-level roles with attractive compensation and the opportunity to make a substantial impact on organizational security.

Common Cybersecurity Leadership Titles
  • Security Architect
  • Security Team Lead
  • Digital Forensics Lead
  • Penetration Testing Lead
  • Information Security Manager
  • Cybersecurity Program Manager
  • Governance, Risk, and Compliance Manager
  • Security Operations Center (SOC) Manager
  • VP of Cybersecurity
  • CISO (Chief Information Security Officer)
  • CSO (Chief Security Officer)
  • Cybersecurity Director
Cybersecurity Leadership Courses
  • OSC 6660 Project Management (3)
  • IS 6850 Product Management (3)

A technical focus can position students for long-term career growth in high-demand, specialized roles (often accompanied by competitive salaries). Technical cybersecurity professionals often focus on intellectually stimulating, cutting edge technology with unique challenges and rewards.

Common Technical Cybersecurity Job Titles
  • Security Engineer
  • Penetration Tester
  • Incident Response Analyst
  • Threat Intelligence Analyst
  • Security Analyst
  • Malware Analyst
  • Digital Forensics Analyst
  • Cloud Security Engineer
  • Network Security Engineer
  • Application Security Engineer
Technical Cybersecurity Courses
  • IS 6465 Web Based Applications (3)
  • IS 6641 Cloud Computing (3) Prerequisite: IS 6640

Graduate Certificates

MSCM students can pair their degree with a graduate certificate to diversify their skill set.

The Graduate Certificate in Business Analytics (GCBA) allows graduate students to gain specialized knowledge in both data analytics and management. Obtaining a graduate-level analytics certificate will provide an advantage to those seeking to advance their careers in the rapidly growing market for data and analytics professionals. Certificate electives and faculty are shared with the Master of Science in Business Analytics (MSBA) program and provide the same high level of instruction and interaction.

How to Apply

Students can apply for the GCBA as soon as they are admitted to the program.

Additional Information

For more information visit the GCBA page or meet with an admissions advisor.

Completing a Graduate Certificate in Information Systems (GCIS) with an MSCM gives students the opportunity to increase skills within the broader field of technology. There is great demand for technological knowledge in the current business climate. This knowledge, paired with specialized skills in management, IT security, and other cybersecurity-specific knowledge, allows students to stand out as distinguished technology professionals. By choosing the required elective credits, MSCM students can earn a GCIS with no additional credit hours.

How to Apply

Students can apply for the GCIS as soon as they are admitted to the program.

Additional Information

For more information visit the GCIS page or meet with an admissions advisor.

The Graduate Certificate in Operations and Supply Chain Management allows graduate students to gain specialized knowledge about how firms create and capture value. Students will learn how to maximize quality relative to expenses, optimize supply chain activities, and lower production costs while managing process flows. The courses will explore strategic choices for different industries and operational objectives. Students will learn how to manage inventory effectively, utilize information systems with their supply chains, and gain real-world practice in presenting operational results to management and/or other operations personnel.

How to Apply

Students can apply for the GCOSC as soon as they are admitted to the program.

Additional Information

For more information visit the GCOSC page or meet with an admissions advisor.

It’s estimated that by 2040, the Mountain West will double in population to more than 30 million people with nearly 20 million jobs. Most of the existing built environment will be rebuilt. Several trillion dollars will be spent on development in the region over the next generation and professionals with real estate expertise will play a leading role in the transformation.

How to Apply

Students can apply for the GCRE as soon as they are admitted to the program.

Additional Information

For more information visit the GCRE page or meet with an admissions advisor.

Concurrent Degrees

Our MSCM program can be completed concurrently with an MBA degree for a robust, multifaceted education.

Students can pursue an MBA concurrently with an MSCM. Accelerate your career in cybersecurity management by combining both degrees. You’ll exit the program with a world-class education and the the leadership skills needed to land positions at the top of the field.

Completion Time

Let’s Connect

Our admissions specialists are happy to discuss any questions or concerns you might have about the application process, admissions requirements, or any other aspect of the program. We’re eager to meet you and provide personalized support as you explore our program.

MSCM@Utah.edu
David Eccles School of Business
Robert H. and Katherine B. Garff Building, Room 2350