Online Master's in Cybersecurity Risk Management
Online Course Schedule for Fall 2024

06 Feb 12-1pm ET
Programs in Cybersecurity Risk Management Webinar  
Show
MPCR-6770-101

Cyber Defense Analysis

This course focuses on profiling adversaries in the cyber space (hackers, organized crime, insiders, foreign states) and analyzing techniques, tools and processes they are using to perpetrate attacks against critical assets.

  • Course #: MPCR-6770-101
  • CRN: 46285
  • Instructor: Jung, E.
  • Dates: Aug 28 – Oct 17, 2024

MPCR-6770-201

Cyber Defense Analysis

This course focuses on profiling adversaries in the cyber space (hackers, organized crime, insiders, foreign states) and analyzing techniques, tools and processes they are using to perpetrate attacks against critical assets.

  • Course #: MPCR-6770-201
  • CRN: 46268
  • Instructor: Jung, E.
  • Dates: Oct 18 – Dec 10, 2024

MPCR-7990-101

Capstone

Program staff will manually register eligible students for capstone course. A grade of "B" or higher is needed to pass this course. Core requirement for MPS degree.

Note: Program staff will manually register eligible students for capstone course following a degree audit. A grade of "B" or higher is needed to pass this course. This is a core requirement for MPS degrees.

  • Course #: MPCR-7990-101
  • CRN: 38568
  • Instructor: Pelletier, R.
  • Dates: Aug 28 – Dec 21, 2024

MPCR-7990-102

Capstone

Program staff will manually register eligible students for capstone course. A grade of "B" or higher is needed to pass this course. Core requirement for MPS degree.

Note: This is a core requirement of the degree. Students must earn a grade of "B" or better.

  • Course #: MPCR-7990-102
  • CRN: 44622
  • Instructor: Pelletier, R.
  • Dates: Aug 28 – Dec 21, 2024

MPCR-5615-101

Comm Strat for Info Sec Profs

This course addresses several leadership considerations, including how to navigate culture and style practices within organizations. Students learn how to deploy continual reinforcement in their communications strategy, especially when addressing the issues of risk and change. The course examines multiple communication approaches as well as tools and techniques that are appropriate for different audiences. Finally, students learn how to plan and implement a workforce cybersecurity awareness communications campaign.

  • Course #: MPCR-5615-101
  • CRN: 38500
  • Instructor: Dunlop, P.
  • Dates: Aug 28 – Dec 21, 2024

MPCR-5615-102

Comm Strat for Info Sec Profs

This course addresses several leadership considerations, including how to navigate culture and style practices within organizations. Students learn how to deploy continual reinforcement in their communications strategy, especially when addressing the issues of risk and change. The course examines multiple communication approaches as well as tools and techniques that are appropriate for different audiences. Finally, students learn how to plan and implement a workforce cybersecurity awareness communications campaign.

  • Course #: MPCR-5615-102
  • CRN: 46779
  • Instructor: Sritapan, V.
  • Dates: Aug 28 – Dec 21, 2024

MPCR-6780-101

Cyber Surv.Op&Legal; Framework

Cyber Surveillance Operation & Legal Framework Cyber surveillance operations are indispensable to collect the information necessary to anticipate, discover, and investigate malicious activities on the Internet. This course prepares students to execute surveillance and counter-surveillance operations and learn about the different phases of cyber surveillance operations including planning, targeting, collecting, and terminating. Students will also study legal implications and apply diverse regulations to the conduct of cyber surveillance operations.

  • Course #: MPCR-6780-101
  • CRN: 40406
  • Instructor: Pak, C.
  • Dates: Aug 28 – Oct 17, 2024

MPCR-6775-201

Cyber Threat Intelligence

This course focuses on profiling adversaries in the cyber space (hackers, organized crime, insiders, foreign states) and analyzing techniques, tools and processes they are using to perpetrate attacks against critical assets. Students will be able to develop threat indicators, determine potential implications for existing information systems and exploitation systems, and formulate advice on how to neutralize threats or thwart possible attacks.

  • Course #: MPCR-6775-201
  • CRN: 46238
  • Instructor: Moriarty, K.
  • Dates: Oct 18 – Dec 10, 2024

MPCR-5620-101

Cybersec Governance Frmwrk

This course prepares students to develop governance frameworks for information security management. Students learn how to develop holistic and integrated frameworks that include: (1) strategic planning; (2) security architecture policy and standards; (3) cultural and organizational awareness, training, and change management principles; (4) security operations; and (5) compliance and audit support elements. Students will study existing frameworks that are recognized as best practice in the public and private sectors (federal government, critical infrastructure, ISO 27000 for commercial, etc.).

  • Course #: MPCR-5620-101
  • CRN: 38501
  • Instructor: Shabat, M.
  • Dates: Aug 28 – Dec 21, 2024

MPCR-5600-101

Disruptive Tech & Org Change

This course explores the impact of disruptive technological innovation on organizations and their ability to adapt to change. More precisely, students learn how to detect and anticipate disruptive technologies and their potential impact on organizational culture, processes, and strategies. The course places an emphasis on understanding organizational values, processes, resources, and migration capabilities. Upon completion of the course, students will be able to identify and apply sustainable solutions to accommodate disruptive innovations and capabilities to cope with organizational and industry changes.

  • Course #: MPCR-5600-101
  • CRN: 38502
  • Instructor: Brooks, C.
  • Dates: Aug 28 – Dec 21, 2024

MPCR-5000-101

Ethics in Cybersecurity

In the first part of this course, students are introduced to methodologies, principles, values, and frameworks to facilitate the study of ethics. In the second part of the course, students study discipline- and field-specific codes of ethics within the profession. The course explores the ethical responsibilities all cybersecurity professionals have towards themselves, corporations, the government, and the public. Students contrast the roles and responsibilities of security professionals with those of other information technology professionals. In the third part of the course, students apply an appropriate decision-making framework and gain experience navigating ethical issues in decision-making. Course discussions center on issues involving privacy, confidentiality, and sensitive information. During the final project, students codify an individual code of ethics in relation to professional codes of conduct. Students must receive a grade of B or higher to graduate.

Note: This is a core requirement of the degree. Students must earn a grade of "B" or better.

  • Course #: MPCR-5000-101
  • CRN: 36239
  • Instructor: Applegate, S.
  • Dates: Aug 28 – Dec 21, 2024

MPCR-5000-102

Ethics in Cybersecurity

In the first part of this course, students are introduced to methodologies, principles, values, and frameworks to facilitate the study of ethics. In the second part of the course, students study discipline- and field-specific codes of ethics within the profession. The course explores the ethical responsibilities all cybersecurity professionals have towards themselves, corporations, the government, and the public. Students contrast the roles and responsibilities of security professionals with those of other information technology professionals. In the third part of the course, students apply an appropriate decision-making framework and gain experience navigating ethical issues in decision-making. Course discussions center on issues involving privacy, confidentiality, and sensitive information. During the final project, students codify an individual code of ethics in relation to professional codes of conduct. Students must receive a grade of B or higher to graduate.

  • Course #: MPCR-5000-102
  • CRN: 46781
  • Instructor: Saibene, P.
  • Dates: Aug 28 – Dec 21, 2024

MPCR-5661-101

Info Assurance & Risk Mgmt

This course provides an overview of enterprise security, privacy and information security assessment and management, and cybersecurity. This course concentrates on tangible and intangible costs and examines concepts of information assurance and security risk assessment. Students learn how to assess information security risks and develop solutions. Students also learn traditional risk treatment options (accept, avoid, remediate/reduce, transfer) and apply them to IA/cyber risk management. Topics covered include social engineering, risk assessment, recovery and response, enterprise security, and formal techniques and policies.

  • Course #: MPCR-5661-101
  • CRN: 38503
  • Instructor: Baker, S.
  • Dates: Aug 28 – Dec 21, 2024

MPCR-5661-102

Info Assurance & Risk Mgmt

This course provides an overview of enterprise security, privacy and information security assessment and management, and cybersecurity. This course concentrates on tangible and intangible costs and examines concepts of information assurance and security risk assessment. Students learn how to assess information security risks and develop solutions. Students also learn traditional risk treatment options (accept, avoid, remediate/reduce, transfer) and apply them to IA/cyber risk management. Topics covered include social engineering, risk assessment, recovery and response, enterprise security, and formal techniques and policies.

  • Course #: MPCR-5661-102
  • CRN: 46597
  • Instructor: Baker, S.
  • Dates: Aug 28 – Dec 21, 2024

MPCR-5610-101

Info Sec. Laws and Compliance

This course introduces students to privacy laws, regulations, and industry guidelines with significant security and privacy impact and requirements. The course primarily examines laws and regulations from the United States, but it also includes some coverage of international laws. The course is divided into four sections. First, students are exposed to broadly-applicable laws and regulations that address information security. Second, students receive an introduction to industry-specific guidelines and requirements (FISMA, NERC, HIPAA, HITECH, PSQIA3 , etc.). Third, students examine key state laws and regulations that impact information security management (such as relevant laws in California, Massachusetts, and New York). Finally, students scrutinize other countries’ laws and regulations related to information security and privacy (such as laws in Canada, Mexico, and the European Union) and international standards such as ISO 27001 and 27032.

  • Course #: MPCR-5610-101
  • CRN: 40328
  • Instructor: Khalsa, G.
  • Dates: Aug 28 – Dec 21, 2024

MPCR-5610-102

Info Sec. Laws and Compliance

This course introduces students to privacy laws, regulations, and industry guidelines with significant security and privacy impact and requirements. The course primarily examines laws and regulations from the United States, but it also includes some coverage of international laws. The course is divided into four sections. First, students are exposed to broadly-applicable laws and regulations that address information security. Second, students receive an introduction to industry-specific guidelines and requirements (FISMA, NERC, HIPAA, HITECH, PSQIA3 , etc.). Third, students examine key state laws and regulations that impact information security management (such as relevant laws in California, Massachusetts, and New York). Finally, students scrutinize other countries’ laws and regulations related to information security and privacy (such as laws in Canada, Mexico, and the European Union) and international standards such as ISO 27001 and 27032.

  • Course #: MPCR-5610-102
  • CRN: 46780
  • Instructor: Leusch-Carnaroli, H.
  • Dates: Aug 28 – Dec 21, 2024

MPCR-5750-101

Information Security

This course provides theoretical and applied foundations of information security and assurance. Students study various types of cyber-crime and vulnerabilities of government computer systems and information networks. Students learn about strategies for the protection of information and computer systems and how to mitigate and respond to breaches of those systems.

  • Course #: MPCR-5750-101
  • CRN: 40405
  • Instructor: Saunders, J.
  • Dates: Aug 28 – Dec 21, 2024

MPCR-5750-102

Information Security

This course provides theoretical and applied foundations of information security and assurance. Students study various types of cyber-crime and vulnerabilities of government computer systems and information networks. Students learn about strategies for the protection of information and computer systems and how to mitigate and respond to breaches of those systems.

  • Course #: MPCR-5750-102
  • CRN: 46429
  • Instructor: Molina, P.
  • Dates: Aug 28 – Dec 21, 2024

MPCR-6656-201

Secure Cloud Computing Archit

This course explores the emergence of cloud computing and security architecture deployed to protect data. First, students are introduced to cloud computing, virtualization, legacy hardware and software considerations, approaches to transitioning information technology from legacy systems to a shared managed service model, and various cloud computing models (including private, public, hybrid, and community clouds). After being familiarized with cloud computing, students are introduced to various type of security architectures, standards, protocols, and services used in private and public sectors

  • Course #: MPCR-6656-201
  • CRN: 38821
  • Instructor: Lash, T.
  • Dates: Oct 18 – Dec 10, 2024

MPCR-5605-101

Security Architecture & Design

This course introduces students to fundamental logical hardware, operating system, and software security components, and how to use those components to design, architect, and evaluate secure computer systems. Understanding these fundamental issues is critical to effective information security management. The course is divided into three sections. The first section covers the hardware and software required to have a secure computer system. The second section covers the 9 logical models required to keep the system secure. The third section covers evaluation models that quantify system security.

  • Course #: MPCR-5605-101
  • CRN: 40321
  • Instructor: Moriarty, K.
  • Dates: Aug 28 – Dec 21, 2024