Complete the form below to request specific information regarding questions you have including course cost and course length.
The Master of Business Administration program in Computer & Information Security at Northcentral University emphasizes the abilities and knowledge necessary to pursue a career in business and computer security. Read on to find out more about this program today.
The Master of Business Administration program in Computer & Information Security at Northcentral University is designed to help you grow your knowledge of business and technology for future potential careers. You may have the opportunity to select from a variety of different specialization courses so as to focus more on areas in which you have particular talent or interest. Courses will cover basic topics such as foundations for graduate study in business, as well as more specific subjects such as risk management. You will be required to pass all your courses with at least a B average and complete a capstone research project in order to graduate from the program.
If you are interested in applying to this program, you should have a good mind for technology and organization. You should also have interest in polishing your already well-developed business skills and learning new business and technology techniques. You are required to have a bachelor's degree prior to applying to this program at Northcentral University.
To graduate from this program you will be required to complete 30 credit hours. Of those credits, 15 will be from required foundational courses, 12 credits will be from specialized courses, and three credits will be from a final research project.
Courses for a Master of Business Administration in Computer & Information Security
|Course Code||Course Name|
|Required Foundational Courses|
|BTM5000-8||Foundations for Graduate Study in Business|
|MGT5019 -8||Ethics in Business|
|SKS5000-8||Comprehensive Strategic Knowledge Studies|
|HRM5000-8||Human Resource Management|
|Select 4 courses from the following:|
|CIS5000-8||Introduction to Computer Security|
|CIS5002-8||Corporate Computer and Network Security|
|CIS5003-8||Cyber Forensics: Collecting, Examining, and Preserving Evidence of Computer and Information Crimes|
|CIS5004-8||Introduction to Systems Certification and Accreditation|
|CIS5005-8||Cyberterrorism, Information Warfare, and Critical Infrastructure Protection|
|CIS5008-8||Risk Management in Information Assurance and Security|
|CIS5009-8||Legal and Ethical Issues in Information Assurance|
|CIS5010-8||Contingency Planning and Disaster Recovery for the Security Professional|
|CIS6010-8||Computer Information and Security Research Project|
After graduating from this program, you may choose to look into career options that suit your individual talents or interests. You could find work with a group or team, working individually or as a leader, and in many other potential environments.
Career paths you could pursue include, but are not limited to: