The Doctor of Business Administration with a specialization in Computer & Information Security program at National University consists of classes meant to you the knowledge and skills that will be necessary if you choose to go into a computer security related business career. Read on to find out more about this program today.
<h2 id="section---FrequentlyAskedQuestions">Frequently Asked Questions</h2>
<h3 id="section---WhatKindOfProgramIsIt">What Kind of Program Is It?</h3>
<p>The Doctor of Business Administration with a specialization in Computer & Information Security program at National University is designed to help you expand your current technical and business knowledge and give you the skills needed to understand and work in the field of computer security. Courses will explore research and foundational topics while giving you the chance to select from a variety of electives concerning information security. You will also be required to take an examination course and dissertation courses to demonstrate what you have learned during your time in the program. To graduate from the program, you will be required to maintain a B average and write a successful applied doctoral dissertation.
</p>
<h3 id="section---WhatAreThePrerequisites">What Are the Prerequisites?</h3>
<p>This program demands a solid mind for technical studies as well as an understanding of how businesses function. You should already have a foundation in business and should have a basic understanding of technology. You are required to have at least a master's degree prior to applying to this program at National University.
</p>
<h3 id="section---WhatAreTheCourseRequirements">What Are the Course Requirements?</h3>
<p>You are required to complete at least 54 credit hours in order to graduate from this program. Those credit hours will include 27 from foundational courses, 15 from specialization courses, and 12 from dissertation courses.
</p>
<p><u>Courses for a Doctor of Business Administration with a Specialization in Computer & Information Security</u>
</p>
<p />
<table border="1"><tr><th>Course Number</th><th>Course Title</th></tr>
<tr><td><b>Required Courses</b></td><td /></tr>
<tr><td>BTM 7101</td><td> Doctoral Studies in Business</td></tr>
<tr><td>SKS 7001</td><td>Doctoral Comprehensive Strategic Knowledge Studies - Eval Track Students</td></tr>
<tr><td>BTM 7300</td><td> Scholarly Literature Review</td></tr>
<tr><td>MGT 7019</td><td> Ethics in Business</td></tr>
<tr><td>BTM-7104</td><td> Statistics I</td></tr>
<tr><td>BTM 7303</td><td> Research Methods</td></tr>
<tr><td>BTM 7103</td><td> Research Design</td></tr>
<tr><td>BTM 7106 <br /> <b>or</b> <br /> BTM-7108 </td><td>Quantitative Research Design <br /> <br /> Qualitative Research Design</td></tr>
<tr><td>BTM 7109</td><td> Planning Dissertation Research in Business</td></tr>
<tr><td>CMP 9600B</td><td> DBA Portfolio</td></tr>
<tr><td><b>Specialization Courses</b></td><td /></tr>
<tr><td>Select five courses from the following:</td><td /></tr>
<tr><td>CIS 7002</td><td> Organizations Corporate Computer and Network Security</td></tr>
<tr><td>CIS 7003</td><td>Cyber Forensics</td></tr>
<tr><td>CIS 7005</td><td>Critical Infrastructure Protection, Information Warfare, and Cyber Terrorism</td></tr>
<tr><td>CIS 7006</td><td>Foundations of Computer Network Auditing</td></tr>
<tr><td>CIS 7007</td><td>Information Security and Outsourcing Computer Systems</td></tr>
<tr><td>CIS 7008</td><td>Advanced Risk Management in Information Assurance and Security</td></tr>
<tr><td>CIS 7009</td><td>Information Assurance from Legal and Ethical Issues</td></tr>
<tr><td>CIS 7010</td><td>Disaster Recovery and Contingency Planning for the Security Professional</td></tr>
<tr><td><b>Dissertation Courses</b></td><td /></tr>
<tr><td>DIS 9901A </td><td> Components of the Dissertation</td></tr>
<tr><td>DIS 9902A </td><td> The Dissertation Proposal</td></tr>
<tr><td>DIS 9903A </td><td> Institutional Review Board (IRB) and Data Collection</td></tr>
<tr><td>DIS 9904A </td><td> The Dissertation Manuscript and Defense</td></tr>
</table><h3 id="section---WhatCouldIDoAfterGraduation">What Could I Do After Graduation?</h3>
<h4 id="section---CareerOpportunities">Career Opportunities</h4>
<p>Upon completing this program, you may choose to pursue a number of different business-oriented career opportunities. Because your specialization is in computers, you may be able to find work that involves you interacting mostly with technology as well as jobs that test your interpersonal and organizational skills.
</p>
<p>Possible career paths include but are not limited to:
</p>
<ul><li>Business Administrator
</li><li>IT Specialist
</li><li>FBI Worker
</li><li>Computer Security Advisor
</li><li>Security Program Designer/Producer
</li><li>Cyber Criminal Investigator</li></ul>
.jpg)
