If you're interested in a career in preventing data theft and securing computer networks, you may want to consider National University's Master of Science in Technology and Innovation Management program with a specialization in Cybersecurity. Continue reading for more information about this online master's degree program.

    <h2 id="section---FrequentlyAskedQuestions">Frequently Asked Questions</h2> <h3 id="section---WhatKindOfProgramIsIt">What Kind of Program Is It?</h3> <p>National University's Master of Science in Technology and Innovation Management with a specialization in Cybersecurity is designed to provide you with the opportunity to develop leadership, creative-thinking, and technical skills applicable to the field of computer network security. The program includes specialization courses that cover processes for securing computer networks, disaster recovery methods, benefits of 'The Cloud, cyber forensics and criminal investigations, and developing accreditation and certification programs. You'll also be able to see how to determine an organization's potential for technology improvement and have the chance to design a technology-based solution to a practical problem in the capstone course. </p> <h3 id="section---WhatAreThePrerequisites">What Are the Prerequisites?</h3> <p>Before enrolling in the Master of Science in Technology and Innovation Management with a specialization in Cybersecurity program at NCU, you should have some basic computer skills and a desire to learn more about networks and network security. All applicants to National University's graduate programs should have already earned a bachelor's degree from an accredited institution; some programs have additional requirements. </p> <h3 id="section---WhatAreTheCourseRequirements">What Are the Course Requirements?</h3> <p>To graduate from this program, you must complete 30 credit hours. Twelve credits will be from required foundational courses, 15 credits will be from specialization courses, and three credits will be from a capstone project. </p> <p /> <table border="1"><tr><th>Course Code</th><th>Course Name</th></tr> <tr><td><b>Required Foundational Courses</b></td><td /></tr> <tr><td>TIM 5001</td><td>Changing Times: Managing Technology &amp; Innovation in the 21st Century</td></tr> <tr><td>TIM 5010</td><td>Computer Networks &amp; Mobile Computing</td></tr> <tr><td>TIM 5020</td><td>Databases &amp; Business Intelligence</td></tr> <tr><td>TIM 5030</td><td>Managing Risk, Security, &amp; Privacy in Information Systems</td></tr> <tr><td><b>Specialization Courses</b></td><td /></tr> <tr><td>TIM 6301</td><td> Principles of Cybersecurity</td></tr> <tr><td>TIM 6310</td><td>Cyber Forensics</td></tr> <tr><td>TIM 6320</td><td>Contingency Planning &amp; Disaster Recovery</td></tr> <tr><td>TIM 6330</td><td>Systems Certification and Accreditation</td></tr> <tr><td>TIM 6340</td><td>Secure Software Development</td></tr> <tr><td><b>Capstone Course</b></td><td /></tr> <tr><td> TIM 6010 </td><td>Strategic Management of Technology &amp; Innovation</td></tr> </table><h3 id="section---WhatCouldIDoAfterGraduation">What Could I Do After Graduation?</h3> <h4 id="section---CareerOpportunities">Career Opportunities</h4> <p>After completing the MS-TIM in Cybersecurity program, you could be ready to take on computer and data security roles within a wide variety of organizations. You may seek positions where you implement new data security protocols or work to identify possible security breaches and thwart hackers. You could explore careers that include: </p> <ul><li>IT director </li><li>Computer security analyst </li><li>Network security administrator </li><li>Cyber security consultant </li><li>Cybersecurity engineer</li></ul>