Online Master's Information Systems
Master of Science in Management - Information Systems Security
According to a 2015 (ISC) Global Information Security Workforce Study, it’s estimated that by 2020, there will be a shortfall of 1.5 million information security employees.1 Colorado Technical University’s Master of Science in Management concentration in Information Security Systems is designed for those interested in pursuing technical leadership positions in security management.
This degree program is designed to help you develop management and leadership skills while providing the opportunity to explore network security, software information assurance, security management, and cybersecurity threats. You will also have the opportunity to examine security technologies, cryptography and cryptographic services, and incident reporting. This MSM-ISS program offers you the opportunity to develop a greater understanding of how to prepare for technical leadership opportunities in information security systems.
Ranked Among the Best Online Graduate Business Programs
For the seventh year in a row, CTU's Master of Science in Management degree programs are ranked among the Best Online Master's in Business Programs (excluding MBA) by U.S. News and World Report.*
Manage your education with your smartphone or tablet anytime, anywhere with CTU Mobile. Classes start 9 times per year and run 5 weeks long.
* CTU programs are ranked among U.S. News & World Report’s 2022 Best Online Programs.
CTU is institutionally accredited by the Higher Learning Commission www.hlcommission.org
CTU's Master of Science in Management - Information Systems Security is accredited by the PMI Global Accreditation Center for Project Management Education Programs (GAC).**
- February 21, 2023
- April 04, 2023
- May 09, 2023
- Colorado Springs
Management - Information Systems Security
Total tuition for this degree program will vary depending on your educational needs, existing experience, and other factors.Estimate your costs, potential savings and graduation date
The Master of Science in Management with a concentration in Information Systems Security (MSM-ISS)is a 48-credit-hour program offered online and at the Colorado campuses. The degree includes 28 credit hours in the management core along with 20 hours in the information systems security concentration.
This program is designed to help technical leaders in security management to combat threats in today’s environment by developing an understanding of security management, network security principles, and certification and accreditation requirements. This program is designed to provide the student with the information system security skills necessary to manage and protect the vital technology assets of today’s organizations.
This program does not lead to additional licensure or certification. As such, CTU has made no determination regarding prerequisites for licensure or certification in any state or jurisdiction.
The mission of the College of Business and Management is to offer professional market-driven business degrees that build business competencies transferrable to all industries. The College of Business and Management accomplishes this mission by offering curriculum that aligns to industry standards, remains relevant, and builds practical skills applicable to the competitive global business environment.
Course Title Course Description Credit Hours MGMT690
Students will master analytical and integrative tools to perform in-depth analyses of industries, firms, and competitors. Course material includes methods to predict competitive behavior and develop and implement strategic plans to achieve and sustain a competitive profile in the emerging global marketplace.
Strategic Management in Dynamic Environments 4 IT635This course introduces students to the audit services in accordance with IT audit standards. This course develops the skills needed to evaluate risk-based IT audit strategies; develop specific audits plan, report the finding, and develop status reports in order to assist the enterprise with protecting and controlling information systems. Information Systems Auditing 4 PM600
This course emphasizes the development and integration of project management in organizations. It provides an overview and introduction to the discipline of project management, coupled with an examination of the techniques that project managers use to complete their projects on schedule, within budgeted cost, and according to specified scope and quality. With materials presented by the Project Management Institute (PMI®) in its Guide to the Project Management Body of Knowledge (PMBOK® Guide), students explore the theoretical and operational framework of project management relating to the project life-cycle of project initiating, planning, executing, monitoring and controlling, and closing.
Project Management Processes in Organizations 4 PM610
This course offers a practical approach emphasizing the project knowledge areas and process groups presented by the Project Management Institute (PMI®) in its Guide to the Project Management Body of Knowledge (PMBOK® Guide). The course provides an overview of aspects related to the project life-cycle and project management techniques that are used to manage projects successfully by delivering them on schedule, within budget and quality and customer acceptance.
Project Planning, Execution and Closure 4 PM620
This course emphasizes a hands-on approach to using project management tools to facilitate scheduling, estimating, tracking and controlling the schedule and costs of the project. Working with a given or chosen project schedule, a project baseline will be established so that actual schedule and cost variances can be compared to the project baseline, and corrective actions can be developed to address the variances. Specific project management tools covered include Gantt, PERT, Milestone Charts, Critical Path Method (CPM), Earned Value Management (EVM), Present Value (PV) and Internal Rates of Return (IRR). Specific topics covered include developing contingency plans, incorporating risk and quality factors into project cost and schedule and establishing ways to communicate project status to various stakeholders at various points in the project life-cycle.
Schedule and Cost Control Techniques 4 PM630
This course includes writing, negotiating and adhering to contracts, as well as legal and ethical considerations. Procurement, including writing, clarifying and communicating specifications, is covered. There is an emphasis on Contract Administration and dealing with subcontractors. Topics include bidding, types of bids (e.g., RFQs, IFBs, and RFPs), types of contracts (e.g., fixed price, cost plus, and time and materials), and their respective purposes and impact on risk and project contract negotiations. Changes in contracts, methods to resolve disputes, and writing clear statements of work (SOW) are discussed.
Contracting and Procurement in Project Management 4 PM665
As the Capstone course in the Project Management program, this course requires students to demonstrate how to synthesize and apply the concepts, knowledge, skills, tools, and to a real world scenario project. Students will be required to demonstrate the ability to produce a complete project plan, understand project integration and management of projects within a program, use project management software to manage cost, time, and resources, and manage project stakeholder expectations.
Project Management Capstone 4 Total Credit Hours: 28
Course Title Course Description Credit Hours CS651
This course introduces the overall foundations required for the understanding of, and further study in, information systems security. It reviews the history of security and computer systems security in particular to develop a set of models to guide the approach to realizing computer systems security. An overview of current security technologies is presented. A research project and formal paper are required.
Computer Systems Security Foundations 4 CS653
Students are provided with a brief overview of the basic elements of networking concepts, topologies, protocols and threats necessary to understand network security issues and make security relevant decisions. An in-depth analysis of the Open Systems Interconnection (OSI) model and layered network security mechanisms needed to provide Confidentiality, Integrity, Availability, Authorization, Authentication and Non-repudiation within a network environment is included. This course includes a thorough treatment of cryptography and cryptographic services. An implementation plan and formal paper are required.
Network Security 4 CS654
This course covers a variety of issues relating to the management of information systems security. The topics covered include development of policies, standards and procedures, risk analysis methodologies, contingency planning and disaster recovery. Additional topics covered include legal and ethical issues, incident reporting, security auditing, computer crime, and security awareness and training. Implementation issues, potential conflicts and tradeoffs are also discussed. A project is required.
Security Management 4 CS661
Attacks on enterprise level systems can be focused on many targets. Some of the targets, such as WEB servers are at the perimeter of the network. Others occur at the applications running on various operating systems. This course examines vulnerabilities caused by both scripting errors or poor scripting techniques on WEB based applications. Further, vulnerabilities created in custom developed applications written in high level programming languages are examined. SQL problems and architecture design flaws in relational database systems that contribute to vulnerabilities are also analyzed. A whole new set of intrusion risks present themselves with the newer emerging media and application environments such as cloud computing, social media venues, and mobile computing. Students will also conduct research into these areas. The need for security driven life cycle development models and security standards for programming and scripting languages are presented.
Software Information Assurance 4 CS662
A system that performs mission-sensitive operations requires access to sensitive resources. The owners of these resources require a measure of the risk assumed in allowing access in the intended manner as well as an assessment of how well the system implements its requirements. The DOD was first in evolving strategies and methods to formally address these tasks, most recently by the DITSCAP and its civilian counterpart, NIACAP. This course addresses each of these topics and standards and how they may lead to a higher level of assurance systems development.
System Security Certification and Accreditation 4 Total Credit Hours: 20
Total Credit Hours: 48
Accreditations and Alignments
The Master of Science with a concentration in Information Systems Security is accredited by the PMI Global Accreditation Center for Project Management Education Programs (GAC).
Compare Related Areas of Study
Compare up to three additional degrees
Ways to Save
Cost of this degree may be reduced based on one or more of the following:
Where do I go from here?
Choosing to continue your education with is a big decision and we're here to help. Choose one of the options below to get started.
Start the conversation
Submit your details and speak to an admissions advisor within the next day:Request Information
Chat or call an Admissions Advisor today.1-855-230-0555
Program details are provided lower on the page.
Classes start February 21, 2023 *
*Start dates may vary by program and location.
CTU’s Master of Science in Management (MSM) in Information Systems Security Degree Program is designed to provide knowledge, skills, and abilities relevant for pursuing potential opportunities in the workforce. This management degree program emphasizes developing management and leadership skills while providing the opportunity to explore network security, software information assurance, security management, and cybersecurity threats. Students can also examine security technologies, cryptography and cryptographic services, and incident reporting.
As you work to complete your MSM, you will be immersed in courses where you will study these topics and much more: networking concepts, topologies, protocols, and threats needed to understand and address network security; issues relating to managing information systems security; and vulnerabilities caused by both scripting errors or poor scripting techniques on WEB-based applications.
Courses for the Master of Science in Management in Information Systems Security start online and at our Colorado Springs campus approximately every five weeks. Completion of the CTU admissions process will depend on how quickly you complete the steps in the CTU online application process. You may complete the application process over the phone with an advisor or you may go online. Once you’ve completed the online application, you may hear from an advisor within the following 24 hours to discuss the next steps toward starting your degree program. Master’s programs may have additional entrance requirements that take additional processing time.
The Master of Science in Management in Information Systems Security degree program consists of 48 credits. You may be eligible for transfer credit, which is evaluated on an individual basis. Not all credits are eligible to transfer.
As you study topics in management and IT that are always being evaluated and updated to reflect industry-relevant trends, you will experience a curriculum through classroom learning and hands-on experience that aligns to industry standards and helps you work to develop skills that are applicable to the competitive global business environment.
The Master of Science in Management with a concentration in Information Systems Security degree program at CTU is accredited by the PMI Global Accreditation Center for Project Management Education Programs (GAC).
**The GAC Accredited Program seal is a mark of Project Management Institute, Inc.
1 2015 (ISC) Global Information Security Workforce Study, https://iamcybersafe.org/wp-content/uploads/2017/01/FrostSullivan-ISC%C2%B2-Global-Information-Security-Workforce-Study-2015.pdf