Education

The Master of Science in Information Systems with a concentration in cybersecurity is usually offered as a cohort program and provides students with the knowledge needed for careers in the areas of security, privacy and assurance of information, and information systems.

Program Highlights

  • U.S. News & World Report has ranked Robinson’s graduate information systems program as #11 in the nation (March 2017).
  • The Department of Computer Information Systems is ranked #2 in the world for publications in premier information systems journals.
  • Students learn key concepts, technologies and methodologies to successfully address cybersecurity risks by deploying and managing information security tools.
  • Students experience real-world scenarios and team dynamics by using state-of-the art hacking and forensics tools in a secure environment as well as engaging in cybersecurity projects and professional organizations (TAG, ISSA).
  • Students receive additional training to prepare for leading industry certifications such as CISSP, CISA, CEH, and CCSP.
Learn more about the program 

Master of Science in Information Systems Cybersecurity Concentration Courses

CIS 8080 – Security and Privacy of Information and Information Systems

This course is designed to develop knowledge and skills for security of information and information systems within organizations. It focuses on concepts and methods associated with planning, designing, implementing, managing, and auditing security to all levels and on all systems platforms, including worldwide networks. The course presents techniques for assessing risk associated with accidental and intentional breaches of security. It covers the associated issues of ethical uses of information and privacy considerations.

CIS 8088 – Network Security and Hacking

This course focuses on three specific aspects of data communication networks: 1) the technological underpinnings of data transmission over computer networks; 2) the known approaches to compromise and/or damage the networks; and 3) skills and methods necessary to prevent, detect and recover from network-based attacks. This course presents both theory and practice of network attack and defense and discusses contemporary tools, techniques and methodologies of attackers and defenders alike.

CIS 8085 – Information and Information Systems Risk Management

This course develops knowledge and skills in risk based information security management geared toward preventive management and assurance of security of information and information systems in technology-enabled environments. It focuses on risk assessments, risk mitigation strategies, risk profiling and sensitivity, quantitative and qualitative models of calculating risk exposures, security controls and services, threat and vulnerability management, financing the cost of security risks, and return on investment for information security initiatives. The course presents several risk assessment models with an ultimate goal of identifying and realizing the unique and acceptable level of information risk for an organization.

CIS 8086 – Protecting Information Assets

This course provides students with a foundation and understanding of IT auditing services focused on protecting information assets. Topics include security, integrity, and availability of information systems. The course will allow the student to establish the scope, control environments and identify risks associated with information assets. It will also cover the protection of assets involving state-of-the art technologies such as virtualization and cloud computing. Students will understand how assessing risk is an important first step in undertaking the proper examination of an organizations IT processes and technologies. Further, the course will cover latest standards and frameworks related to the auditing of information assets.

CIS 8394 – Advanced Topics in Cybersecurity/CIS 8690 Advanced Topics in Information Systems – Cloud Security

This course allows for the in-depth study of emerging or advanced topics in cybersecurity. Emphasis will be placed on readings from professional literature, lectures, case studies and projects. The course will benefit the students by exposing them to cloud computing concepts, elaborating on risks and benefits related with cloud. At the end of the course, students will get the complete understanding of the legal and compliance issues related to cloud computing and are able to discuss and solve issues relating to cloud data, infrastructure and operations security.

CIS 8394 – Advanced Topics in Cybersecurity – Security Analytics

This course provides students with the knowledge and skills needed to think cognitively to address cyber security as well as Big data issues. The course will educate students through a case-study approach along with the use a variety of state-of-the-art software from IBM for the organization, analysis, and visualization of cyber security solutions in a variety of ways. It also includes several labs that can be accessed remotely. The cutting edge cognitive security systems, built upon security intelligence, generate evidence-based reasoning and recommendations for improved decision making in real time. Hence, this course is specially designed to hone skills in the students in the area of augmented intelligence and cyber security and prepare them for next generation jobs in information security.

CIS 8391 – Field Study in Computer Information Systems

This course is designed to provide the senior level undergraduate or master’s student with an opportunity to apply the business skills learned at the Robinson College of Business in an approved site off or on campus. The course immerses students in the planning and execution of complex activities involved in both large and small businesses.

 

Master of Science in Information Systems Required Courses

 CIS 8000 Information Technology Project Management

This course examines the defining characteristics of IT projects and introduces the student to a variety of project management techniques that can be applied in an IT project context. Managing scope, time, cost, and quality will be explored. The course will cover management issues associated with packaged software implementation (e.g., ERP systems), in-house developed systems, and outsourced projects.

 CIS 8010 Process Innovation

This course examines the design of an organization’s structure and business processes. The course primarily focuses on the application of information technologies to transform organization and improve their performance. Methods of introducing and implementing information technologies to enable organizational change are examined.

 CIS 8090 Enterprise Architecture

This course will explore the concepts, principles, and state-of- the-art methods in enterprise architectures, including architectural styles, architecture description languages (ADL), software connectors, dynamism in architectures, and architecture-based testing and analysis. The course will help understand the role of architecture in software engineering, specifically during requirements analysis, design (including object-oriented design and related notations, such as UML), and implementation. The course will also cover practical applicability of architectures in software reuse and component interoperability platforms (such as CORBA, Enterprise JavaBeans, COM/DCOM, and .NET as well as Service-Oriented architectures, SoaS, SoaP and the like.).

 CIS 8040 Fundamentals of Database Management Systems

Developing and managing efficient and effective database applications requires understanding the fundamentals of database management systems, techniques for the design of databases, and principles of database administration. This course emphasized database concepts, developments, use and management in three main sections: database concepts, practice, and emerging trends. Relational database systems are the main focus. Practical design of databases and developing database applications using modern software tools will be emphasized.