Request more info and start your application
Earn your degree from University of Maryland Global Campus.
$499 per credit for out-of-state students. $250 per credit for military students.
Apply up to 90 credits to your degree with UMGC's generous transfer credit policies.
Access course materials, complete hands-on projects, and connect with instructors and peers anytime and from anywhere.
Develop skills and gain knowledge through coursework that draws from our faculty of highly successful and experienced scholar-practitioners who are leaders in their fields. With continuously refreshed and updated curriculum, students can be confident that they are developing the real-world skills that will help launch their cybersecurity career.
Applications are now open.
Upcoming Application Deadlines
Applications are now open.
Upcoming Application Deadlines
The field of cybersecurity is growing and evolving at a rapid pace, creating a huge demand for trained cyber professionals. UMGC cybersecurity management and policy courses can help prepare you to:
Establish and evaluate key cybersecurity governance processes and programs.
Apply appropriate cybersecurity frameworks, models, standards, and controls.
Identify, assess, and manage information security-related risk.
Analyze the implications of new or emerging technologies.
(Designed in part to help prepare for the EC-Council Secure Computer User CSCU certification.) Prerequisite: Any CMIS, CMIT, CMSC, CMST, CSIA, DATA, IFSM, or SDEV course. A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the "soft skills" necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program.
A comprehensive study of ethics and of personal and organizational ethical decision making in the use of information systems in a global environment. The aim is to identify ethical issues raised by existing and emerging technologies, apply a structured framework to analyze risk and decision alternatives, and understand the impact of personal ethics and organizational values on an ethical workplace.
(Designed to help prepare for the CompTIA Network+ certification exam.) Prerequisite: CMIT 202 or CMSC 115 (or CMIS 141). An introduction to networking technologies for local area networks, wide area networks, and wireless networks. The aim is to recognize the type of network design appropriate for a given scenario. Topics include the OSI (open system interconnection) model, security, and networking protocols. Students may receive credit for only one of the following courses: CMIT 265 or CMIT 265M.
(Designed to help prepare for the CompTIA Security+ exam.) Prerequisite: CMIT 265 or CompTIA Network+ certification. A study of the fundamental concepts of computer security and its implementation. The aim is to assess and mitigate risk, evaluate, and select appropriate technologies, and apply proper security safeguards.
(Includes content designed to help in preparing for EC-Council Certified Incident Handler ECIH certification.) Prerequisites: IFSM 201 and WRTG 112 or equivalent. A study of the processes and technologies used to implement and manage enterprise IT security operations. The goal is to apply and integrate cybersecurity concepts and best practices with the principles of IT operations and management and to prepare for a government- and industry-recognized intermediate level cybersecurity certification (Certified Incident Handler). Topics include the essential management and operational activities (acquisition, deployment, and operations) required to secure IT technologies and business operations against a wide variety of threats and attacks.
(Designed to help prepare for the Program Management Institute ¿ Professional Business Analyst (PMI-PBA) certification exam.) Prerequisite: CSIA 310. A study of the application and integration of cybersecurity principles, frameworks, standards, and best practices to the management, governance, and policy development processes for businesses. The aim is to apply business analysis principles and methods to cybersecurity problems in business and industry. Discussion covers the organization, management, and governance of cybersecurity for enterprise IT in business settings; risk and risk management practices; and development and implementation of industry-wide cybersecurity initiatives and programs.
Prerequisite: CSIA 350. A study of cybersecurity management and governance in the context of the missions, functions, and operations of federal, state, and municipal government agencies, departments, and programs. Discussion covers the policy life cycle and the mechanisms used by governments to formulate and implement laws, policies, regulations, and treaties to protect and defend government operations and society as a whole against cyber attacks and crimes, both foreign and domestic.
(Includes content designed to help in preparing for IAPP Certified Information Privacy Professional/US certification.) Prerequisite: CSIA 360. A study of the application of cybersecurity principles, frameworks, standards, and best practices to organization-level strategies, policies, programs, plans, procedures, and processes. The aim is to assist students in preparing to take an internationally recognized information privacy certification. Projects include writing security policies and plans, developing metrics and measures for information security programs, planning audits of compliance practices and processes, and developing organization-level security policies for enterprise IT governance. Discussion covers principles and best practices for protecting privacy and ensuring compliance with laws and regulations.
Prerequisites: CMIT 320 and CSIA 350. A survey of emerging and leading technologies in the cybersecurity field. The aim is to research, evaluate, and recommend emerging technologies and determine secure implementation strategies for best-fit business solutions. Topics include evolutionary technology development and adoption in organizations.
(Designed to help prepare for the (ISC)2 Certified Information System Security Professional (CISSP) certification exam.) Prerequisite: CMIT 320 or CompTIA Network+ and Security+ certifications. A comprehensive study of information systems security to enhance organizational security. The goal is to manage risks by identifying and mitigating them. Students may receive credit for only one of the following courses: CMIT 425 or CMIT 499S.
(Intended as a final, capstone course to be taken in a student's last 6 credits; includes content designed to help in preparing students for the EC-Council Certified Chief Information Security Officer CCISO and Information Security Manager EISM certifications.) Prerequisites: CMIT 320 and CSIA 413. A study of cybersecurity management and policy that integrates knowledge gained from previous coursework and experience. Focus is on developing security strategies, plans, policies, and processes for the protection of an organization's critical information and assets. The goal is to enhance professional skills in cybersecurity management and leadership. Topics also include the ethical integration of cybersecurity best practices and risk management throughout an enterprise.
Submit your application by August 13, 2024.
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work.
These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.
These cookies enable the website to provide enhanced functionality and personalization. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.