Computer and Information Security

Master of Business Administration

The requirement for computer security knowledge increases as new techniques and technologies are developed. Existing protections in systems and network perimeters must be constantly upgraded to meet evolving threats. In this specialization, you will gain not only the managerial knowledge to lead projects and teams, but also increase your technical knowledge in key computer security disciplines. You will explore the latest information security threats, defenses and trends, and examine realistic examples of the crucial links between security theory and the day-to-day security challenges in IT environments. As a final assignment, you will complete a written research project demonstrating your ability to investigate on a workplace problem and recommend a plan of preventative action.

MBA Degree Requirements

The Master of Business Administration requires 30 credit hours beyond the bachelor's degree. The MBA program includes 18 credit hours of foundational courses. The foundational courses are taken by all students regardless of their undergraduate degree to form and strengthen fundamental business skills. The next 9 credit hours in the program encapsulate a specialization aligned with a student’s career goals and interests. Elective courses must be appropriate to the student’s degree program.

Completion Period for Master's Degrees

Northcentral University allows 5 years to complete all 30 credit hour master's programs. Normal time to complete varies depending upon course take rate and credits transferred.

MBA Required Foundational Courses - 18 credit hours

Course Code


Course Description


Welcome to Changing Times - Business in the 21st Century

This course is designed to encourage students to understand and consider the impact of current trends such as globalization, sustainability, and technology on businesses. The subsequent core courses will provide a greater in-depth knowledge of business concepts and areas in an integrated fashion.


Managing People and Teams

This course presents the basic theories, skills, and applications related to communications in an organizational setting from a manager's point of view. The course focuses on the consistent, logical process approach that can be used to solve many communication problems. The course also covers topics that are essential to contemporary business communications, including critical thinking, the Internet, the World Wide Web, email, and other technological communication tools. It also presents basic theories, skills, and applications required to effectively communicate in a complex organizational setting emphasizing a manager's point-of-view.


Managerial Decision-Making

This course is a study of the skills and cognitive processes that managers utilize and the factors that influence effective business decisions in the global business environment. Students will learn practical problem-solving and critical thinking in their analysis of real-world business scenarios, selection of tools and techniques, and identification of problems, opportunities, and solutions. Students will also learn how information technology can provide effective decision support for complex business issues.


Managing Business Finances

In this course, students are introduced to procedures, process, and tools to effectively manage the business finances. Students will apply and practice these concepts in a wide range of simulated business and managerial situations. Topics include; Business and managerial economics, profit and loss, understanding financial reports, financial risk analysis, asset valuation, budgeting, managerial and financial accounting, financial ethics, and cost management. Students will practice using financial tools and case studies to aid in their analysis and financial decision-making.


Operations Management

This course is an introduction to the principles of operations management as they relate to business strategy. Students will learn how to manage business operations based on a global supply chain with diverse and geographically-dispersed suppliers and customers. Students will also examine how information systems can have a positive impact on operational productivity, competitiveness, automation of business processes, and electronic commerce.


Innovation and Marketing

In this project-based course, students will investigate and practice strategies for innovation and introduction of new ideas, products, and technologies to market. Students will practice assessing their customers' needs and tailoring strategies and tactics accordingly. An integrative approach builds marketing management upon business analysis, supply chain, operations, economics, and financial management. Students will set marketing goals and produce plans to reach those goals and measure their progress. Ethical, social, and legal aspects such as marketing to minors and false or deceptive practices will be examined.

Specialization Courses - Select 3 courses from the following (9 credit hours):

Course Code


Course Description


Introduction to Computer Security

The course provides insights and realistic examples to any practitioners or students enabling them to understand the crucial links between security theory and the day to day security challenges of IT environments. The text explains the fundamentals of security: the different types of widely used policies, the mechanisms that implement these policies, the principles underlying both policies and mechanism, and how attackers can subvert these tools- as well as how to defend against attackers. A practicum demonstrates how to apply these ideas and mechanism to a realistic company.


Corporate Computer and Network Security

This course presents a framework about security threats and security management in corporations. It covers the techniques and mechanisms designed to thwart security threats as well as known methods for exploiting vulnerabilities. Concentration will be placed on the management of the security functions, elements of cryptography and cryptographic systems, access control and site security, incident and disaster response, TCP/IP and how hackers use it to attack organizations, attack methods, attack prevention systems (firewalls and host security), and application security.


Cyber Forensics: Collecting, Examining, and Preserving Evidence of Computer and Information Crimes

This course provides a comprehensive, highly usable, and clearly organized approach to the issues, tools, and control techniques needed to successfully investigate illegal activities perpetuated through the use of information technology. It introduces the student to the broad field of cyber forensics and presents the various tools and techniques designed to maintain control over an organization. Students will acquire the ability to identify, gather, document, and preserve evidence of electronic tampering and misuse. It helps the student to create appropriate audit procedures and helps the professional protect corporate assets.


Introduction to Systems Certification and Accreditation

This course provides guidance on principles that must exist in order to establish and maintain a certification and accreditation program. Students will explore the required processes for accreditation and certification programs including project planning, system inventory, system security plans, risk assessment, security procedures, certification testing, documentation of accreditation decisions, and coordination of security for interconnected systems. The course will also provide the student with a more thorough understanding of what a complete certification and accreditation program can do to benefit an organization. A framework for a systems certification and accreditation program will be developed.


Cyberterrorism, Information Warfare, and Critical Infrastructure Protection

This is an introductory course covering the basic aspects of Information warfare. In the last two decades, the U.S. economy's infrastructure has undergone a fundamental set of changes, relying increasingly on its service sector and high technology economy. Cyber terrorism is an emerging new mode of information warfare underscoring the perpetrators' deliberate exploitation of civilian and military systems' inherent vulnerabilities; thereby affecting national and global security The U.S. depends on computers, electronic data storage and transfers, and highly integrated communications networks. Its rapidly developing new form of critical infrastructure is exceedingly vulnerable to an emerging host of threats. This course examines the dangers of, and the evolving U.S. policy response to, cyber terrorism.


Risk Management in Information Assurance and Security

The challenges associated with assessing and implementing computer security is an ongoing issue. In this course, an overview of the subject of information technology system security will be presented to discover how to effectively assess and implement security in information technology by abiding by a structured and information-centric process. The student will examine the nature of risk and its application to information system security, threats, and vulnerabilities and assessing risk variables. Information states, the security life cycle, and safeguard analysis will also be covered. In addition, the CIA (confidentiality, integrity and availability) model, as a central mechanism to protect information, will be explored in real world settings.


Legal and Ethical Issues in Information Assurance

The course provides an overview of ethics and how ethics affect IT professionals and IT users. Students study how IT professionals and IT users are faced with ethical decisions regarding IT security, common types of computer security attacks, privacy protection, the impact of IT on the quality of life, freedom of expression, intellectual property and employer and employees issues including the key ethical issues associated with the use of contingent works.


Contingency Planning and Disaster Recovery for the Security Professional

The course provides a thorough strategy to guide students with the background knowledge and skills they need to develop effective disaster prevention and recovery capabilities in various organizations. Students will be able to demonstrate an understanding of the principles of disaster recovery planning for physical security consideration, host applications, and network security measures.

The Program Capstone Course (3 credit hours) will be complete as the last course in the degree program.

Course Code


Course Description


Strategic Planning

This course provides an overview of effective strategic planning formulation and correct application for use in real life situations. Students will develop skills in operational business strategies as well as being introduced to the entire strategic planning process

At Northcentral University, we pride ourselves in being completely transparent when it comes to tuition and fees. If a cost is not included in our Cost Per Course Tuition Rate, we let you know up front. Currently, the only additional cost above your program rate* is books. Learn more about the NCU’s MBA costs below:

  • Per credit cost: $773
  • Per 3 credit course cost: $2,319
  • Program cost: $23,190
  • Average book cost per course: $110
  • Application Fee: $0
  • Learning Management Fee (one-time per program): $350
  • Registration Fee: $0

Click here to learn more about payment and financing options.

*Program rates are subject to change and generally increase at the start of each calendar year.

Total program costs reflected are calculated based on standard degree program credits exclusive of the program’s potential evaluation track. The actual cost of a program is determined based upon the program and track the student enters, transfer credits if any, and other unique student factors. For more information: please contact Admissions or refer to the catalog.

If there’s one thing we’ve learned about our students, it’s that they are motivated and ambitious—but they are also busy! At Northcentral University, we’ve designed our education experience to work with you, not against you, so you can achieve your academic goals without sacrificing the quality, flexibility and support you need to be successful.

To learn more, request information or call 1-866-776-0331 to speak with an enrollment advisor today. We offer new courses every Monday of the year so you can get started when it’s best for you.

ACBSP Accredited Online MBA Degree Program

ACBSP Accredited

In addition to NCU’s regional accreditation from the HLC, our business programs in the School of Business and Technology Management have received programmatic accreditation from the Accreditation Council for Business Schools and Programs (ACBSP). ACBSP promotes continuous improvement and recognizes excellence in the accreditation of business education programs around the world.