Computer and Information Security
The requirement for computer security knowledge increases as new techniques and technologies are developed. Existing protections in systems and network perimeters must be constantly upgraded to meet evolving threats. In this specialization, you will gain not only the managerial knowledge to lead projects and teams, but also increase your technical knowledge in key computer security disciplines. You will explore the latest information security threats, defenses and trends, and examine realistic examples of the crucial links between security theory and the day-to-day security challenges in IT environments. As a final assignment, you will complete a written research project demonstrating your ability to investigate on a workplace problem and recommend a plan of preventative action.
MBA Degree Requirements
An MBA in Business Administration requires 30 credit hours beyond the bachelor degree level. The MBA program includes 15 credit hours of foundational courses. The foundational courses are taken by all students regardless of their undergraduate degree to form and strengthen their fundamental business skills. The remaining 15 credit hours encapsulate a specialization aligned with a student’s career goals. Students may also opt for a General Business specialization, electing 15 credit hours of cross-discipline courses. Elective courses must be appropriate to the student's degree program.
Students in the MBA program are required to demonstrate competency in the areas listed below:
- Research - MBA students are required to show competency in writing skills for research purposes through their Northcentral University coursework.
- Computer Competency - MBA students are required to use appropriate computer skills that are necessary in writing research papers. Students must be able to prepare documents using APA formatting and advanced word processing skills, such as the creation of title pages, abstracts, tables and figures, headers and footers, page breaks, tables of contents, and hanging indents.
Students assume full responsibility for understanding both the foundational and specialization requirements of each program. Switching programs after completing coursework may result in reevaluation, monetary loss, loss of credit hours and/or the need to take additional credit hours. Students' Academic Advisors can assist with any questions related to program requirements.
The University may accept a maximum of 6 semester credit hours in transfer toward the Master of Business Administration for graduate course work completed at an accredited college or university with a grade of "B" or better.
Completion Period for Master's Degrees
Northcentral University allows 5 years to complete all 30 credit hour master's programs. Normal time to complete varies depending upon course take rate and credits transferred.
Welcome to Changing Times - Business in the 21st Century
This course is designed to encourage students to understand and consider the impact of current trends such as globalization, sustainability, and technology on businesses. The subsequent core courses will provide a greater in-depth knowledge of business concepts and areas in an integrated fashion.
Managing People and Teams
This course presents the basic theories, skills, and applications related to communications in an organizational setting from a manager's point of view. The course focuses on the consistent, logical process approach that can be used to solve many communication problems. The course also covers topics that are essential to contemporary business communications, including critical thinking, the Internet, the World Wide Web, email, and other technological communication tools. It also presents basic theories, skills, and applications required to effectively communicate in a complex organizational setting emphasizing a manager's point-of-view.
Applied Decision Making
This course introduces the graduate student to the calculation, use, and interpretation of descriptive statistics and inferential statistical analysis. The emphasis of this course is on providing a working knowledge of basic statistical concepts and helping students to understand statistical methodologies used in business, and more generally, to develop a working knowledge of statistical usage in everyday life.
Managing Business Finances
In this course, students are introduced to procedures, process, and tools to effectively manage the business finances. Students will apply and practice these concepts in a wide range of simulated business and managerial situations. Topics include; Business and managerial economics, profit and loss, understanding financial reports, financial risk analysis, asset valuation, budgeting, managerial and financial accounting, financial ethics, and cost management. Students will practice using financial tools and case studies to aid in their analysis and financial decision-making.
This course is an introduction to the principles of operations management as it relates to business strategy. Students will learn how to manage business operations based on a global supply chain with diverse and geographically-dispersed suppliers and customers. The course will also introduce to the student how information systems can have a positive impact on operational productivity, competitiveness, automation of business processes, and electronic.
Innovation and Marketing
In this project-based course, students will investigate and practice strategies for innovation and introduction of new ideas, products, and technologies to market. Students will practice assessing their customers' needs and tailoring strategies and tactics accordingly. An integrative approach builds marketing management upon business analysis, supply chain, operations, economics, and financial management. Students will set marketing goals and produce plans to reach those goals and measure their progress. Ethical, social, and legal aspects such as marketing to minors and false or deceptive practices will be examined.
Introduction to Computer Security
The course provides insights and realistic examples to any practitioners or students enabling them to understand the crucial links between security theory and the day to day security challenges of IT environments. The text explains the fundamentals of security: the different types of widely used policies, the mechanisms that implement these policies, the principles underlying both policies and mechanism, and how attackers can subvert these tools- as well as how to defend against attackers. A practicum demonstrates how to apply these ideas and mechanism to a realistic company.
Corporate Computer and Network Security
This course presents a framework about security threats and security management in corporations. It covers the techniques and mechanisms designed to thwart security threats as well as known methods for exploiting vulnerabilities. Concentration will be placed on the management of the security functions, elements of cryptography and cryptographic systems, access control and site security, incident and disaster response, TCP/IP and how hackers use it to attack organizations, attack methods, attack prevention systems (firewalls and host security), and application security.
Cyber Forensics: Collecting, Examining, and Preserving Evidence of Computer and Information Crimes
This course provides a comprehensive, highly usable, and clearly organized approach to the issues, tools, and control techniques needed to successfully investigate illegal activities perpetuated through the use of information technology. It introduces the student to the broad field of cyber forensics and presents the various tools and techniques designed to maintain control over an organization. Students will acquire the ability to identify, gather, document, and preserve evidence of electronic tampering and misuse. It helps the student to create appropriate audit procedures and helps the professional protect corporate assets.
Introduction to Systems Certification and Accreditation
This course provides guidance on principles that must exist in order to establish and maintain a certification and accreditation program. Students will explore the required processes for accreditation and certification programs including project planning, system inventory, system security plans, risk assessment, security procedures, certification testing, documentation of accreditation decisions, and coordination of security for interconnected systems. The course will also provide the student with a more thorough understanding of what a complete certification and accreditation program can do to benefit an organization. A framework for a systems certification and accreditation program will be developed.
Cyberterrorism, Information Warfare, and Critical Infrastructure Protection
This is an introductory course covering the basic aspects of Information warfare. In the last two decades, the U.S. economy's infrastructure has undergone a fundamental set of changes, relying increasingly on its service sector and high technology economy. Cyber terrorism is an emerging new mode of information warfare underscoring the perpetrators' deliberate exploitation of civilian and military systems' inherent vulnerabilities; thereby affecting national and global security The U.S. depends on computers, electronic data storage and transfers, and highly integrated communications networks. Its rapidly developing new form of critical infrastructure is exceedingly vulnerable to an emerging host of threats. This course examines the dangers of, and the evolving U.S. policy response to, cyber terrorism.
Risk Management in Information Assurance and Security
The challenges associated with assessing and implementing computer security is an ongoing issue. In this course, an overview of the subject of information technology system security will be presented to discover how to effectively assess and implement security in information technology by abiding by a structured and information-centric process. The student will examine the nature of risk and its application to information system security, threats, and vulnerabilities and assessing risk variables. Information states, the security life cycle, and safeguard analysis will also be covered. In addition, the CIA (confidentiality, integrity and availability) model, as a central mechanism to protect information, will be explored in real world settings.
Legal and Ethical Issues in Information Assurance
The course provides an overview of ethics and how ethics affect IT professionals and IT users. Students study how IT professionals and IT users are faced with ethical decisions regarding IT security, common types of computer security attacks, privacy protection, the impact of IT on the quality of life, freedom of expression, intellectual property and employer and employees issues including the key ethical issues associated with the use of contingent works.
Contingency Planning and Disaster Recovery for the Security Professional
The course provides a thorough strategy to guide students with the background knowledge and skills they need to develop effective disaster prevention and recovery capabilities in various organizations. Students will be able to demonstrate an understanding of the principles of disaster recovery planning for physical security consideration, host applications, and network security measures.
This course provides an overview of effective strategic planning formulation and correct application for use in real life situations. Students will develop skills in operational business strategies as well as being introduced to the entire strategic planning process
At Northcentral University, we pride ourselves in being completely transparent when it comes to tuition and fees. If a cost is not included in our Cost Per Course Tuition Rate, we let you know up front. Currently, the only additional cost above your program rate* is books. Learn more about the NCU’s MBA costs below:
- Per credit cost: $773
- Per 3 credit course cost: $2,319
- Program cost: $23,190
- Average book cost per course: $110
- Application Fee: $0
- Learning Management Fee (one-time per program): $350
- Registration Fee: $0
Click here to learn more about payment and financing options.
*Program rates are subject to change and generally increase at the start of each calendar year.
Total program costs reflected are calculated based on standard degree program credits exclusive of the program’s potential evaluation track. The actual cost of a program is determined based upon the program and track the student enters, transfer credits if any, and other unique student factors. For more information: please contact Admissions or refer to the catalog.
If there’s one thing we’ve learned about our students, it’s that they are motivated and ambitious—but they are also busy! At Northcentral University, we’ve designed our education experience to work with you, not against you, so you can achieve your academic goals without sacrificing the quality, flexibility and support you need to be successful.
- Regionally Accredited
- No Physical Residency Requirements
- One-to-One Teaching
- 100% Doctoral Faculty
- Flexibility of Online Learning
- University Resources
To learn more, request information or call 1-866-776-0331 to speak with an enrollment advisor today. We offer new courses every Monday of the year so you can get started when it’s best for you.
ACBSP Accredited Online MBA Degree Program
In addition to NCU’s regional accreditation from the HLC, our business programs in the School of Business and Technology Management have received programmatic accreditation from the Accreditation Council for Business Schools and Programs (ACBSP). ACBSP promotes continuous improvement and recognizes excellence in the accreditation of business education programs around the world.