Business Cybersecurity Management M.S.
In today's world there is a significant need for cybersecurity professionals in both business and government to combat intellectual property theft, credit card fraud, pirated content, data theft, malware, ransomware, and more. The U.S. Bureau of Labor Statistics indicates that the job outlook in this field through 2024 is growing at a much faster-than-average rate of 18% per year.
The online graduate degree in Business Cybersecurity Management, offered through the WVU College of Business and Economics, gives students the skills they need to become cybersecurity professionals and to adapt to growing changes in security technology. The program provides a natural graduate pathway for students in computer science, management information systems and criminal justice.
West Virginia University is accredited by the Higher Learning Commission. The College of Business and Economics is accredited by AACSB - the Association to Advance Collegiate Schools of Business.
Applicants must be admitted to WVU as a graduate student using 2140 as the major code.
- Enter the WVU Application portal.
- Create a username and password.
- Once an account has been created, applicants can edit the application at their discretion. Please complete all questions asked.
- When selecting a start term, choose ‘fall.’
- Upload an up-to-date resume: Your resume should include enough information for the admissions committee to trace your entire professional work history and should indicate any relevant affiliations.
- Request 1-3 letters of recommendation through the online portal. Individual letters should not exceed one page: We recommend that your reference provide some information that is not found in the other materials being submitted. Topics with regards to your ability to work with others, your discipline and ambition, leadership potential, etc. should be addressed. Your reference letter(s) should cover aptitudes necessary for your success in the program to which you are applying.
- Create a Statement of Purpose (not to exceed one page): Your statement of purpose should be a short, one-page essay which describes your interest in the program, why you wish to pursue the program at WVU, how the program will help you reach your career goals, and any additional information which may be necessary to understanding your candidacy.
- Pay application fee.
- Submit application.
- Applicants will then need to send their transcripts to WVU's Office of Admissions. If the applicants undergraduate school offers "e-script" (an official electronic copy of transcripts), email the transcripts to GraduateAdmissions@mail.wvu.edu. This will help expedite the admissions process. If they do not offer this service, please have your official transcripts mailed to:
West Virginia University Office of Graduate Admissions and Recruitment
PO Box 6510
Morgantown, WV 26506-6510
- For applicants submitting GMAT/GRE scores, the program GMAT code is C2S-6D-25 or 5904 for GRE. For applicants requesting a GMAT or GRE waiver based on 5 or more years of relevant professional work experience, please indicate request for waiver in your Statement of Purpose. Graduates from the WVU management information systems (MIS) program with a 3.25 or higher GPA are permitted to waive the GMAT.
- International Students are required to submit at TOEFL or IELTS score. Required for international students. The College of Business & Economics TOEFL requirement is higher than the University's - applicants must have a TOEFL score of either 580 (paper), 237 (computer), or 92 (Internet-based). If you have taken the IELTS instead of the TOEFL, the minimum score must be 6.5. English language exam scores should be sent to the Office of Admissions, West Virginia University, PO Box 6009, Morgantown, WV 26506-6009.
Applications will be reviewed on a rolling basis once all parts of the application are received including transcripts, test scores, and letters of recommendation. Applications received after July 1 will be reviewed based on available space in the class.
|Tuition and Fees
for academic year 2017-2018
Per Credit Hour
Per Credit Hour
Financial aid is available. Students are encouraged to file the Free Application for Federal Student Aid (FAFSA) form to determine their eligibility for federal and state funds as well as scholarships. WVU’s FAFSA Code is 003827.
MS in Business Cybersecurity Management Course Plan
The MS in Business Cybersecurity Management program is 30-credit hours. The program is housed in the Department of Management Information Systems in the College of Business and Economics. Students will complete a 10-course online sequence in a one-year time period.
All students are required to attend an on-campus residency in August of their matriculation, and also are required to attend an on-campus residency to present their capstone project at the conclusion of the program.
Students must have a cumulative GPA of 3.0 on all relevant coursework to meet graduation requirements.
Students will complete ten courses (30 credit hours). Courses will include the following subject matter:
- Foundations for an understanding of Business Data Analytics, giving an overview of the field by covering key concepts including: foundations and technologies of business decision making, data mining, data warehousing, visual analytics, predictive modeling, text analytics, text mining, sentiment analysis, web analytics, business intelligence decision modeling techniques and solutions, expert systems, knowledge management and future technologies.
- Understanding of database design concepts and logic, including data modeling, database design, and the logic of database queries. In order to analyze data, one must be able to access, organize and query databases. The course focuses on relational databases and queries, but also includes object-oriented databases, large volume databases, database performance, scalability and live streaming considerations.
- Learn effective leadership solutions related to the management of security risks and cyber threats in private and public sector organizations including the topics of risk analysis, security controls, risk exposure, risk transfer, quantification of risk such as annualized loss expectancy, attention to insider threat risk identification and reduction, the security auditing role, IT security governance, and security policy management. Computer assisted audit tools will be introduced, and aspects of robust electronic commerce funds transfer mechanisms and security.
- Overview of corporate data communications networks, the TCP/IP model and related technologies of the data communications corporate infrastructure as well as a survey of the essential tools and strategies for the management of secure, effective business networks. Students will understand key concepts related to optimal, cost effective network architectures, network hardware, and network applications deployment. Requests for Proposal, Service Level Agreements, vendor contracts, issues of web hosting management will be covered. Students will be encouraged to take and pass the Network+ Certification.
- Managerial and technical aspects of information security in corporate and organizational networks. The course covers security issues in information systems, software development, data center design, disaster recovery planning, business impact analysis, business continuity planning, security technologies, implementation, and security strategy. Malware, attack vectors, threats and vulnerabilities will be discussed, along with coverage of the tools required to deliver confidentiality, integrity, authentication, non-repudiation and availability. A variety of cryptographic techniques are included here, along with coverage of effective administration of business security operations. Students will be encouraged to take and pass either the Security +, ISC2 SSCP, or the GIAC certifications (Security Leadership, Systems and Network Auditor or Information Security Professional certifications).
- Information ethics, including such topics as privacy protection and control, surveillance, link analysis, personally identifiable data, sensitive data, data anonymity, data privacy, data accessibility, data sharing, censorship, intellectual property, accuracy, virtual reality and artificial intelligence. Includes legal procedures and US and foreign laws of data collection and storage, security and law enforcement investigations, as well as compliance management for government, publicly held corporations and the healthcare industry sectors (laws of e-Discovery, compliance for SOX, HIPAA, Gramm-Leach-Bliley Act, CIPA, etc.).
- Managerial skills to manage, protect, defend, and audit the security of information systems through hands-on vulnerability assessments, statistical analysis, and risk-based decision making. Students will learn to explain Blue Team / Red Team test plans and will work in the virtual lab space to perform independent testing of safety and mission-critical software systems to ensure that systems will not malfunction and will respond in the desired way under adverse circumstances. Be able to plan, execute, upgrade, and monitor various security controls such as ACLs for the protection of computer networks and information.
- Computer-aided data analysis techniques for detecting and investigating fraud cases, issues related to the collection and use of digital evidence, and collection of data from electronic devices.
- Data and information visualization, including both theoretical and practical aspects. In addition to basic visualization techniques, the course covers the application of multivariate techniques in an environment that includes large data sets. Students are involved in both the creation of visualizations, as well as their interpretation.
- Experiential learning opportunities through which students can sharpen their Business Cybersecurity skills through teamwork, professional communication, problem solving, and engagement with a real world business cyber problem. Project work will include working with a client organization to provide an analysis, data collection and recommended solution to a cybersecurity business problem. Involves temporary placement with public or private enterprise for professional competence development.
BUDA 510 Foundations of Business Intelligence(3 Credits) This course provides the foundations for an understanding of Business Data Analytics, giving an overview of the field by covering key concepts.
BUDA 520 Data Management(3 Credits) This course provides an understanding of database design concepts and logic, including data modeling, database design, and the logic of database queries.
CYBR 554 Business Information Security Assurance Management(3 Credits) This course prepares students to implement effective leadership solutions related to the management of security risks and cyber threats in private and public sector organizations.
CYBR 555 Data Communications(3 Credits) CONC CYBR 554. Provides an overview of the TCP/IP model and related technologies of the data communications corporate infrastructure, as well as a survey of the essential tools and strategies for the management of secure, effective business networks. Students will be encouraged to take and pass the Network+ Certification.
CYBR 556 Network Security Management(3 Credits) PR CYBR 555. This course focuses on the managerial and technical aspects of information security in corporate and organizational networks.
CPE 538. Intro Computer Security Management(3 Credits) Develops management tools to build and maintain a secure enterprise.
CYBR 557. Information Ethics and Legal Procedures(3 Credits) This course introduces the student to the field of information ethics.
CYBR 558 Business Cybercrime Management(3 credits) PR CYBR 555. Learn the managerial skills to protect, defend, and audit the security of information systems through hands-on vulnerability assessments, statistical analysis, and risk-based decision making.
CS 539. Computer Forensics and the Law(3 Credits) PR: CPE 435. Surveys the emerging field of computer law and how it applies to businesses and law enforcement, both to aid and to circumscribe the policies and procedures to tackle computer crime.
ACCT 582. Fraud Data Analysis(3 Credits) PR: Restricted to FFE students, permission required. Computer-aided data analysis techniques for detecting and investigating fraud cases, issues related to the collection and use of digital evidence, and collection of data from electronic devices.
CPE 536. Computer Data Forensics(3 Credits) PR: CPE 310 and CPE 435 or consent. Provides students with a comprehensive overview of collecting, investigating, preserving, and presenting evidence of cybercrime.
BUDA 550. Business Data Visualization(3 Credits) PR: Restricted to BUDA students, permission required. This course introduces students to data and information visualization, including both theoretical and practical aspects.
CYBR 555. Professional Field Experience(3 Credits) PR: Consent. Prearranged experiential learning program, to be planned, supervised, and evaluated for credit by faculty and field supervisors. Involves temporary placement with public or private enterprise for professional competence development.
Students who graduate from WVU Online with the Business Cybersecurity Management M.S. degree may be prepared for the following careers. These are only a few examples of some of the many opportunities that will be open to you with this degree. Advanced degrees or certifications may be required for some positions.
Computer Systems AnalystsProjected Growth: 5-9%
Computer & Information Systems ManagersProjected Growth: 10-14% *Bright Outlook
Security Management SpecialistsProjected Growth: 5-9% *Bright Outlook
Information Security AnalystsProjected Growth: 15% or higher *Bright Outlook
Business Continuity PlannersProjected Growth: 5-9% *Bright Outlook
Information about careers on this list comes from the Occupational Information Network (O*NET) of the U.S. Department of Labor/Employment and Training Administration (USDOL/ETA).