Skip to main content

Online MS - Information Systems & Security Degree Requirements

The Master of Science in Information Security at University of the Cumberlands focuses on information security challenges relating to mitigating the risk of loss or disclosure of data. With the combination of the ubiquitous nature of electronic information and the associated security risks, the field of information security has become a critical need for every organization.

The graduate degree in cybersecurity is comprised of the following 31 required credit hours.

Program Learning Outcomes (PLOs) and Course Learning Outcomes (CLO)

The graduate degree in cybersecurity is comprised of the following the following Program Goals and Program Level Outcomes (PLOs):

Goal 1: To prepare information technologists with the knowledge to properly secure facilities, equipment, networks, and software.

  • PLO 1.1. Students manage access controls using best practices and technologies to help secure the network.   (ISOL 531 Access Control)
  • PLO 1.2. Students secure an application by applying proper security methods and parameters. (ISOL 534  Application Security)
  • PLO 1.3. Students apply cryptography techniques to secure data. (ISOL 535 – Cryptography)
  • PLO 1.4. Students recommend security strategies to minimize operational attacks. (ISOL 631 Operations Security)
  • PLO 1.5. Students provide action plans and recommendations to secure a facility. (ISOL 634 Physical Security)

Goal 2: To prepare information technologists with the knowledge to create and implement a plan for disaster prevention and recovery

  • PLO 2.1. Students justify techniques for securing networks to minimize operational impacts when cyber-attacks occur.  (ISOL 532 Telecommunications and Network Security)
  • PLO 2.2. Students evaluate an organization’s infrastructure to prevent future security attacks. (ISOL 536 – Security Architecture and Design)
  • PLO 2.3. Students examine risk management strategies for protecting assets. (ISOL 533 Information Security and Risk Management)
  • PLO 2.4. Students develop a comprehensive plan to reduce the risks of a loss of business continuity. (ISOL 632 Business Continuity Planning and Disaster Recovery Planning)

Goal 3:  To prepare information technologists with the proper techniques for implementing security plans that ensure compliance with various laws and identifying and investigating breaches in compliance.

  • PLO 3.1. Students determine which laws apply to different types of business environments. (ISOL 633 Legal Regulations, Compliance, and Investigations)

Goal 4:  To prepare information technologists to address specific needs and challenges in the field of Information Security.

  • PLO 4.1. Students clearly assess IS security needs for an organization. (ISOL 699 Information Security Project)

For a full list of course offerings or more program specific information, visit our Academic Catalog page.