We abbreviated the captioned question, as the latter degree should read- a Master’s Degree in Cybersecurity Risk Management and Cybersecurity Risk and Strategy. This is how most schools refer to the degree. In this article, we will provide examples of typical courses selected at random from colleges/universities offering these two degrees.
Master of Science in Cybersecurity Risk and Strategy
This M.S. program examines the legal and regulatory aspects that are germane to cybersecurity. Students will gain a comprehensive understanding of integrating the business, regulatory, and technical dimensions of cyber risk management. The program will cultivate the security mindset and lay the foundation for developing a high-reliability IT organization, understanding security concepts from a managerial point of view, including policies and assurances, and recognizing vulnerabilities and exploits.
The following are examples of courses from highly respected and accredited programs.
Cybersecurity-Governance and Regulatory Forces
Efforts to enhance cybersecurity fall largely on corporations because they hold the data that interests thieves and nation states. This course will explore the generally applicable governance and regulatory forces that influence how corporations respond to cybersecurity threats.
Information Privacy Law
The course begins by introducing conceptual perspectives on privacy and discussing the role of privacy as a policy goal. We then explore some general approaches to privacy regulation, including the privacy torts, the Fair Information Practice Principles, privacy policies, self-regulation, and the Federal Trade Commission (FTC) enforcement.
National Security Issues in Cyberspace
This course situates cybersecurity within the framework(s) of national security law and policy. Topics will include the domestic and international legal foundations of cyber operations (defensive and offensive), strategic considerations involved in cyber conflict (including the role of deterrence in cyberspace). It also looks at the overlap and distinctions between cybersecurity and intelligence operations. This course will also engage with the national security institutions involved in the provision of cybersecurity and its oversight, as well as with potential avenues for international cooperation in the prevention and resolution of cyber conflict.
This M.S. program can focus more on technical cybersecurity in addition to similar courses in information privacy law and legal issues related to security, privacy, and trust in an organization.
On the technical side, examples of courses are as follows:
Fundamental Computer Concepts for Informatics
This is an introduction to fundamental principles of computer concepts for Informatics study, including an overview of computer architecture, computer algorithms, operating systems, data structure, file organization, and database concepts.
This course combines research and hands-on experience. Students are required to read and present research papers that reflect the state of the art in malware-related research. They also participate in course projects that expose them to the cutting-edge technologies on malware defense.
Introduction to Cryptography
It spans the ethics and technology of security, with examples drawn from both deployed and proposed protocols. Topics to be covered include studies of rational and malicious cheating, symmetric and asymmetric cryptography, and security reductions.
The two degrees (Risk Management and Risk & Strategy) share a commonality in courses relevant to cybersecurity law and policy. We presented a few examples of law-related courses above for the Risk Management degree. The M.S. in Cybersecurity Risk and Strategy has almost identical coursework in name; however, the material may vary.
One example pertains to how Risk Management vs Risk & Strategy addresses the subject of:
Information Privacy Law
The course covers the academic and constitutional background to privacy, the intersection of privacy and free speech, and the protection of privacy in law enforcement and national security. A part two of this subject provides a foundational background in some or all of the following substantive areas of law: (1) Government Records; (2) Financial Data; (3) Consumer Data; (4) Data Security; (5) Education Privacy; (6) Employment Privacy; and (7) International Privacy Law.
There are residency and online formats for both of these degrees. In addition, both programs are typically 30 credits, which you can complete within twelve months of online study. You need to verify if the program you are interested in has any residency requirements. For example, over a 12-month period, participants will attend three residential sessions consisting of five days per session. Between residential periods, students will study 10-15 hours per week in online and blended learning formats.
The cybersecurity market is booming. Global spending on “cybersecurity” products and services, including “information security” will exceed $1 trillion cumulatively from 2017 to 2021 — and will grow by 12 to 15 percent year over year. The term-fast-expanding market is the only way to describe cybersecurity, for at least the next five years. Cybercrime damages — an indicator and driver of cybersecurity spending — are expected to cost the world $6 trillion by 2021, up from $3 trillion in 2015. These figures translate to a plentiful job market for all positions in the broad field of cybersecurity.
Related Articles from DegreeQuery: