Stay ahead of blackhat hackers
and master
offensive and defensive strategies

Earn your master's degree in cyber security leadership and policy
with stratford university!


cyber security
leadership and policy

The Master of Science in Cyber Security Leadership and Policy program builds on a strong technical foundation, providing graduates with the knowledge, skills, and dispositions to lead cyber security teams, managing digital security within organizations. It integrates learning of an enterprise’s business needs, relevant policy and legal issues, and the management of both physical and digital oversight of systems.

The skills you will master in

  • Leadership
  • Manage
  • Standards
  • Research
  • Analysis
  • Problem solving
  • Plan
  • Recovery
  • Prevention
  • Security culture
  • Audit
  • Compliance
  • Protection
  • Strategic roadmap
  • Coordinate
  • Physical security
  • Policy development
  • Incident respond
  • Communication
  • Digital security
Security breaches
that could have been prevented
  • 2001 & 2014
    Sony

    Sony's popular PlayStation Network found itself under attack between April 17 and April 19, 2011 from an "external intrusion." Personal details from approximately 77 million accounts were compromisted, forcing Sony to turn off the network on April 20. The outage lasted 23 days. Then in December 2014, Son was hacked again. The original aggressor had believed to had been North Korea, but upon closer investigation, qualified hackers ranged from disgruntled employees to profit-seeking hackers.

    game controller
  • 2013
    Target

    During Black Friday, one of the busiest days of the year for retailers, cyber criminals cracked into Target's system, but the hack went unannounced for three weeks. "We recognize this has been confusing and disruptive during an already busy holiday season," Target CEO Gregg Steinhafel stated. "Our guests' trust is our top priority at Target and we are committed to making this right." Target, the nation's second largest general merchandise retailer in the United States discovered that their ATM-style cards used at brick-and-mortar locations were the intended targets of the hack and were, most likely, compromised.

    credit cards
  • 2016
    Yahoo!

    Yahoo Inc suffered a breach that compromised at least 500 million of its user accounts in 2014, but the breach was not reported until 2016. Yahoo identified the lost data as names, email addresses, telephone numbers, dates of birth, and encrypted passwords but that more valuable data such as payment card data and bank account information did not appear to have been stolen. "This is the biggest data breach ever," noted cryptologist and security expert, Bruce Schneier.

    smartphone

complete your
Master of Science in Cyber Security Leadership and Policy

through classroom instruction at one of our Virginia campuses, online instruction, or a combination of both.

total required for graduation

54
credits

12
classes

Earn Your Degree
on Your Time
CampusOnline

On Campus or online

Where our classes are offered

Time

5 - 10 weeks

Time needed to complete a class

Calander

15 Months

Time needed to finish a master’s degree

Admissions Requirements: Students with an accredited undergraduate degree in computer science, information systems, or other related field, may be deemed to have acquired competency in the core areas. All the courses must have been passed with a grade of C or better. Students with an undergraduate degree in an unrelated field are required to demonstrate competency in the IT core areas. Competency can be demonstrated by completing necessary coursework prior to beginning graduate studies at Stratford University, by completing the appropriate bridge courses offered through the Stratford University on-campus or online program, or through Prior Learning Assessment.
Competency Requirements

  • CIS390- Basic Computer Technology, Applications, and Security Bridge
  • CIS391- Server/OS, Relational Databases, and Software Security Bridge
  • CIS392- Networking Bridge

Program Requirements

Complete Your Degreeby meeting the following program requirements
  • Complete Core Requirements

Core Requirements

Complete the following core requirements for the Master of Science in Cyber Security Leadership and Policy

Core Requirements

Complete all following courses

CIS700
Cyber Security Prevention and Protection
CIS705
Strategies in Cyber Conflict
CIS710
Culture of Security
CIS715
Physical Security
CIS725
Cyber Security Methods of Analysis
CIS735
International Cyber Policy and Standards
CIS745
Developing Cyber Security Policy
CIS755
Cyber Security Policy Implementation
CIS791
Cyber Security Leadership Capstone
SOF701
Cyber Law and Compliance
SOF705
Auditing and Incident Response
SOF710
Cyber Security Leadership

Cooperative Education

In this optional program area, students benefit from the opportunity to apply the skills learned in the classroom in a real world environment. Students may incorporate cooperative education courses throughout the program instead of waiting until program completion. These optional courses are in addition to the program outline above.

CIS599
Cooperative Education: Computer Information Systems
  • Core
    Requirements

    Core
    Requirements

    In this optional program area, students benefit from the opportunity to apply the skills learned in the classroom in a real world environment. Students may incorporate cooperative education courses throughout the program instead of waiting until program completion. These optional courses are in addition to the program outline above.

    • Core Requirements

      Complete all following courses

      CIS700
      Cyber Security Prevention and Protection
      CIS705
      Strategies in Cyber Conflict
      CIS710
      Culture of Security
      CIS715
      Physical Security
      CIS725
      Cyber Security Methods of Analysis
      CIS735
      International Cyber Policy and Standards
      CIS745
      Developing Cyber Security Policy
      CIS755
      Cyber Security Policy Implementation
      CIS791
      Cyber Security Leadership Capstone
      SOF701
      Cyber Law and Compliance
      SOF705
      Auditing and Incident Response
      SOF710
      Cyber Security Leadership
  • Cooperative Education

    Cooperative Education

    In this optional program area, students benefit from the opportunity to apply the skills learned in the classroom in a real world environment. Students may incorporate cooperative education courses throughout the program instead of waiting until program completion. These optional courses are in addition to the program outline above.

    • Cooperative Education

      CIS599
      Cooperative Education: Computer Information Systems

Latest from Curious

Posted By:
BusinessVibes Of Business2Community
Smart entrepreneurs always have money-saving plans for their start-ups. If your business is struggling in the climate of turbulence, why not try some of ... .Read more
 

Comments or suggestions, email us at webmaster@stratford.edu

Tech Talk by Dr. Richard Shurtz