Master of Business Administration with a Concentration in Cybersecurity Management Online

Gain the skillset needed to enter the cybersecurity industry—or advance your existing career—by adding high-need detection and prevention expertise to your professional strengths.

Next Apply Date: 5/1/24
Next Class Start Date: 5/13/24
Apply Now

Program Overview

A quick look at our 100% online master’s in cybersecurity management

Contribute to keeping your organization’s network and software safe while making an impact as a leader when you earn the 100% online Master of Business Administration with a Concentration in Cybersecurity Management. This AACSB-accredited MBA degree emphasizes cybersecurity assessment, governance, and risk management, preparing you to take a top-level role in assuring operational and data security.

With coursework that spans from core MBA foundations—including marketing strategy, economics, and data analysis—to cybersecurity policy development and implementation, identifying software vulnerabilities, and the ethics of incident response, you will graduate with the background to become an informed and respected decision-maker. Exercise your aptitude within a real-world professional project in this program’s senior capstone.

As a graduate of this cybersecurity management MBA online program, you will be prepared to:

  • Develop cybersecurity spending priorities for an organization
  • Plan and implement a cyber risk management program for an organization
  • Demonstrate an understanding of the operations, strengths, and limitations of private- and public-key encryption, including public-key infrastructures
  • Prove an awareness of selected security holes in commonly used software
  • Establish a working knowledge of networking terms and concepts pertaining to network and information security, including types of threats, concerns related to hacker and security tools, and models of system security
  • Enumerate an organization’s information assets and classify the risks associated with the unauthorized use of each resource
  • Compare and contrast common threats to enterprise information security, including the attack vectors they exploit; the resources they threaten; and the nature, likelihood, and relative severity of each threat
  • Apply the key features of major contemporary security standards, including formal standards like the NIST Cybersecurity framework, the ISO 27000 series standards, PCI DSS, and COBIT
  • Identify and assess the relative severity of likely threats to a given organization’s information asset using both formal security standards and industry conventions such as the SANS Top 20 Threats and the FAIR (Factor Analysis of Information Risk) Framework
  • Develop policies for managing key risks to information assets, including ones for preventing attacks, reducing the potential damage from information compromises, identifying and responding to attacks in progress, and recovering from attacks
  • Develop cybersecurity spending priorities for an organization
  • Plan and implement a cyber risk management program for an organization
  • Demonstrate an understanding of the operations, strengths, and limitations of private- and public-key encryption, including public-key infrastructures
  • Prove an awareness of selected security holes in commonly used software
  • Establish a working knowledge of networking terms and concepts pertaining to network and information security, including types of threats, concerns related to hacker and security tools, and models of system security
  • Enumerate an organization’s information assets and classify the risks associated with the unauthorized use of each resource
  • Compare and contrast common threats to enterprise information security, including the attack vectors they exploit; the resources they threaten; and the nature, likelihood, and relative severity of each threat
  • Apply the key features of major contemporary security standards, including formal standards like the NIST Cybersecurity framework, the ISO 27000 series standards, PCI DSS, and COBIT
  • Identify and assess the relative severity of likely threats to a given organization’s information asset using both formal security standards and industry conventions such as the SANS Top 20 Threats and the FAIR (Factor Analysis of Information Risk) Framework
  • Develop policies for managing key risks to information assets, including ones for preventing attacks, reducing the potential damage from information compromises, identifying and responding to attacks in progress, and recovering from attacks

Cybersecurity management Career opportunities:

  • General Management of Information Technology
  • Senior Cybersecurity Policy Advisor
  • Cybersecurity Analyst
  • Director of Cybersecurity
  • General Management of Information Technology
  • Senior Cybersecurity Policy Advisor
  • Cybersecurity Analyst
  • Director of Cybersecurity

Also available:

Choose from a variety of MBA programs aligned with top-growth fields. View ETSU’s online business programs.

Total Tuition $25,128*
Duration As few as 12 months
Credit Hours 36

Accreditation

AACSB logo

The College of Business and Technology at East Tennessee State University is accredited by AACSB International (AACSB). Fewer than 6% of the world’s schools offering business degree programs hold AACSB business accreditation.

Apply Now

Need More Information?

Call (833) 690-1228

Call (833) 690-1228

Tuition

Earn your degree affordably with our low-cost tuition

Benefit from the value and flexibility of our online programs. Our budget-friendly tuition is paid by the course, with no large upfront expenses.

Tuition breakdown:

Total Tuition $25,128
Per Credit Hour $698

Go beyond ordinary


Since 1911, our purpose has been to develop a world-class environment that enhances student success and improves the quality of life for people in the region and beyond.

Start soon, finish faster


Our MBA options offer convenient, 100% online coursework so you can advance on your schedule while balancing your career, academics, and personal life. 

Calendar

View key dates for the MBA cybersecurity management

Start your journey toward career advancement as early as you like. We offer multiple start dates, so choose the one that best fits your schedule.

TermStart DateApp DeadlineDocument DeadlineRegistration DeadlineTuition DeadlineClass End DateTerm Length
Summer A5/13/245/1/245/8/245/10/245/12/246/28/247 weeks
Summer B7/1/246/1/246/8/246/28/246/30/248/16/247 weeks
Fall A8/26/248/1/248/8/248/22/248/23/2410/11/247 weeks
Fall B10/21/2410/1/2410/8/2410/17/2410/18/2412/5/247 weeks

Now enrolling:

Apply Date 5/1/24
Class Starts 5/13/24

Take the next
steps toward earning your degree

Apply Now

Admissions

Get started on your application today – here’s how

We’ve streamlined the admission process for the online cybersecurity management MBA program. Follow these steps to apply.

Admission Requirements:

  • Bachelor’s degree from an accredited institution
  • GMAT waiver available
  • 2.5 GPA or higher*

Courses

Explore the courses in your online cybersecurity management master’s program

For the MBA – Cybersecurity Management online program, you must complete 12 courses totaling 36 credit hours, including 24 credit hours of core courses, 9 credit hours of concentration courses, and a 3 credit hour Strategic Experience capstone course.

Duration: 7 weeks
Credit Hours: 3
Applies the statistical tools of hypothesis testing and regression analysis to practical business problems.
Duration: 7 weeks
Credit Hours: 3
Encompasses a comprehensive study of accounting information and its uses by professional managerial decision makers. Topics include areas in financial and managerial accounting and components of consolidated financial statements, cost and variance analysis, and budgeting.
Duration: 7 weeks
Credit Hours: 3
Presents applications of microeconomic and macroeconomic theory, tools, and principles as they relate to problems and decisions that confront managers of business and other organizations. Microeconomics topics include demand and supply analysis, production decisions, market structure, and input employment decisions. Macroeconomic topics include measurement of economic activity and performance, macromodels, economic policy, and international economic dynamics.
Duration: 7 weeks
Credit Hours: 3
Provides a fundamental understanding of the strategic impact of decisions relating to the design, production, operation, control, and delivery of goods, services, and technology in organizations by using quantitative tools and qualitative frameworks. Applications and case analyses are used to study operational value and cost, materials management and distribution, management of technologies, and management for continuous improvement. Course topics include process planning, monitoring, controlling and improvement; project management; and supply chain planning, management, and analytics.
Duration: 7 weeks
Credit Hours: 3
Focuses on the leadership roles and responsibilities of strategic managers and top-level managers who are responsible for setting organizational direction, enrolling employee commitment, identifying and managing organizational core competencies, establishing supportive organizational cultures, and ensuring organizational integrity.
Duration: 7 weeks
Credit Hours: 3
Explores the role of marketing in the development of organizational strategy. Topics include customer value creation, customer relationship management, international and domestic market opportunities and the competitive environment. Analytical tools and techniques will be introduced and applied in a variety of learning models to facilitate strategic marketing decisions.
Duration: 7 weeks
Credit Hours: 3
Applies analytical techniques to the firm’s investment, financing, and dividend decisions. Topics include capital budgeting, capital structure, short-, intermediate-, and long-term financing, asset valuation techniques, and introduction to finance theory and literature.
Duration: 7 weeks
Credit Hours: 3
This course introduces students to strategic thinking and provides a framework for the entire program. It takes an executive perspective of general management. The course provides an understanding of the interdependence between the organization and its environment, with a focus on managing organizations in changing environments, maintaining legitimacy with diverse stakeholder groups, providing clear corporate direction, and ensuring the long-term survival and success of the enterprise.
Duration: 7 weeks
Credit Hours: 3
A survey of concerns related to system security in a networked environment. Topics include threats to system security; common software vulnerabilities; tools for attaching system security; tools for defending system security, including cryptographic utilities; recovering from security episodes; and the ethics of incident response.
Duration: 7 weeks
Credit Hours: 3
Prepares students to take on leadership roles in assuring data and operational security in support of an organization’s mission using cyber risk management strategies. Topics include various cybersecurity plan drivers such as budgeting, forecasting, the role of the organization’s mission, and return on investment.
Duration: 7 weeks
Credit Hours: 3
Explores industry standards and best practices used to assess organizational information security compliance, determine organizational information security maturity, and guide cybersecurity policy development and implementation.

This course fulfills the Culminating Experience requirement in the MBA program.

Duration: 7 weeks
Credit Hours: 3
Apply knowledge and skills developed in the graduate program in a realistic problem-solving environment. This capstone course is designed for provide M. B. A. students nearing the end of their program. MGMT 5800 is restricted to students in the program.
quotes icon

“The ETSU College of Business and Technology is a place of opportunity for students. We are one of the few colleges in the country that combine business and technology programs, allowing students to pursue degrees that blend together diverse fields in exciting ways.”

Dr. Tony Pittarese | Dean of the College of Business and Technology, Professor of Computing

Request Information

Submit this form, and an Enrollment Specialist will contact you to answer your questions.

  • This field is for validation purposes and should be left unchanged.

Or call (833) 690-1228

Begin Application Process

Start your application today!

or call (833) 690-1228 (833) 690-1228

for help with any questions you may have.