Stop cyber attacks before they happen.
Attacks are plenty, but defenders are few. Protecting data in a technology-filled society is essential for running any business or organization, but too few individuals accept the challenge of ensuring the safety of private information. What we’re saying is, INFOSEC needs you! With a Master of Science in Information Systems Security from University of the Cumberlands, you will become an expert in information preservation and restoration. Because of your expertise, you will be set apart in the job market, guaranteeing the chance for success no matter where you go. From security analyst to systems manager, you will have your pick of careers.
By the Numbers
Programs & Requirements
Master of Science in Information Systems Security
Our online MSISS program is intended for those who have earned their baccalaureate degree and already work in the information technology field. If you’re interested in continuing your education and enhancing your credentials, you’ll find that UC’s online information systems security degree program is built to help you achieve your goals. You’ll learn how to prevent or mitigate data loss by:
- Developing and implementing security policies
- Managing compliance with federal regulations for information security
- Creating disaster prevention and recovery plans
- Finding and preventing problems related to hardware, software, and networks
- Achieving availability, integrity, and confidentiality of information
- Implementing physical security measures to restrict access
- And much more!
The program is mapped directly to Department of Homeland Security (DHS) and National Security Agency (NSA) cyber security education standards. It also aligns with the (ISC)2 CISSP Common Body of Knowledge. CISSP (Certified Information Systems Security Professional) is an industry-leading professional certification for cyber security experts such as security practitioners, managers, and executives. Earning a Master of Science in Information Security Systems will equip you to take the CISSP certification exam. You’ll also graduate ready to pursue a new career path in INFOSEC or apply the latest information assurance and cyber security principles in your current role.
University of the Cumberlands has been named a National Center of Academic Excellence in Cyber Defense (CAE-CD) by the National Security Agency (NSA) and the Department of Homeland Security (DHS). There are just over 200 universities nationwide with CAE-CD designation, and only two other universities in Kentucky included in this elite group.
Course Requirements
- ISOL 531 - Access Control
- ISOL 532 - Telecommunications and Network Security
- ISOL 533 - Information Security and Risk Management
- ISOL 534 - Application Security
- ISOL 535 - Cryptography
- ISOL 536 - Security Architecture and Design
- ISOL 631 - Operations Security
- ISOL 632 - Business Continuity Planning and Disaster Recovery Planning
- ISOL 633 - Legal Regulations, Compliance, and Investigation
- ISOL 634 - Physical Security
- ISOL 699 - Info Security Project
Take the Next Step
Mission and Goals
UC’s information security program strives for excellence in creating, applying, and imparting knowledge in IT through comprehensive educational programs, research, dissemination, and service to professional societies, communities, states, and the nation.
Department of Homeland Security (DHS) & National Security Agency (NSA)University of the Cumberlands has been named a National Center of Academic Excellence in Cyber Defense (CAE-CD) by the National Security Agency (NSA) and the Department of Homeland Security (DHS). There are just over 200 universities nationwide with CAE-CD designation, and only two other universities in Kentucky included in this elite group.
Information Systems Security Careers & Outcomes
All stats from U.S. Bureau of Labor Statistics
Information Security Analyst: $102,600
Information Security Analyst: $102,600
Information security analysts analyze current security measures and plan, organize, and implement new security protocols.
Computer and Information Systems Manager: $159,010
Computer and Information Systems Manager: $159,010
Computer and information systems managers lead teams of information systems personnel, organize projects, and direct teams for projects.
IT Security Manager: $159,010
IT Security Manager: $159,010
IT security managers lead teams of information security personnel, organize projects, and direct teams for cyber security projects.
Database Administrator: $101,000
Database Administrator: $101,000
Database administrators create, maintain, optimize, and secure databases to hold data for an organization.
Network and Computer Systems Administrator: $80,600
Network and Computer Systems Administrator: $80,600
Network and computer systems administrators are responsible for the daily operations of all network and computer systems under their direction.
Computer Network Architect: $120,520
Computer Network Architect: $120,520
Computer network architects design and build networks for communications. These may include LANs, WANs, and Intranets.
Common Questions
A master’s in information systems security is a graduate degree that focuses on protecting data and information systems from cyber threats. It covers topics such as data protection, risk management, and compliance with security laws. Graduates are trained to prevent, detect, and respond to information security incidents.
A master’s in information systems security typically takes about two years to complete. This duration can vary depending on whether the program is pursued full-time or part-time.
Yes, you can get a master’s in information systems security online. Many universities offer flexible online programs that allow you to complete your degree remotely while balancing work and other commitments.
A master’s in information systems security is worth it for those looking to advance their careers in the growing field of cybersecurity. Graduates often find well-paying jobs and have strong job security due to the increasing demand for skilled information security professionals.
With a master’s in information systems security, you can pursue various career paths such as information security analyst, IT security manager, computer and information systems manager, database administrator, network and computer systems administrator, and computer network architect.
A master’s in information security is closely related to cybersecurity but focuses more on protecting data and information systems specifically. Cybersecurity is a broader field that encompasses protecting all aspects of the digital world, including networks, systems, and data from various types of cyber threats.
The Master of Science in Information Security at University of the Cumberlands focuses on information security challenges relating to mitigating the risk of loss or disclosure of data. With the combination of the ubiquitous nature of electronic information and the associated security risks, the field of information security has become a critical need for every organization. The graduate degree in cybersecurity is comprised of the following the following Program Goals and Program Level Outcomes (PLOs):
- PLO 1.1. Students manage access controls using best practices and technologies to help secure the network. (ISOL 531 Access Control)
- PLO 1.2. Students secure an application by applying proper security methods and parameters. (ISOL 534 Application Security)
- PLO 1.3. Students apply cryptography techniques to secure data. (ISOL 535 – Cryptography)
- PLO 1.4. Students recommend security strategies to minimize operational attacks. (ISOL 631 Operations Security)
- PLO 1.5. Students provide action plans and recommendations to secure a facility. (ISOL 634 Physical Security)
- PLO 2.1. Students justify techniques for securing networks to minimize operational impacts when cyber-attacks occur. (ISOL 532 Telecommunications and Network Security)
- PLO 2.2. Students evaluate an organization’s infrastructure to prevent future security attacks. (ISOL 536 – Security Architecture and Design)
- PLO 2.3. Students examine risk management strategies for protecting assets. (ISOL 533 Information Security and Risk Management)
- PLO 2.4. Students develop a comprehensive plan to reduce the risks of a loss of business continuity. (ISOL 632 Business Continuity Planning and Disaster Recovery Planning)
- PLO 3.1. Students determine which laws apply to different types of business environments. (ISOL 633 Legal Regulations, Compliance, and Investigations)
- PLO 4.1. Students clearly assess IS security needs for an organization. (ISOL 699 Information Security Project)
Faculty Experts
Get to know more about your future INFOSEC professors.
Dr. Raed Sbeit
Request Information
Wondering if a master's in information systems security is for you? We're ready to help by answering your questions, whatever they may be!