Step Up to the Challenges of Today’s Evolving Tech-Driven Workforce.
Earn your Master of Science in Cybersecurity Policy, Governance and Training in just 12 months with our flexible online eight-week course format
This program equips you with both technical expertise and strategic leadership skills to excel as an information or cybersecurity professional. It prepares you to bridge the communication gap between IT security professionals and key business stakeholders while developing ethical strategies that balance organizational policies and government regulations. Additionally, you will learn to design and implement training programs to protect against and respond to internal and external cybersecurity threats.
This 12-month, non-thesis program consists of 10 courses (30 credit hours) and provides the essential tools and skills needed to address critical and emerging cybersecurity challenges across private industry, academia, and government agencies. Designed to develop cybersecurity leaders, the program builds expertise in both the technical aspects of cybersecurity and the management of cybersecurity projects, organizational training programs, and cyber operations teams.
For those interested in further academic pursuits, this program also serves as a strong foundation for doctoral studies or teaching cybersecurity courses at 2- and 4-year institutions. Through an applied learning approach, you will gain hands-on experience in identifying, assessing, and managing risk while developing and implementing proactive cybersecurity strategies to defend, mitigate, and recover from cyber threats and data breaches.
Master of Science in Cybersecurity Policy, Governance and Training Degree Requirements
The course rotation is set for this program, offering two courses every eight weeks for 12 months. You may start your program of study at any of these convenient “on and off ramps” throughout the academic year.
- Fall Semester – First Eight Weeks
- Fall Semester – Second Eight Weeks
- Spring Semester – First Eight Weeks
- Spring Semester – Second Eight Weeks
- Summer Semester – Eight Weeks
EDUT 5113 - Security Policies and Training Plans - 3 Credit Hour(s)
This course offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational mechanics of building to the psychology of implementation. It presents an effective balance between technical knowledge and soft skills, while introducing many different concepts of information security in clear simple terms such as governance, regulator mandates, business drivers, legal considerations, and much more. With step-by-step examples and real-world exercises, this course allows security officers, auditors, and risk leaders to implement sets of security policies and frameworks.
EDUT 5223 - Managing Risk and Training in Information Systems - 3 Credit Hour(s)
This course is a comprehensive overview of risk management and its implications on IT infrastructures and compliance. Students will address risk across entire information systems, including data, people, processes, and technology. The course incorporates hands-on activities to walk the student through the fundamentals of risk management, strategies and approaches for mitigating risk, and the anatomy of how to create a plan that reduces risk. As an applied learning course with live virtual machines and real software, students will learn and practice the foundational information security skills they will need to excel in their future careers.
IT 5012 - Access Control and Identity Management - 3 Credit Hour(s)
This course will define the components of access control, provide a business framework for implementation, and present legal requirements that impact access control programs. It focuses on identity and security management, reviewing the risks, threats, and vulnerabilities prevalent in information systems and IT infrastructures and how to handle them by providing procedures on implementing access control systems as well as managing and testing those systems.
IT 5033 - Cyberwarfare: Operations and Organizational Security - 3 Credit Hour(s)
This course addresses the role of cyberwarfare in modern operations. Students will discuss the history of cyberwarfare and the variety of new concerns its emergence has fostered from tactical considerations to the law of armed conflict and protections. The rise of the advanced persistent threat has changed the face of cyberwarfare, and planners must now be conscious of a series of cyberwarfare actions and the concept of defense-in-depth. As an applied learning course, it provides immersive mock IT infrastructures where students will learn and practice cybersecurity skills.
MGMT 5243 - Enterprise Resource Mgmt Systems - 3 Credit Hour(s)
Strategic management of technology and information systems in the business environment. Includes challenges in innovation and change management with a strategic focus on enterprise systems.
TECH 5443 - Data and Information Management - 3 Credit Hour(s)
A study of data structures and database applications in business processes. Students will create a variety of database queries, develop custom database views and functions, and build and execute stored procedures.
TECH 5533 - Artificial Intelligence for Business - 3 Credit Hour(s)
An exploration of artificial intelligence applied to business processes. Students will build machine learning models utilizing modern programming languages and embed those models in database applications.
BADM 5143 - Business Analytics I - 3 Credit Hour(s)
Examines the extraction and utilization of management and logistics data to produce automated analytical reports applying current database and reporting technologies.
EDUT 5333 - Legal, Privacy, & Training Issues in Information Security - 3 Credit Hour(s)
This course addresses the complex relationship between the law and the practice of information security. Students will address Information systems security and legal compliance required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike. Students will also build numerous information security and privacy responses into their daily operations to protect the business itself, fully meet legal requirements, and to meet the expectations of employees and customers. As an applied learning course, it provides a fully immersive mock IT infrastructure with live virtual machines and real software, where students will learn and practice the foundational information security skills they will need to excel in their future careers.
IT 5023 - Information Security Management - 3 Credit Hour(s)
This course provides students with a fully immersive mock IT infrastructure with live virtual machines and real software. It covers operations-the job of day-to-day cybersecurity tasks-regulations, compliance, laws and policies, research and development, and the creation of software and cyber defenses for security training initiatives.
Why Choose RSU’s Master of Science in Cybersecurity Policy, Governance, & Training?
The Master of Science in Cybersecurity Policy, Governance, & Training at Rogers State University provides a comprehensive curriculum blending technical expertise, risk management, legal considerations, and business applications. Courses cover security policies, risk management, and identity access control, learning how to develop security frameworks and mitigate threats. Advanced topics include cyberwarfare operations, legal and privacy issues, and hands-on training in cybersecurity management. The program also integrates business-focused courses, such as enterprise resource management, data and information management, artificial intelligence for business, and business analytics. Through applied learning with real-world simulations and live virtual machines, you will gain practical experience in securing IT infrastructures and managing cybersecurity operations in diverse professional settings.
Rogers State University’s Master of Science in Cybersecurity Policy, Governance, & Training is classified as a STEM program, emphasizing technology in training and operations. According to O*NET data, an average of more than 200 job openings in Information Technology Project Management are projected annually in Oklahoma between 2020 and 2030. Additionally, the Bureau of Labor Statistics (September 6, 2023) reports that STEM occupations in the U.S. are expected to increase from 10.365 million in 2022 to 11.487 million by 2032, reflecting a 10.8% growth.
By the end of 2024, 18% of all jobs required a master’s degree (www.bls.gov). Current O*NET data (Bureau of Labor Statistics) identifies Computer and Information Systems Managers and Digital Forensics Analysts as “Bright Outlook” occupations. This designation applies to roles projected to grow faster than average (employment increase of 5% or more) or expected to generate at least 100,000 job openings nationwide between 2022 and 2032 (www.bls.gov). Both occupations are also classified as “New & Emerging,” meaning they are expected to expand rapidly (www.bls.gov).
Furthermore, Oklahoma Works’ Top 100 Critical Occupations list highlights Computer and Information Systems Managers as earning an average salary of $120,016—more than double the state average—with an anticipated 7% job growth (oklahomaworks.gov).
Financing Your Degree: Get Your Master of Science in Cybersecurity Policy, Governance, & Training Affordably
At RSU, we’re committed to ensuring you can pursue an MA degree regardless of your financial situation. We strive to keep our program affordable and work with employers who offer coverage of the program. View RSU tuition and fees or contact us for scholarship opportunities or information on other types of aid.
Ready to Start Your Master of Science in Cybersecurity Policy, Governance, & Training? Invest in Your Future Today
There’s no limit to what you can do with an MA degree. Request information, apply to RSU, or visit campus today to start your journey toward professional growth.