Start your GCU journey Today.
Request Info

MS in Cybersecurity

Domains

Program Domains

  • Technical Application and Risk Management Techniques -
    Graduates of Grand Canyon University’s Master of Science in Cybersecurity program will be able to evaluate and apply various tools, concepts, and analytics to identify and assess risks while formulating security solutions to manage the Confidentiality, Integrity, and Availability of intellectual property from threats.
    • Apply and use of various tools, technologies, and concepts to support the Confidentiality, Integrity, and Availability of Intellectual Property (CAE KU 3, 6, 7, 8, 9, 12, 13).
    • Apply appropriate qualitative and quantitative analytic methodologies to predict trends and communicate security strategies to meet business objectives (CAE KU 1, 3, 4).
    • Conduct risk assessments and evaluate vulnerabilities, threats, and gaps in an organization’s infrastructure to identify appropriate security measures to reduce risks’ impact to business processes (CAE KU 3, 4, 6, 8)
    • Evaluate the appropriate security solutions required to design a security architecture (CAE KU 1, 5, 6)
  • Frameworks and Methodologies -
    Graduates of Grand Canyon University’s Master of Science in Cybersecurity program will be able to interpret various cybersecurity frameworks and methodologies to establish a comprehensive cybersecurity program to sustain an organization’s competitive advantage while aligning to appropriate compliance regulations.
    • Establish a risk management framework using industry standards for compliance (CAE KU 10, 11, 15).
    • Define and apply the NIST Cybersecurity Framework functional areas, implementation tiers, and profiles (CAE KU 5, 7, 15).
    • Apply the Cybersecurity Life Cycle, Cybersecurity Framework, and Methodologies to establish a Cybersecurity Program that supports an organization’s strategic and business initiatives (CAE KU 3, 5, 6)
  • Cyber Law and Data Protection -
    Graduates of Grand Canyon University’s Master of Science in Cybersecurity program will be able to examine and evaluate the various security implications of cyber law against small to medium sized businesses associated with the application of the laws, regulations, and standards. They will recommend solutions that align with best practices in securing against cyber threats, support cyber law inquiries, and manage growing trends.
    • Examine the laws, regulations, and standards that organizations use to align with government requirements around cybersecurity best practices within their industry (CAE KU 10, 11)
    • Analyze various cyber threat models used to identify and protect against cybercrime threat vectors, motivations, and ideologies (CAE KU 3, 4, 5, 6, 12).
    • Perform requirements analysis to identify and obtain data and evidence in support of cyber law inquiries and incidents (CAE KU 3, 4, 6, 11).
    • Evaluate the implications of Internet use within Small to Medium-Sized Business (SMB) and data protection for Intellectual Property (CAE KU 12, 13).
  • Leadership and Business Management Strategies -
    Graduates of Grand Canyon University’s Master of Science in Cybersecurity program will be able to develop and communicate a cybersecurity business strategy using project management methodologies, security models, and governance schemes, while recognizing the ethical, moral, social responsibilities. They will also formulate continuity and mitigation plans to ensure business sustainability, availability, and reliability.
    • Develop cybersecurity program aligned with business needs, regulations, and compliance standards to enhance an organization’s security posture (CAE KU 2, 10, 11, 12, 13, 17).
    • Determine appropriate business strategies to ensure business sustainability, availability, and reliability and articulate these needs to relevant stakeholders (CAE KU 13, 14, 16).
    • Analyze the ethical implications of cybersecurity policies and regulations put in place to protect the Confidentiality, Integrity, and Availability of Intellectual Property (CAE KU 3, 7, 10, 11).
    • Interpret risk assessments, gap analysis, and current cybersecurity trends to formulate a cybersecurity governance strategy that establishes mitigation plans for future challenges to achieve security objectives (CAE KU 6, 10, 11, 12, 15).
Faculty

Program Faculty

Our faculty are committed to bringing their abundant knowledge, enthusiasm, and experience to GCU and its students every day.
Disclosures

Disclosure Categories Related to Professional Licensure

Alabama
Alaska
American Samoa
Arizona
Arkansas
California
Colorado
Connecticut
Delaware
District of Columbia
Federated States of Micronesia
Florida
Georgia
Guam, US Territory
Hawaii
Idaho
Illinois
Indiana
Iowa
Kansas
Kentucky
Louisiana
Maine
Marshall Islands
Maryland
Massachusetts
Michigan
Minnesota
Mississippi
Missouri
Montana
Nebraska
Nevada
New Hampshire
New Jersey
New Mexico
New York
North Carolina
North Dakota
Northern Mariana Islands
Ohio
Oklahoma
Oregon
Pennsylvania
Puerto Rico
Republic of Palau
Rhode Island
South Carolina
South Dakota
Tennessee
Texas
Utah
Vermont
Virgin Islands
Virginia
Washington
West Virginia
Wisconsin
Wyoming
59 Matching States and Territories
Expand All
Off

We're here to help.

I'm Ready to ApplyI Need More Information