Security Awareness Programs & Computer-Based Training

MBA with a Focus on Cybersecurity

University of Dayton, ATIC Team up to Offer New Management Program The University of Dayton (UD) and the Advanced Technical Intelligence Center (ATIC) have partnered to address the shortage of skilled information security professionals within government and businesses.

Starting now, students in the masters in business administration program (MBA) at UD will have the option of taking a new three-course sequence in cybersecurity management.

"We believe that this partnership between ATIC and the UD School of Business is a great fit," says Dave Salisbury, associate professor of management information systems at the University of Dayton. "By partnering with ATIC, we have enhanced the educational options for our business students at UD."

The focus of this program is to develop professionals who will understand both the managerial and technical aspects of these technologies. These professionals will comprehend and protect against the threats to information and network security in a business information system by understanding the underlying business processes that these systems support.

The three courses include:

  • Principles of IS Security Management - Unclassified, offered on UD campus to address issues relevant to creating a systematic information assurance, compliance control structure and systematic security procedures.

  • Managing Telecommunication & Networking Systems - Classified, offered on ATIC campus to cover introduction to management of computer-based communication networks. Including underlying concepts; basic hardware components and operating systems; network architectures and protocols; data integrity and security; message routing; network resource management.
  • Managing Internet Security - Classified, offered on ATIC campus. This course will provide managers with an understanding of both defensive and offensive issues surrounding the security of computer-based information networks. The course will include instruction on theory about information security, psychological operations, hacking, viruses, and network systems management, and security for e-commerce on the Internet.

After taking the cyber-security management classes and successfully completing the UD MBA program, graduates will be qualified to work in classified industry like intelligence, the defense and other critical government positions.

"This program sequence equips professionals with both management skills and relevant government and industry network security standards for defending computer networks and information from attack," says Salisbury. "This field represents a growing need nationally, and employment opportunities are readily available for individuals who complete the program."

Individuals interested in the new cyber-security management classes must obtain admission to the University of Dayton masters in business administration program and must be eligible for U.S. government security clearance.

The ATIC is a nonprofit corporation established in 2006 to provide training and education necessary for developing the advanced technical intelligence workforce of the future.


About the Author

Upasana Gupta

Upasana Gupta

Contributing Editor, CareersInfoSecurity

Upasana Gupta oversees CareersInfoSecurity and shepherds career and leadership coverage for all Information Security Media Group's media properties. She regularly writes on career topics and speaks to senior executives on a wide-range of subjects, including security leadership, privacy, risk management, application security and fraud. She also helps produce podcasts and is instrumental in the global expansion of ISMG websites by recruiting international information security and risk experts to contribute content, including blogs. Upasana previously served as a resource manager focusing on hiring, recruiting and human resources at Icons Inc., an IT security advisory firm affiliated with ISMG. She holds an MBA in human resources from Maharishi University of Management, Fairfield, Iowa.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.