Master of Science in Business Informatics – Security Management Online

Defend valuable data and digital assets from cyber threats when you strengthen your skillsets in network security, cryptography, vulnerability detection, application hardening, and more.

Apply by 1/3/25
Start class 1/13/25 Apply Now

Program Overview

Optimize your career with a master's in security management online

Combine data security and business leadership expertise when you earn a Master of Science in Business Informatics – Security Management online from Northern Kentucky University. Benefit from the flexibility of an online program while gaining practical experience with hands-on labs and an optional co-op or internship.

Protect information systems from cyberattacks with cutting-edge technology skills and tools. Improve your understanding of cryptography, confidentiality and authentication protocols, web security botnets, firewalls, intrusion detection systems, logging and auditing systems, virtualization, and communication privacy. Plus, prepare for management roles with advanced business proficiency in communication, leadership, finance, data analysis, and project management.

In this online security management master's program, you will learn how to:

  • Understand and apply current information technologies
  • Evaluate and adapt new technologies to meet business needs
  • Comprehend the organizational settings where these technologies will be implemented
  • Manage information systems as an organizational resource by making critical, IS-related decisions and by recruiting and retaining qualified IS personnel
  • Expand your proficiency in Oracle®, SQL, Tableau®, Power BI, KNIME, and R
  • Understand and apply current information technologies
  • Evaluate and adapt new technologies to meet business needs
  • Comprehend the organizational settings where these technologies will be implemented
  • Manage information systems as an organizational resource by making critical, IS-related decisions and by recruiting and retaining qualified IS personnel
  • Expand your proficiency in Oracle®, SQL, Tableau®, Power BI, KNIME, and R

As a graduate of this security management master's degree program, you will be prepared for advancement into roles such as:

  • Data Scientist
  • Data Analyst
  • Chief Information Security Officer
  • Security Architect
  • Data Scientist
  • Data Analyst
  • Chief Information Security Officer
  • Security Architect

Also available:

Northern Kentucky University offers a variety of informatics programs online. Learn more about our online informatics programs.

Total Tuition $16,560
Program Duration As few as 12 months
Credit Hours 30
Apply Now

Need More Information?

Call 800-985-7215

Call 800-985-7215

Tuition

Invest in your future with a security management master's degree online

The MBI online program offers the same affordable, pay-by-the-course tuition for in-state and out-of-state students. Financial aid may be available to eligible students.

Tuition Breakdown:

Total Tuition $16,560
Per Credit Hour $536
Niche Best Colleges 2024

Renowned for Information Technology

Ranked among the “Best Colleges for Information Technology in America” by Niche.com, 2024

Generic Accreditation

A U.S. News & World Report Top Public School

Ranked among the “Top Public Schools” by U.S. News & World Report, 2023

Calendar

View key dates and deadlines

The MBI online program is delivered in a convenient online format, with 7-week courses that start six times a year. View the calendar to find the best start date for you and be sure to note corresponding deadlines.

SessionProgram Start DateApplication DeadlineDocument DeadlineRegistration DeadlinePayment Due
Spring 11/13/251/3/251/7/251/10/251/13/25
Spring 23/17/253/5/253/10/253/14/253/17/25
Summer 15/12/254/30/255/5/255/9/255/12/25
Summer 26/30/256/18/256/23/256/27/256/30/25

Now enrolling:

Apply Date 1/3/25
Class Starts 1/13/25
Real Ambition success logo
Apply Now

Admissions

Start your journey by checking our admission requirements

The admission process for the MBI online is streamlined to help you get started sooner.

Admission Requirements:

  • Official transcripts of all coursework from accredited institutions
  • Professional resume which includes relevant experience
  • 2.8 GPA or higher on a 4.0 scale

MBI Online Admission Requirements

  • Complete online application and pay $40 non-refundable application fee
    • If you are an NKU alum or active/veteran military member, your application fee will be waived
  • Submit official transcripts of all undergraduate and graduate (if applicable) coursework from accredited institutions with a minimum undergraduate overall grade point average (GPA) of 2.8 or higher
    • Applicants with an overall undergraduate GPA between 2.5 and 2.8 must submit a current resume with evidence of three years of professional work experience

Official documents may be mailed or emailed to:

NKU Office of Graduate Education
302 Lucas Administrative Center
Highland Heights, KY 41099

[email protected]

Have a question? Call us at 800-985-7215.

Kevin Kirby - NKU Staff

"Informatics is all about seeking human meaning in a world of data. It is how we find, process, protect, and share information."

Kevin Kirby, Dean of the College of Informatics

Courses

Find out what you will study in our online security management master's degree

For the Master of Science in Business Informatics – Security Management online program, you must complete a total of 30 credit hours, including 21 credit hours of core courses and nine credit hours of electives. Students without a programming background may be required to take an additional programming course as advised by the program director.

Students must take the following courses:
Duration: 7 Weeks weeks
Credit Hours: 3
This course is an introduction to the core concepts and fundamental principles of information systems (IS) in the context of business decision-making. This will include a survey of the IS discipline and an explanation of its importance in modern organizations. The key objective of the course is to give the student a good understanding of how managers can manage and exploit the potential of information technology for their own career and for the strategic benefit of their organizations.
Duration: 7 Weeks weeks
Credit Hours: 3
This course develops an understanding of tools, techniques, and methods for analysis, design and implementation of information systems. It uses theory and applied projects to build effective interpersonal and communication skills that are essential to interact with clients, users, and other team members involved with development, operation, and maintenance of information systems. Approaches to systems development such as rapid application development (RAD), joint application development (JAD), and other techniques to create quality systems are explored.
Duration: 7 Weeks weeks
Credit Hours: 3
In-depth investigation of intelligent database management systems in support of business decision-making. This course includes an investigation of all aspects of data modeling; database design; and implementation of relational, object-oriented, and semantic databases.
Duration: 7 Weeks weeks
Credit Hours: 3
This course is an overview of information technology project management practices, software, contexts, and processes. Topics include project implementation methodologies; resource selection; project risks and failures: managing technical project personnel; project management tools and techniques, and issues related to project outsourcing.
Duration: 7 Weeks weeks
Credit Hours: 3
The course provides an overview of the field of Information Security and Assurance in various technical and administrative aspects including audit and controls. Students will be exposed to a spectrum of security activities, methods, methodologies, and procedures.
Duration: 7 Weeks weeks
Credit Hours: 3
Business decisions require the basic skills of analyzing data to understand the problem more completely and to produce better answers. Information systems automate these tools and techniques allowing decision makers to get better information quicker. Through hands-on labs and a group project, this course will introduce students to the business analytics process, including problem modeling, tools, and techniques for analysis, and effectively communicating insights.
Duration: 7 Weeks weeks
Credit Hours: 3
An overview of contemporary information technology (IT) computer, telecommunications, and office systems-management issues and principles with specific emphasis on setting the direction of IT resources and managing IT policy and strategy.
Students must take the following courses:
Duration: 7 Weeks weeks
Credit Hours: 3
Students will learn web security, security standards-SSL/TLS, and SET, intruders and viruses, PGP and S/MIME for electronic mail security, firewalls, IDS secret key and public/private key cryptography, hashes and message digests, authentication systems (Kerberos), digital signatures and certificates, Kerberos and X.509v3 digital certificates. Hands-on labs and exercises are used to reinforce lectures and provide practical experience.
Duration: 7 Weeks weeks
Credit Hours: 3
Students will learn technologies behind web applications and servers, how applications and servers are exploited, and the defense mechanisms which can be used for server and application hardening. Hands-on labs on vulnerability detection and exploitation will be used to provide practical experience.
Duration: 7 Weeks weeks
Credit Hours: 3
Students will learn about the fundamentals of administering and protecting both desktop and server systems, including access control, identify and access management, configuring and installing services, logging and auditing systems, virtualization and containerization, and how to harden OS images.

Request Information

Submit this form, and an Enrollment Specialist will contact you to answer your questions.

  • This field is for validation purposes and should be left unchanged.

Or call 800-985-7215

Ready to Begin?

Start your application today!

Or call 800-985-7215 800-985-7215
for help with any questions you may have.