{"id":2999,"date":"2024-10-10T12:01:33","date_gmt":"2024-10-10T16:01:33","guid":{"rendered":"https:\/\/catalogs.wcsu.edu\/grad2425\/?page_id=2999"},"modified":"2025-12-16T10:22:27","modified_gmt":"2025-12-16T15:22:27","slug":"master-of-business-administration-cybersecurity-concentration","status":"publish","type":"page","link":"https:\/\/catalogs.wcsu.edu\/grad\/asb\/programs\/master-of-business-administration-cybersecurity-concentration\/","title":{"rendered":"MASTER OF BUSINESS ADMINISTRATION &#8211; CYBERSECURITY"},"content":{"rendered":"<h1><strong><span style=\"font-family: times new roman,times,serif;font-size: 12pt\">MBA &#8211; Concentration in Cybersecurity<\/span><\/strong><span style=\"font-family: times new roman,times;font-size: small\">\u00a0<\/span><\/h1>\n<table>\n<tbody>\n<tr>\n<td style=\"width: 420px\">\n<table border=\"0\">\n<tbody>\n<tr>\n<td><span style=\"font-family: times new roman,times,serif;font-size: 12pt\">Dr. Linda Forbes\u00a0<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<td style=\"width: 336.95px\"><span style=\"font-family: times new roman,times,serif;font-size: 12pt\">Phone: (203) 837-3256<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 420px\"><span style=\"font-family: times new roman,times,serif;font-size: 12pt\">Room WS 386 &#8211; Classroom Building<\/span><\/td>\n<td style=\"width: 336.95px\"><span style=\"font-family: times new roman,times,serif;font-size: 12pt\">forbesl@wcsu.edu<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 420px\"><\/td>\n<td style=\"width: 336.95px\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"width: 749px;height: 186px\" border=\"0\">\n<tbody>\n<tr>\n<td><span style=\"font-family: times new roman,times;font-size: 12pt\"><em>Accounting Faculty\u00a0<\/em><\/span><\/td>\n<td><span style=\"font-family: times new roman,times;font-size: 12pt\">X. Jiang; Y. Kim.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: times new roman,times;font-size: 12pt\"><em>Finance Faculty<\/em><\/span><\/td>\n<td><span style=\"font-family: times new roman,times;font-size: 12pt\">H. Naimot; J. K. Robinson; L. Vo.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: times new roman,times;font-size: 12pt\"><em>Management Faculty<\/em><\/span><\/td>\n<td><span style=\"font-family: times new roman,times;font-size: 12pt\">S. Bazan; M. Dugal; L. Forbes; Y. Hayajneh; D. Weltmann.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: times new roman,times;font-size: 12pt\"><em>Management Information Systems<\/em><\/span><\/td>\n<td><span style=\"font-family: times new roman,times;font-size: 12pt\">J. Flynn; P. Nugent.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: times new roman,times;font-size: 12pt\"><em>Marketing<\/em><\/span><\/td>\n<td><span style=\"font-family: times new roman,times;font-size: 12pt\">J. McCartney.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: times new roman,times;font-size: small\"><em>\u00a0<\/em><\/span><\/td>\n<td><span style=\"font-family: times new roman,times;font-size: small\">\u00a0<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-family: times new roman,times;font-size: 12pt\"><strong>Program Overview and Mission<\/strong><\/span><\/h2>\n<p><span style=\"font-family: times new roman,times;font-size: 12pt\">Western&#8217;s Master of Business Administration (M.B.A.) &#8211; Concentration in Cybersecurity in program is accredited by the Association to Advance Collegiate Schools of Business (AACSB, https:\/\/www.aacsb.edu\/about). Western&#8217;s M.B.A. program focuses on preparing students for managerial positions and leadership roles in contemporary organizations. Students acquire vital knowledge about business and organizational functions and activities. Students are challenged to think strategically and to hone skills needed to succeed in competitive environments.<\/span><\/p>\n<p><span style=\"font-family: times new roman,times;font-size: 12pt\">Western&#8217;s M.B.A. in Cybersecurity is designed with flexibility in mind to meet the needs of our students: <\/span><\/p>\n<p style=\"padding-left: 30px\"><span style=\"font-family: times new roman,times;font-size: 12pt\">Working Professionals: Students can take\u00a0one\u00a0or two\u00a0courses in the fall, spring, summer and intersession, completing the degree in as little as two years. <\/span><\/p>\n<p style=\"padding-left: 30px\"><span style=\"font-family: times new roman,times;font-size: 12pt\">Full-time Students: For students able to make a full-time commitment including summer and intersession, the program can be completed in 12-14 months depending on required\u00a0prerequisites. Our scheduling also\u00a0meets the needs of Accounting graduates who are completing Connecticut&#8217;s 150 credit hour requirement prior to joining accounting firms.\u00a0 <\/span><\/p>\n<p><span style=\"font-family: times new roman,times;font-size: 12pt\">Most graduate classes meet one night a week on Monday through Thursday evenings\u00a0at 5:25\u00a0p.m.\u00a0 Some courses may be offered in online or hybrid formats and occasionally at 8 p.m. or on weekends. Small classes, usually fewer than 25 students, encourage interaction and collegiality among the students.<\/span><\/p>\n<p><span style=\"font-family: times new roman,times;font-size: 12pt\">\u00a0<\/span><\/p>\n<h2><span style=\"font-family: times new roman,times;font-size: 12pt\"><strong>Program Learning Goals and Outcomes<\/strong><\/span><\/h2>\n<p><span style=\"font-family: times new roman,times;font-size: 12pt\">1.\u00a0 \u00a0COMMUNICATION: MBA graduates will demonstrate effective oral and written communication skills.<\/span><\/p>\n<ul>\n<li><span style=\"font-size: 12pt;font-family: 'times new roman', times, serif\">Graduates will demonstrate effective writing skills that are appropriate to multi-national and multi-layered organizations.<\/span><\/li>\n<li><span style=\"font-size: 12pt;font-family: 'times new roman', times, serif\">Graduates will demonstrate effective oral communication skills that encompass diverse perspectives.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: times new roman,times;font-size: 12pt\">2.\u00a0 \u00a0LEADERSHIP AND TEAMS: MBA graduates will demonstrate managerial-level skills required to develop successful careers.<\/span><\/p>\n<ul>\n<li><span style=\"font-size: 12pt;font-family: 'times new roman', times, serif\">Graduates will be effective leaders.<\/span><\/li>\n<li><span style=\"font-size: 12pt;font-family: 'times new roman', times, serif\">Graduates will be effective collaborators.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: times new roman,times;font-size: 12pt\">3.\u00a0 ETHICS: MBA graduates will demonstrate ethical awareness.<\/span><\/p>\n<ul>\n<li><span style=\"font-size: 12pt;font-family: 'times new roman', times, serif\">Graduates will apply social frameworks to achieve a positive societal impact *<\/span><\/li>\n<li><span style=\"font-size: 12pt;font-family: 'times new roman', times, serif\">Graduates will be able to evaluate and apply relevant ethical considerations to decision-making.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: times new roman,times;font-size: 12pt\">4.\u00a0 CRITICAL THINKING: MBA graduates will be effective critical thinkers.<\/span><\/p>\n<ul>\n<li><span style=\"font-size: 12pt;font-family: 'times new roman', times, serif\">Graduates will utilize critical thinking to assess business environments.<\/span><\/li>\n<li><span style=\"font-size: 12pt;font-family: 'times new roman', times, serif\">Graduates will apply qualitative and quantitative reasoning to make business decisions.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: 12pt;font-family: 'times new roman', times, serif\">5. CYBERSECURITY: Graduates will learn to strategically manage resources, proactively mitigate cybersecurity risks, and safeguard organizations against cyber threats.<\/span><\/p>\n<p class=\"Default\"><span style=\"font-size: 12pt;font-family: 'times new roman', times, serif\">*Required by current AACSB standards: \u201c<b>Societal Impact. <\/b>Societal impact as an expectation of all accredited schools reflects AACSB\u2019s vision that business education is a force for good in society and makes a positive contribution to society, as identified in the school\u2019s mission and strategic plan. This includes an expectation that the school explicates its intended strategies to effect a positive impact on society, that the school\u2019s curriculum contains some components relating to societal impact, that the school\u2019s intellectual contributions portfolio contains some contributions focused on societal impact, and that the school is fostering and promoting curriculum and\/or curricular activities that seek to make a positive societal impact.\u201d<\/span><\/p>\n<h2><span style=\"font-family: times new roman,times;font-size: 12pt\"><strong>Admission Requirements<\/strong><\/span><\/h2>\n<p><span style=\"font-family: times new roman,times;font-size: 12pt\">Applicants to the M.B.A. in Cybersecurity program must submit the following materials to the Office of Graduate Admissions, Old Main, Rm. 101:<\/span><\/p>\n<ul>\n<li><span style=\"font-family: times new roman,times;font-size: 12pt\">a completed application for graduate study &#8211; Online application: <a href=\"https:\/\/www.wcsu.edu\/admissions\/apply\/\">https:\/\/www.wcsu.edu\/admissions\/apply\/<\/a>\u00a0<\/span><\/li>\n<li>an official transcript from each college or university previously attended, including all\u00a0undergraduate and graduate courses, grades, and degrees<\/li>\n<li><span style=\"font-family: times new roman,times;font-size: 12pt\">a list of three references, with contact information, preferably from employers or former professors<\/span><\/li>\n<li><span style=\"font-family: times new roman,times;font-size: 12pt\">a\u00a0current resume or curriculum vita<\/span><\/li>\n<li><span style=\"font-family: times new roman,times;font-size: 12pt\">Optional essay: why the applicant desires to pursue an M.B.A. in Cybersecurity at WCSU.<\/span><\/li>\n<li><span style=\"font-family: times new roman,times;font-size: 12pt\">The Test of English as a Foreign Language (TOEFL) may be required for non-native English speakers with limited exposure to English. We also accept Duolingo.<\/span><\/li>\n<li><span style=\"font-family: times new roman,times;font-size: 12pt\">for applicants with an undergraduate GPA below 2.75 an official copy of the Graduate Management Admissions Test (GMAT) or the Graduate Record Examination (GRE) test scores. GMAT\/GRE scores must be from no more than five years prior to the date of enrollment.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: times new roman,times;font-size: 12pt\">Admission to the M.B.A. in Cybersecurity program is based on the information in the above items and the meeting with the program coordinator. No admission decision can be made until all of the required materials are in the applicant\u2019s file in the Office of Graduate Admissions. Previous academic achievements, GMAT\/GRE test scores, recommendations, and work experience are important factors. If you are admitted to the program you will be required to submit proof of immunization before you can register for courses. For more information, go to <a href=\"https:\/\/www.wcsu.edu\/healthservices\/onlineforms\/\">https:\/\/www.wcsu.edu\/healthservices\/onlineforms\/<\/a> for Connecticut State University Immunization Requirements and Connecticut State University\u00a0Student Health Services Form.\u00a0<\/span><\/p>\n<h2><span style=\"font-family: times new roman,times;font-size: 12pt\"><strong>Admission Formula<\/strong><\/span><\/h2>\n<p><span style=\"font-family: times new roman,times;font-size: 12pt\">In general, admission to the M.B.A. in Cybersecurity will be determined using the following M.B.A. Admission Formula Score:\u00a0 (Undergraduate GPA x 200) + GMAT score <span style=\"text-decoration: underline\">&gt;<\/span> 1,050<\/span><\/p>\n<h2><span style=\"font-family: times new roman,times;font-size: 12pt\"><strong>GMAT\/GRE Exam Waivers<\/strong><\/span><\/h2>\n<p><span style=\"font-family: times new roman,times;font-size: 12pt\">You may receive a GMAT\/GRE waiver if you have significant professional business and management experience, recognized professional certification (CPS, CFA, CMA, CIA, CFP), past graduate degree (master&#8217;s or higher), or a minimum undergraduate GPA of 2.75, or take 2 M.B.A. 3 S.H. program courses as a non-matriculated student in one semester, and receive an average grade of 3.67 or better. Contact M.B.A. Coordinator for details on this process.<\/span><\/p>\n<h2><span style=\"font-family: times new roman,times;font-size: 12pt\"><strong>Degree Requirements<\/strong><\/span><\/h2>\n<p><span style=\"font-family: times new roman,times;font-size: 12pt\">The M.B.A. in Cybersecurity degree will be conferred upon the matriculated M.B.A. in Cybersecurity graduate student who has<\/span><\/p>\n<ul>\n<li><span style=\"font-family: times new roman,times;font-size: 12pt\">completed prerequisite courses (minus waived)<\/span><\/li>\n<li><span style=\"font-family: times new roman,times;font-size: 12pt\">completed\u00a0\u00a037 graduate credits (minus waived and transferred credits) with a cumulative\u00a0GPA of 3.0 B or better<\/span><\/li>\n<li><span style=\"font-family: times new roman,times,serif;font-size: 12pt\">participated in program-level assessments<\/span><\/li>\n<li><span style=\"font-family: times new roman,times;font-size: 12pt\">completed the program within an six-year period<\/span><\/li>\n<li><span style=\"font-size: 12pt\"><span style=\"font-family: times new roman,times\">filed the application for the degree with the\u00a0Office of Graduate Admissions<\/span><span style=\"font-family: times new roman,times\">\u00a0by December 1 for the May commencement, February 1 for an August conferral, or<\/span><\/span><br \/>\n<span style=\"font-family: times new roman,times;font-size: 12pt\"> October 1 for a January conferral<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-family: times new roman,times;font-size: 12pt\"><strong>Waiver of Courses<\/strong><\/span><\/h2>\n<p><span style=\"font-family: times new roman,times;font-size: 12pt\">The number of courses required for the M.B.A. in Cybersecurity degree may be reduced by waiver of some or all of the prerequisite courses (a maximum of 7 semester hours). These waivers are based on the applicant\u2019s undergraduate business degree transcript completed business courses with satisfactory grades of B or better, or relevant graduate courses with satisfactory grades of B or better.<\/span><\/p>\n<h2><span style=\"font-family: times new roman,times;font-size: 12pt\"><strong>Transfer of Courses<\/strong><\/span><\/h2>\n<p><span style=\"font-family: times new roman,times;font-size: 12pt\">Up to 12 semester hours of graduate credit may be transferred to the M.B.A. in Cybersecurity program for equivalent courses completed elsewhere. To be considered for transfer, the courses must have been completed with a grade of B or better in the six years prior to enrollment in Western\u2019s M.B.A. program.<\/span><\/p>\n<h2><span style=\"font-family: times new roman,times;font-size: 12pt\"><strong>Substitution of Courses<\/strong><\/span><\/h2>\n<p><span style=\"font-family: times new roman,times;font-size: 12pt\">Course substitutions may be allowed within the M.B.A. in Cybersecurity program to accommodate special considerations. Please see the M.B.A. Coordinator.<\/span><\/p>\n<h2><span style=\"font-family: times new roman,times;font-size: 12pt\"><strong>Course Restrictions\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong><\/span><\/h2>\n<p><span style=\"font-family: times new roman,times;font-size: 12pt\">For a complete list of prerequisites, co-requisites, and other restrictions for all courses, please consult the Course Description section of this catalog or contact the M.B.A. coordinator.<\/span><\/p>\n<h2><span style=\"font-family: times new roman,times;font-size: 12pt\"><strong>Graduate Student Success Manual<\/strong> <a href=\"http:\/\/catalogs.wcsu.edu\/grad\/files\/2024\/03\/Ancell-Grad-Student-Success-Manual-2023-24-R2.pdf\">Graduate Student Success Manual<\/a><\/span><\/h2>\n<p><span style=\"font-family: times new roman,times;font-size: 12pt\">This manual, targeted to our Ancell graduate students, provides information about student life here at WCSU, and on the Westside campus. The goal is to ease the transition of graduate students to the program at the Ancell School of Business (ASB).<\/span><\/p>\n<h2><span style=\"font-family: times new roman,times;font-size: 12pt\"><strong>Courses Rotation<\/strong><\/span><\/h2>\n<p><span style=\"font-family: times new roman,times;font-size: 12pt\">Program course rotation.<a href=\"https:\/\/www.wcsu.edu\/asb\/rotation\/#MBA_Rotation\"> Course Rotation<\/a><\/span><\/p>\n<h2><strong><span style=\"font-family: times new roman,times,serif;font-size: 12pt\">Master of Business Administration &#8211; Concentration in Cybersecurity<\/span><\/strong><\/h2>\n<table style=\"width: 74.487%;height: 669px\" border=\"0\">\n<tbody>\n<tr style=\"height: 22px\">\n<td style=\"height: 21px\"><strong>Prerequisite Cluster<\/strong><\/td>\n<td style=\"height: 21px\"><strong>\u00a0(7 credits &#8211; courses may be waived)\u00a0<\/strong><\/td>\n<td style=\"height: 21px\"><\/td>\n<td style=\"width: 1.85529%;height: 21px;text-align: center\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 22px\">\n<td style=\"height: 21px\">ACC 501<\/td>\n<td style=\"height: 21px\">Introduction to Financial\u00a0Statements<\/td>\n<td style=\"height: 21px\">1 SH<\/td>\n<td style=\"width: 1.85529%;height: 21px;text-align: center\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 22px\">\n<td style=\"height: 21px\">ACC\u00a0502<\/td>\n<td style=\"height: 21px\">Introduction to Managerial Accounting<\/td>\n<td style=\"height: 21px\">1\u00a0SH<\/td>\n<td style=\"width: 1.85529%;height: 21px;text-align: center\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 22px\">\n<td style=\"height: 21px\">FIN 504<\/td>\n<td style=\"height: 21px\">Introduction to Business Statistics<\/td>\n<td style=\"height: 21px\">1\u00a0SH<\/td>\n<td style=\"width: 1.85529%;height: 21px;text-align: center\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 22px\">\n<td style=\"height: 21px\">FIN 508<\/td>\n<td style=\"height: 21px\">Introduction to Economics and Finance<\/td>\n<td style=\"height: 21px\">1\u00a0SH<\/td>\n<td style=\"width: 1.85529%;height: 21px;text-align: center\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 22px\">\n<td style=\"height: 21px\">MGT 504<\/td>\n<td style=\"height: 21px\">Essentials of\u00a0 Operations Management<\/td>\n<td style=\"height: 21px\">1 SH<\/td>\n<td style=\"width: 1.85529%;height: 21px;text-align: center\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 22px\">\n<td style=\"height: 21px\">MGT 505<\/td>\n<td style=\"height: 21px\">Essentials of Organizational Behavior<\/td>\n<td style=\"height: 21px\">1\u00a0SH<\/td>\n<td style=\"width: 1.85529%;height: 21px;text-align: center\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 22px\">\n<td style=\"height: 21px\">MIS 512<\/td>\n<td style=\"height: 21px\">Essentials of Management Information Systems<\/td>\n<td style=\"height: 21px\">1\u00a0SH<\/td>\n<td style=\"width: 1.85529%;height: 21px;text-align: center\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 22px\">\n<td style=\"height: 21px\"><\/td>\n<td style=\"height: 21px\"><\/td>\n<td style=\"height: 21px\"><\/td>\n<td style=\"width: 1.85529%;height: 21px;text-align: center\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 18px\">\n<td style=\"height: 19px\"><strong>Required MBA Courses<\/strong><\/td>\n<td style=\"height: 19px\"><strong>(15 credits)<\/strong><\/td>\n<td style=\"height: 19px\"><\/td>\n<td style=\"width: 1.85529%;height: 19px;text-align: center\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 18px\">\n<td style=\"height: 21px\">MGT 506<\/td>\n<td style=\"height: 21px\">\n<table border=\"0\">\n<tbody>\n<tr>\n<td>Strategic Management<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<td style=\"height: 21px\">3 SH<\/td>\n<td style=\"width: 1.85529%;height: 21px;text-align: center\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 18px\">\n<td style=\"height: 19px\">FIN 560<\/td>\n<td style=\"height: 19px\">Analysis of Financial and Investment Decisions<\/td>\n<td style=\"height: 19px\">3 SH<\/td>\n<td style=\"width: 1.85529%;height: 19px;text-align: center\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 18px\">\n<td style=\"height: 19px\">ACC 507<\/td>\n<td style=\"height: 19px\">Strategic Cost Management<\/td>\n<td style=\"height: 19px\">3 SH<\/td>\n<td style=\"width: 1.85529%;height: 19px;text-align: center\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 18px\">\n<td style=\"height: 19px\">MIS 516<\/td>\n<td style=\"height: 19px\">Information Analysis<\/td>\n<td style=\"height: 19px\">3 SH<\/td>\n<td style=\"width: 1.85529%;height: 19px;text-align: center\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 18.7px\">\n<td style=\"height: 19px\">MKT 534<\/td>\n<td style=\"height: 19px\">Strategic Marketing Management<\/td>\n<td style=\"height: 19px\">3 SH<\/td>\n<td style=\"width: 1.85529%;height: 19px;text-align: center\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 18px\">\n<td style=\"height: 19px\"><\/td>\n<td style=\"height: 19px\"><\/td>\n<td style=\"height: 19px\"><\/td>\n<td style=\"width: 1.85529%;height: 19px;text-align: center\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 18px\">\n<td style=\"height: 19px\"><strong>Concentration Courses<\/strong><\/td>\n<td style=\"height: 19px\"><strong>\u00a0(9 credits)<\/strong><\/td>\n<td style=\"height: 19px\"><\/td>\n<td style=\"width: 1.85529%;height: 19px;text-align: center\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 18px\">\n<td style=\"height: 19px\">MIS 563<\/td>\n<td style=\"height: 19px\">Information Security Management<\/td>\n<td style=\"height: 19px\">3 SH<\/td>\n<td style=\"width: 1.85529%;height: 19px;text-align: center\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 18px\">\n<td style=\"height: 19px\">MIS 565<\/td>\n<td style=\"height: 19px\">Cybersecurity Risk Management<\/td>\n<td style=\"height: 19px\">3 SH<\/td>\n<td style=\"width: 1.85529%;height: 19px;text-align: center\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 18px\">\n<td style=\"height: 19px\">MIS 567<\/td>\n<td style=\"height: 19px\">Data Communications and Networking<\/td>\n<td style=\"height: 19px\">3 SH<\/td>\n<td style=\"width: 1.85529%;height: 19px;text-align: center\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 18px\">\n<td style=\"width: 16.13%;height: 18px\"><\/td>\n<td style=\"width: 58.1506%;height: 18px\"><\/td>\n<td style=\"width: 9.39583%;height: 18px;text-align: center\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<td style=\"width: 1.85529%;height: 18px;text-align: center\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 18px\">\n<td style=\"width: 16.13%;height: 18px\"><strong><span style=\"color: #333333\">Elective Courses<\/span><\/strong><\/td>\n<td style=\"width: 58.1506%;height: 18px\"><strong><span style=\"color: #333333\">(6 credits)\u00a0<\/span><\/strong><\/td>\n<td style=\"width: 9.39583%;height: 18px;text-align: center\"><\/td>\n<td style=\"width: 1.85529%;height: 18px;text-align: center\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 18px\">\n<td style=\"height: 19px\">MKT 539<\/td>\n<td style=\"height: 19px\">Effective Managerial Communication<\/td>\n<td style=\"height: 19px\">3 SH<\/td>\n<td style=\"width: 1.85529%;height: 19px;text-align: center\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 23px\">\n<td style=\"height: 22px\">MKT 592<\/td>\n<td style=\"height: 22px\">International Business Strategy<\/td>\n<td style=\"height: 22px\">3 SH<\/td>\n<td style=\"width: 1.85529%;text-align: center;height: 22px\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 23px\">\n<td style=\"height: 22px\">JLA \u00a0 555<\/td>\n<td style=\"height: 22px\">Cybersecurity of the Homeland<\/td>\n<td style=\"height: 22px\">3 SH<\/td>\n<td style=\"width: 1.85529%;text-align: center;height: 22px\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 23px\">\n<td style=\"height: 22px\">MGT 544<\/td>\n<td style=\"height: 22px\">Negotiations and Conflict Resolution<\/td>\n<td style=\"height: 22px\">3 SH<\/td>\n<td style=\"width: 1.85529%;text-align: center;height: 22px\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 23px\">\n<td style=\"height: 22px\">MGT 580<\/td>\n<td style=\"height: 22px\">Health Delivery Systems<\/td>\n<td style=\"height: 22px\">3 SH<\/td>\n<td style=\"width: 1.85529%;text-align: center;height: 22px\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 23px\">\n<td style=\"height: 22px\">MGT 582<\/td>\n<td style=\"height: 22px\">Managing Health Services Organizations<\/td>\n<td style=\"height: 22px\">3 SH<\/td>\n<td style=\"width: 1.85529%;text-align: center;height: 22px\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 23px\">\n<td style=\"height: 22px\">MGT 530<\/td>\n<td style=\"height: 22px\">Leadership<\/td>\n<td style=\"height: 22px\">3 SH<\/td>\n<td style=\"width: 1.85529%;text-align: center;height: 22px\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 23px\">\n<td style=\"height: 22px\">MGT 547<\/td>\n<td style=\"height: 22px\">Human Resource Management<\/td>\n<td style=\"height: 22px\">3 SH<\/td>\n<td style=\"width: 1.85529%;text-align: center;height: 22px\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 10px\">\n<td style=\"height: 19px\">MGT 521<\/td>\n<td style=\"height: 19px\">Strategic Integration of Operations<\/td>\n<td style=\"height: 19px\">3 SH<\/td>\n<td style=\"width: 1.85529%;text-align: center;height: 19px\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 23px\">\n<td style=\"width: 16.13%;height: 23px\"><span style=\"font-family: times new roman,times,serif;font-size: 12pt\"><span style=\"color: #333333\">\u00a0<\/span><\/span><\/td>\n<td style=\"width: 58.1506%;height: 23px\"><span style=\"font-family: times new roman,times,serif\"><span style=\"color: #333333\">\u00a0<\/span><\/span><\/td>\n<td style=\"width: 9.39583%;text-align: center;height: 23px\"><span style=\"font-family: times new roman,times,serif;font-size: 12pt\"><span style=\"color: #333333\">\u00a0<\/span><\/span><\/td>\n<td style=\"width: 1.85529%;text-align: center;height: 23px\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 18px\">\n<td style=\"width: 16.13%;height: 18px\"><span style=\"font-family: times new roman,times,serif;font-size: 12pt\"><span style=\"color: #333333\">Total SH: <\/span><\/span><\/td>\n<td style=\"width: 58.1506%;height: 18px\"><span style=\"font-family: times new roman,times,serif;font-size: 12pt\"><span style=\"color: #333333\">37 SH<\/span><\/span><\/td>\n<td style=\"width: 9.39583%;height: 18px;text-align: center\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<td style=\"width: 1.85529%;height: 18px;text-align: center\"><span style=\"color: #333333\">\u00a0<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>MBA &#8211; Concentration in Cybersecurity\u00a0 Dr. Linda Forbes\u00a0 Phone: (203) 837-3256 Room WS 386 &#8211; Classroom Building forbesl@wcsu.edu Accounting Faculty\u00a0 X. Jiang; Y. Kim. Finance Faculty H. Naimot; J. K. Robinson; L. Vo. Management Faculty S. Bazan; M. Dugal; L. &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":712,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2999","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/catalogs.wcsu.edu\/grad\/wp-json\/wp\/v2\/pages\/2999","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/catalogs.wcsu.edu\/grad\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/catalogs.wcsu.edu\/grad\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/catalogs.wcsu.edu\/grad\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/catalogs.wcsu.edu\/grad\/wp-json\/wp\/v2\/comments?post=2999"}],"version-history":[{"count":0,"href":"https:\/\/catalogs.wcsu.edu\/grad\/wp-json\/wp\/v2\/pages\/2999\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/catalogs.wcsu.edu\/grad\/wp-json\/wp\/v2\/pages\/712"}],"wp:attachment":[{"href":"https:\/\/catalogs.wcsu.edu\/grad\/wp-json\/wp\/v2\/media?parent=2999"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}