Master of Business Administration inCybersecurity

Advance your cybersecurity career when you become job-ready for many of the more than 150,000 new cybersecurity positions projected in the U.S. annually through 2017! The online graduate programs offered by Concordia University, St. Paul were designed, in partnership with Mission Critical Institute, to create cybersecurity leaders who can help address the accelerating shortages of cybersecurity professionals and growing cyber threats and breaches confronting the public and private sectors.

40+ Student Clubs and Organizations
26 NCAA Academic All-America Honors
1893 the year Concordia was founded
Apply Now

Cybersecurity Curriculum Overview

You will be cybersecurity job-ready when you complete Concordia’s unique, employer-guided cybersecurity curriculum taught by expert practitioner faculty who will help you:

  • Obtain security clearance sponsorship*
  • Receive exam preparation for three top DoD 8570 certifications
  • Acquire NIST Risk Management Framework project experience
  • Gain expertise in cyber defense and offense
  • Expand your cyber professional network
  • Earn cybersecurity graduate certificates

Immediately begin to gain the experience you need to apply risk and incident management strategies and cybersecurity best practices to make you cybersecurity job-ready while completing up to three of these specialized Graduate Certificates:

  • Cybersecurity Risk Management
  • Cybersecurity Incident and Insider Threat Management
  • Cybersecurity Leadership Best Practices

Then advance further in cybersecurity when you apply cybersecurity graduate certificate credits towards completing your Concordia Cybersecurity MBA.

*Only eligible U.S. citizens may receive security clearance sponsorship. However, all students may earn all other program credentials.

Cybersecurity Risk Management (CRM) Certificate
Course ID Course Name Credit Hours
CYB - 504 Best Prac Vulnerability Assess 3
CYB - 500 Fed Policy and Risk Mgmt 3
CYB - 501 Cybersecurity Risk Mgmt 3
CYB - 502 Cybersecurity Practicum I 3
CYB - 503 Cybersecurity Practicum II 3

Students assess system vulnerabilities, conduct controlled exploitation and produce and communicate an effective remediation plan by applying the professional Common Body of Knowledge (CBK) for both the Certified Ethical Hacker (CEH) and EC-Council Certified Security Analyst (ECSA) certifications.

Students review and analyze compliance implications of selected federal cybersecurity policies with a specific focus on the NIST Risk Management Framework.

Students apply the NIST Risk Management Framework (RMF) by completing deliverables and communicating the results of a NIST RMF project. In addition, students review the Common Body of Knowledge (CBK) of the Certified Authorization Professional (CAP) certification.

Students develop the capability to support the conducting of an assessment and authorization project requiring the use of security controls. Students will then document results.

Students develop the capability to provide recommendations based on the results of an assessment and authorization project which requires the use of security controls.

Cybersecurity Incident and Insider Threat Management (CIITM) Certificate
Course ID Course Name Credit Hours
CYB - 505 Career Adv Private and Federal 3
CYB - 506 Insider Threat Prevention I 3
CYB - 507 Insider Threat Prevention II 3
CYB - 508 Function of Incident Mgmt 3
CYB - 509 Cybrsec Ldrship Best Practices 3

Students analyze cybersecurity career trends in order to develop their career objectives and to identify competencies, specialized areas, and knowledge skills and abilities (KSAs) required for successful attainment of their objectives. Based on this analysis, students begin developing their cybersecurity career advancement plans.

Students assess the factors affecting the prevention and detection of insider cybersecurity personnel threats through the security investigation process.

Students continue to examine how the security investigation process relates to preventing and/or detecting insider cybersecurity personnel threats. Utilizing the assessment completed in 6051, students finalize and submit a security clearance application.

Students analyze the function and components of incident management in cybersecurity risk management by developing an incident management requirements plan which utilizes continuous monitoring. Plan components include rapid incident detection, containment, impact mitigation, impact, and secure restoration of operations.

Students utilize the 10 domains of the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK) as a framework for helping organizations integrate stronger security protocols by determining the best response to specific scenarios.

Cybersecurity Leadership Best Practices (CLBP) Certificate
Course ID Course Name Credit Hours
CYB - 504 Best Prac Vulnerability Assess 3
CYB - 500 Fed Policy and Risk Mgmt 3
CYB - 501 Cybersecurity Risk Mgmt 3
CYB - 502 Cybersecurity Practicum I 3
CYB - 509 Cybrsec Ldrship Best Practices 3

Students assess system vulnerabilities, conduct controlled exploitation and produce and communicate an effective remediation plan by applying the professional Common Body of Knowledge (CBK) for both the Certified Ethical Hacker (CEH) and EC-Council Certified Security Analyst (ECSA) certifications.

Students review and analyze compliance implications of selected federal cybersecurity policies with a specific focus on the NIST Risk Management Framework.

Students apply the NIST Risk Management Framework (RMF) by completing deliverables and communicating the results of a NIST RMF project. In addition, students review the Common Body of Knowledge (CBK) of the Certified Authorization Professional (CAP) certification.

Students develop the capability to support the conducting of an assessment and authorization project requiring the use of security controls. Students will then document results.

Students utilize the 10 domains of the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK) as a framework for helping organizations integrate stronger security protocols by determining the best response to specific scenarios.

MBA Core Courses
Course ID Course Name Credit Hours
MBA - 500 Org Leadership and Dev 3
MBA - 520 Integrated Marketing Comm 3
MBA - 510 Managerial Res Meth & Design 3
MBA - 505 Global Economics 3
MBA - 515 Applied Business Ethics 3
OMG - 551 Strategic Human Resource Mgmt 4
MBA - 530 Managerial Finance and Acctg 3
MBA - 605 Operations & Technology Mgmt 3
MBA - 705 Managerial Appl Portfolio 1

This course introduces leadership in dynamic, changing organizations where customers change, technologies shift, and work processes evolve. In this course students will examine how leaders develop themselves and others and create alignment as an organization changes to meet the needs of the future

This course will develop marketing strategy and executing diverse communication tactics critical to all enterprises. Consistency in both processes and messages is important. Students will analyze business scenarios and determine strategic objectives, target markets and messages, as well as demonstrate to use and how to apply multiple marketing tactics.

This course examines the various research methodologies used in organizational settings. It provides an overview of quantitative and qualitative methodologies including research design, data collection and analysis, interviewing, case studies, and action science. The philosophy, ethics, and politics of management research are introduced. Students will critique published research, write a literature review, and design research studies.

The course will apply economic theory to develop a framework to analyze and predict trade, exchange rate, environmental, health, labor and other policies. Strategies will encompass the interaction of American and global economic institutions and policy making entities such as the United States Trade Representative, Congress, Federal Reserve, WTO, and the European Union.

This course will review and analyze popular models of ethical decision making. Readings, case studies, and special presenters will provide opportunities to investigate current ethical issues facing leaders and managers in business and organizational settings as well as critically apply various ethical theories and decision-making frameworks. Literature relative to Christian vocation, applied ethics, and value-centered leadership will be explored. Student papers and presentations will demonstrate the integration of a personal and vocational ethic.

This course will emphasize the strategic nature of human resources management (HRM). It will focus on the importance of Alignment of HR responsibilities with the organization's mission and HR's role as a partner in planning and executing the business plan.

This course will examine the framework and systems of current accounting and finance principles including preparation of financial statements, accounting cycles and balance sheet classifications. Students will apply these principles along with ethical responsibility and critical thinking skills to management practices of business decision making and strategic planning.

This course will examine value-chain functions such as product-process design, quality management, supply chain management and workforce management in order to understand the resource-based view of strategic advantage for the organization. Students will examine strategic management of operations utilizing to support the value-chain functions of operations management.

The MAP is a process in which students summarize, synthesize and demonstrate knowledge, skills, and competencies as organizational managers and leaders. Students will draw from their MBA course work, career experiences and synthesizing activities to build a customized professional portfolio.

Those applying to either the CYBERSECURITY GRADUATE CERTIFICATE or CYBERSECURITY MBA PROGRAM should submit:

  • Online Application
  • Official transcript(s) from an accredited institution stating the conferral of a Bachelor’s degree or an equivalent.
  • Official transcripts showing an advanced degree beyond a bachelor’s degree may be submitted in lieu of the bachelor’s transcript if applicable.
  • Typed personal statement that answers the questions listed below. Completed statements should be labeled with your name, academic program and your contact information and submitted via email (see below): *each question should be answered in a minimum of 300 words (1 page).
    1. Why are you choosing to pursue a graduate program at this time in your career, and what are you hoping to accomplish by doing so?
    2. What strengths do you feel make you a strong candidate for the program?
    3. Describe a past or present personal/professional experience that you believe positively influenced your potential to succeed in a graduate program.
  • Current resume demonstrating three years of relevant experience.
  • Interview

Technology Requirements

Students enrolling in a graduate program must have access to a computer that meets Concordia University’s technology requirements. Contact Concordia’s Help Desk at helpdesk@csp.edu or 651-641-8866 with any questions regarding these requirements.

Concordia University Technology Requirements

Meet Your Professors

Mr. Craig Lien Associate Dean of the College of Business, Department of Graduate Business Administration Chairperson, Professor of Graduate Business Administration

A lifelong entrepreneur Craig has a special passion for working with emerging growth organizations.

Dr. Richard Brynteson Professor of Organizational Management

Dr. Brynteson pushes for innovation, creativity and efficiency in order to build upon strategic capabilities.

Career Potential

Students completing the MBA in Cybersecurity prepare to:
Demonstrate the relevance of enterprise-wide management functions for meeting cybersecurity management challenges.
Develop and demonstrate professional communication skills and tools to address risk and incident management needs.
Demonstrate collaborative competencies with diverse populations in multiple settings for addressing cybersecurity management challenges.
Demonstrate the ability to analyze information through comprehensive secondary research to solve cybersecurity management problems.
Demonstrate competence in using analytical tools and applications to develop analyses and solutions in support of cybersecurity management requirements.
Compile, analyze, and assess the applicability of best practices in addressing information security issues relevant to the cybersecurity community.
Integrate principles and techniques of risk analysis, project planning and change management in the development of information security strategies.

  • Chief Information Security Officer (CISO)
  • Computer Security Incident Responder
  • Forensics Expert
  • Network Security Engineer
  • Security Analyst
  • Security Engineer

Related Programs
Discover Similar Programs at CSP

Certificate in Computer Science

Credit Hours: 12

Next Steps

Transfer Ready For A New Direction? Find It Here. Learn more about our Concordia Saint Paul transfer advantage program Learn More
Tuition Your Education is an Investment The cost of higher education in time, money, and effort makes it an important investment in your future. Learn More
Visit We'll work around your schedule We have tours available Monday - Friday several times a day throughout the semester and during the summer. Visit Us