Master of Security Management
B401, 713-221-8252
MDCOBGradAdvising@uhd.edu
The Master of Security Management (MSM) is an innovative program developed in collaboration with leaders in security management and delivered completely online. The goal of the program is to provide students with the knowledge and skills necessary to address the continuously changing security environment. The MSM is for individuals who have a goal of leadership in the security industry and are able to demonstrate professional competency and commitment to their organizations and the community.
Certificates
The Master of Security Management Degree requires students complete seven core of courses (21 semester hours) and five courses in a chosen certificate of either Cybersecurity or Enterprise Security.
The MSM is a two year, completely online, cohort style program. There are two program starts, one in fall and spring.
Admission Requirements
Admission is competitive and selective, and is designed to identify applicants who have the ability, interest, and qualities necessary to complete the program, with the potential to contribute to the field of security management.
Mandatory Admission Requirements
To be eligible for admission to the MSM, or Cybersecurity Certificate an applicant will be required to present the following:
- A Baccalaureate degree conferred by a regionally-accredited institution.
- Official transcripts, submitted to the Office of Admissions, from all degree granting institutions.
- Complete the UHD online graduate application.
- A letter describing the applicant’s professional background and desire to obtain this particular degree.
- A well-written, current resume that describes the candidate’s academic and professional background.
- Two of letters of recommendation from individuals acquainted with your professional work and academic potential may be required
- For graduates of universities in a country where English is not the native language: minimum IBT TOEFL scores of 81 or an IELTS score of 6.5 or higher.
Preferences
- Undergraduate GPA of 3.0, or higher, on a 4-point scale for the final 60 semester hours of study.
- Applicant’s letter should be a well-written personal statement that reviews his or her educational and professional history and provides a compelling case for why he or she should be admitted to the MSM or Cyber Security program.
- The resume should be a well-written resume that shows the applicant’s professional background.
- Optional letters of recommendation should come from persons sufficiently acquainted with the student to be able to comment on the potential to successfully complete a graduate program, strongly support the candidates admission and discusses their professional and/or academic background (a combination of the two is preferred).
Admissions Process
- Once an admissions file is complete it is forwarded from the Graduate Admissions Office to the Marilyn Davies College of Business Graduate Studies Office for consideration. The MSM Graduate Application Committee will review an applicant’s file to determine if the applicant’s academic and professional background is suitable for admission into the MSM. This review may include an interview either face-to-face or by phone. Upon completion of the review, the Marilyn Davies College of Business Graduate Studies Office will communicate to the student as to whether or not they have been accepted.
- Upon acceptance a member of the Marilyn Davies College of Business Graduate Studies Office will send notification in writing to the student stating whether or not they have been accepted. The letter gives the student instructions on attending an orientation for new students, contacting the advisor concerning the next step, and other important information.
Program Outcomes
Graduates of the MSM-Security Management program will be able to:
- Analyze security risks in an organizational environment
- Apply an appropriate remediation strategy to mitigate risks
- Develop security governance processes with cross-functional considerations that address the documentation of policies and procedures
- Apply critical analyses in the application of forensically obtained data to investigations in digital crime
- Use effective communication to address implications of a lapse in security
- Establish foundational elements of a comprehensive Cybersecurity program
- Apply solutions to protect critical systems and data