Management Information Systems - Cybersecurity Concentration
The concentration in cybersecurity equips you with the knowledge, skills and abilities to defend organizations from current and future threats to information assurance.
Preparing You For Success
MIS blends business knowledge with information systems tools. This background equips you to use technology to solve business-related issues. The concentration in cybersecurity gives you hands-on experience with both the technical and behavioral aspects of information assurance. Courses give you a foundation in skills needed to manage the security of information systems and those who interact with them. To complete the degree, you participate in a semester-long consulting project for a local business or nonprofit organization. In addition, the concentration in cybersecurity includes performing a security assessment for a local business.
By the time you graduate, your experiences may include:
- Professional development and networking through the Association of Information Technology Professionals (AITP)
- Mentoring relationships with faculty who are active in local business development
- Internships across the country
- Access to the MIS lab and software like Kali Linux, Maltego and Wireshark
Making Your Mark
MIS majors are in demand for some of the nation’s fastest growing careers in cybersecurity, such as cybersecurity analyst, ethical hacker, and network security administrator. In recent years, all Bradley graduates found jobs or continued to graduate school within six months of graduation. They are working for companies such as Accenture, Kellogg, Discover, Edward Jones and State Farm Insurance.
Required Courses - 19 hrs.
- MIS 272: Business Analytics Software and Applications I - 3 hrs.
- MIS 276: Ecommerce Strategy and Applications - 3 hrs
- CS 101: Introduction to Programming - 4 hrs
- CS 102: Data Structures - 3 hrs
- MIS 375: Business Systems Analysis and Design - 3 hrs
- MIS 478: MIS Capstone Consulting Project - 3 hrs
Elective Courses (choose three) - 9 hrs.
- MIS373: Applied Networking Theory - 3 hrs
- MIS379: Information Systems Security - 3 hrs
- MIS 380: Advanced Ethical Hacking - 3 hrs
- Course approved by the Department Chair - 3 hrs
Students must also complete Foster College's business core.