Online MBA in Cybersecurity Technology - Saint Mary's University of Minnesota Skip to Main Content
page-builder.php

Online MBA: Cybersecurity Technology Specialization

Learn How to Protect Digital Assets

Develop the skills to introduce and maintain cybersecurity and technology requirements for organizations across various industries with the online MBA in Cybersecurity Technology from Saint Mary’s University of Minnesota. The program delivers a deep understanding of cybersecurity infrastructure, cloud architecture, programming/ethical hacking techniques, and advanced network security applications.

Complete the program equipped with the skills to protect information resources, identify security vulnerabilities, and plan for potential cyberattacks on networks while preparing for the CySA+/Security+/Network+ and other CompTIA and CISSP/CISM certifications.

Read More

39

credits

$775

per credit

1.5 – 2 years

completion time*

SeptOctJan MarMayJune

start dates

Online

39

credits

$775

per credit

1.5 – 2 years

completion time*

SeptOctJan MarMayJune

start dates

Online

Why Choose the Online MBA in Cybersecurity Technology?

Earning your MBA in Cybersecurity Technology online allows you to study on your schedule from the location of your choice. Whether you’re on the go or prefer to study in the comfort of your home, our online learning platform offers the flexibility you need to access your courses from wherever you choose. You’ll explore a challenging curriculum and receive personalized instruction from faculty on your time.

Specialization Highlights

  • No letters of recommendation required
  • Five specialization courses
  • CISSP and CISM certification preparation
  • Network+, Security+, and CySA+ certification preparation
  • Official CompTIA Authorized Academic Partner

Required Course List & Requirements

Coursework in the online MBA in Cybersecurity Technology is structured to accommodate those who want a more nuanced introduction to the hard technology skills necessary for success in the field. The five courses (15 credits) explore data privacy, ethical hacking, and network security to give you a more real-world understanding of your responsibilities in the industry.

View Program Curriculum

  • This course provides an overview and foundational understanding of concepts essential to the cybersecurity professional to evaluate best practices in implementing security systems within the enterprise. This course covers key bodies of knowledge in security, privacy, and compliance. Topics include security planning, risk management, security technologies, basic cryptography, digital forensics, application security, intrusion detection and prevention, physical security, and privacy issues.

    Upon completion of the course, students are expected to be able to do the following:

    • Apply the principles of information technology security
    • Analyze situations of computer and network usage from a security perspective to develop a security mindset
    • Explain information security’s importance in our increasingly computer-driven world
    • Identify appropriate strategies to ensure confidentiality, integrity, and availability of information
    • Express management’s role in the development, maintenance, and enforcement of an information security program
    • Describe the relationship among laws, regulations, and professional issues in information security
    • Articulate how cryptography serves as the central language of information security
    • Analyze how physical security fits within an information security program
    • Define the roles of computer forensics in information security
    • Apply basic software tools for assessing the security posture of a business
    • Explain how issues of privacy relate to business information security

  • This course introduces the domains of cloud security in both theoretical and practical applications. Students are presented with a structured approach to cloud architecture and design requirements along with applications involved in developing layered cloud security strategies. Students evaluate the data organization, data security, cloud applications, operations, and compliance used in deploying cloud-based security architecture that supports the objectives of the enterprise. The course also prepares students for the CompTIA Cloud+ Certification Exam.

    Upon completion of the course, students are expected to be able to do the following:

    • Create a plan for an organization’s strategic security objectives
    • Apply architectural frameworks and design principles
    • Identify methods, roles, responsibilities, and accountabilities of personnel governing compliance of security policies
    • Evaluate data security strategies and data classification controls
    • Differentiate cloud-based security models

    Prerequisite: CYBR 600 

  • This course provides a comprehensive overview of network security and intrusion detection. Students focus on methods for securing networks and utilize these methods in basic architectural design. Students apply these methods into a cohesive network security strategy. Topics include investigation of areas such as data analysis and interpretation, threat/intrusion detection, vulnerability management, incident response, and security architecture. The course also prepares students for the CompTIA CySA+ Certification Exam.

    Upon completion of the course, students are expected to be able to do the following:

    • Implement security operations and monitoring design principles in network architectures.
    • Integrate software and systems security secure network components through knowledge of hardware, transmission media, cryptography, network access, honeypot, endpoint security, and content-distribution networks.
    • Implement secure communication channels according to design that involve voice, multimedia collaboration, remote access, data communications, and virtualized networks.
    • Specify incident response and forensic procedures to recover from attacks on network systems.
    • Conduct logging and monitoring activities to support intrusion detection and prevention, and event management.
    • Identify threats and vulnerabilities in networked systems.
    • Understand compliance and assessment practices.

  • This course includes a study of theoretical and practical aspects of network and web application penetration testing. Students are able to evaluate the security of a network or system’s infrastructure and outline how hackers find and attempt to exploit any vulnerabilities. Included in the course are in-depth details on ethical hacking, including reconnaissance, vulnerability assessment, exploitation, maintaining access, and covering tracks. Current tools and methodologies are stressed.

    Upon completion of the course, students are expected to be able to do the following:

    • Explain the regulatory/legal requirements and rationale for penetration testing.
    • Interpret and differentiate cyber threats and exploits in a penetration testing context
    • Distinguish key phases of ethical hacking: reconnaissance, scanning, gaining access, maintaining access, and covering the tracks
    • Perform protocol analysis using packet captures and analysis data using a network sniffer
    • Investigate and uncover network devices, operating systems, and services
    • Discover network security issues using an intrusion detection tool
    • Leverage penetration testing applications to recognize information targets across operating systems and services
    • Implement scripts and tools to assist in penetration testing
    • Deploy and test exploits targeting operating systems and services
    • Identify and exploit various vulnerabilities in web applications

  • The course focuses on core programming concepts such as classes and objects, controlling flow, batch processing, and error handling while working in the context of data processing, analysis, and visualization. The course explores a variety of Python packages and integration for project development. Using Python to automate workflows and create custom visualizations is discussed, and students are able to explore tabular data, spatial data, cybersecurity, and data science applications of Python.

    Upon completion of the course students are expected to be able to do the following:

    • Develop custom visualizations that communicate data and results of an analysis
    • Respond to specific scripting requirements to address analytical problems and improve workflows
    • Apply the concepts and logic of object-oriented programming

Tuition and Fees

A college education is invaluable. You can take it wherever you want to go or as far as you want to go. The cost of quality education should not get in the way of reaching your goals. Here at Saint Mary’s, we are committed to providing a quality education that is accessible and affordable.

Explore cost breakdowns for tuition and other fees of the Online MBA Program.

Gain the Skills To Stand Out for Growing Cybersecurity Careers

As more employers aim to protect their sensitive information, there has been a palpable rise in the need for trained, qualified cybersecurity professionals in practically every industry. Employers from the private sector to nonprofit organizations and governmental agencies are looking for help securing their data. With the online MBA in Cybersecurity Technology, you can expect to pursue the following positions.

Cybersecurity analyst

[Blank]

Cybersecurity engineer

[Blank]

Data security analyst

[Blank]

Information security analyst

[Blank]

Information security manager

[Blank]
29%

employment growth for information security analysts from 2024 to 2034—much faster than average1

514,359

cybersecurity job listings in the U.S. from May 2024 through April 20252

Sources and Disclaimer

  1. Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, “Information Security Analysts.” Retrieved September 11, 2025, from https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm.
  2. CyberSeek. “CyberSeek expands cybersecurity workforce data coverage and enhances user experience.” June 2, 2025. Retrieved September 11, 2025, from https://www.cyberseek.org/docs/06-02-2025_CyberSeek_June_2025.pdf.

*Completion times may vary.