Skip to main content

Master’s of Cybersecurity Strategy & Information Management (CISM) Program Sampler

Sample the Master’s Program Today

Amazon Web Services (AWS)
Booz Allen Hamilton
CACI
Deloitte
EY
Guidehouse
Leidos
National Center for Missing and Exploited Children (NCMEC)
Noblis
Northrop Grumman
The International Criminal Police Organization (INTERPOL)

Cybersecurity and Infrastructure Security Agency (CISA)
Department of Defense
Department of Homeland Security
Diplomatic Security Service (DSS)
Federal Bureau of Investigation
Police Departments
U.S. Coast Guard
U.S. Customs and Border Protection
U.S. Marshals Service
U.S. Secret Service

In today’s world, where cybercrime and terrorism are rapidly increasing, cybersecurity has become the foremost national security concern. Despite the growing threats, there is a critical shortage of skilled cybersecurity leaders who are equipped to tackle these complex challenges. Addressing this gap is essential to securing our digital future.

The George Washington University's master's degree program in Cybersecurity Strategy and Information Management is designed to prepare students to fill this crucial need. Developed in collaboration with key government, military, and law enforcement organizations, the program focuses on the legal, policy, and leadership aspects of cybersecurity. 

In as few as 16 months, students learn from top industry experts about the strategic approaches and best practices needed to protect critical information and maintain the security of global digital infrastructure. Upon completion, graduates are prepared to lead and innovate in the fight against the world’s most pressing cyber threats.

By the end of these comprehensive course samplers, learners will have developed the ability to:

  • Cyber Investigation: Framework and tools for investigating cybercrime.
  • Digital Forensics: Introduction to digital forensic science.
  • Compliance and Risk Management: Data protection and risk management.
  • Incident Response: Detecting and responding to security threats.
  • Principles of Cybersecurity: Fundamentals of information security and assurance.
  • Ethics, Law, and Policy: Ethical, legal, and policy issues related to technology.
  • IP Security and VPN Technology: Network security risks and defensive technologies.
  • Network Security: Security for networks and network technology.
  • Cloud Security: Secure cloud-based services design and management.
  • IT Security System Audits: IT system audit procedures and compliance.
  • IT Security Defense Countermeasures: Defense countermeasures for system vulnerabilities.
  • Project Management in IT: Concepts of project management in IT.
  • Intrusion Detection and Vulnerability Management: Implementation and testing of intrusion detection systems (IDS).
  • Data Communication and Networking Technologies: Overview of enterprise networking technologies.
  • Cyber Attack Tools and Techniques: Introduction to attack tools and techniques.
  • Information Systems Protection: Information security and cyber conflict fundamentals.
  • Cybersecurity Law and Policy: Legal aspects of federal response to cyber threats.

Connie Peterson Uthoff is the Program Director of the Cybersecurity Strategy and Information Management Program. A frequent contributor to the United States Cybersecurity Magazine, she explores areas related to cyber intelligence, risk, critical infrastructure cyber threats, nation state cyber aggression and cybersecurity in the fourth industrial revolution.

She is the author of the book Cyber Intelligence: Actors, Policies and Practices, chapter author of Strategic Cyber Intelligence: An Examination of Practices Across Industry, Government and Military,  and co-author of the chapter A National Strategy for the United States Cyberspace (with Maj. General Harold ‘Punch’ Moulton (retired) and Vice Rear Admiral James Stavridis (retired)). 

She has participated in and led cyber tabletop exercises in the U.S. and Europe, and has created scenario-based courses and workshops at the master's level for professional students. A cyber scenario created by Ms. Uthoff was highlighted at the Emerge Tech Conference and profiled in the College’s newsletter, “CPS Faculty Shine at Cutting-Edge Tech Conference."

With over 20 years of professional security experience, she continues to create cyber seminars for professional programs and currently instructs in areas related to cyber intelligence, risk, incident response and cybersecurity. 

Ms. Uthoff sat on the Board of Directors for an agricultural management corporation for over 15 years. 

More Information on Program

Thank you for your interest in the George Washington University's College of Professional Studies. Please fill out the request for information form below and we will be in touch shortly

Request Information