Master’s of Cybersecurity Strategy & Information Management (CISM) Program Sampler
Learn New Ways to Stop Threats in their Syntax!
Our CSIM program sampler is crafted in collaboration with leading government, military, and law enforcement organizations and is specifically designed for working professionals aiming to advance their careers.
The program delves deep into the complexities of risk management, policy formulation, and intelligence-driven cyber defense, equipping you to become a strategic leader in the ever-evolving field of cybersecurity.
Under the guidance of top experts, you will learn the critical strategies and practices required to protect vital information and ensure the security of our global digital infrastructure.
The future started yesterday, so don’t let it pass you by.
Time to Invest in You
Master’s Program Sampler
Our Cybersecurity and Information Management master’s program is designed to prepare the next generation of cybersecurity leaders with a comprehensive understanding of the evolving landscape of digital threats. This cutting-edge curriculum goes beyond the basics, offering a deep dive into both national and international cybersecurity policies and practices relevant to public and private sectors.
Throughout the program, students will explore critical areas such as risk management, policy development, and intelligence-led cyber defense strategies. You will learn how to identify and mitigate emerging threats, develop and implement robust security policies, and understand the complex interplay between technology, information management, and security frameworks. By engaging with real-world scenarios and case studies, you will gain practical insights into protecting critical infrastructure, managing cyber crises, and responding effectively to sophisticated cyberattacks.
Under the mentorship of industry experts, you will build the skills necessary to navigate and lead within the complex digital environment, making strategic decisions that safeguard vital information and maintain the integrity of global digital networks. This program equips you to become a proactive, forward-thinking leader capable of addressing the cybersecurity challenges of today and tomorrow.
Sample the Master’s Program TodayCareer Growth Potential
Our Cybersecurity Strategy and Information Management (CSIM) program offers exceptional opportunities for career growth, whether you’re entering the field or looking to advance as an experienced professional. Through our unique program samplers, you’ll gain valuable insights into the latest cybersecurity strategies, risk management techniques, and policy development practices.
Designed to help you stay ahead in this dynamic and constantly evolving field, our program equips you with the expertise needed to navigate complex cyber challenges and accelerate your career to the next level.
Amazon Web Services (AWS)
Booz Allen Hamilton
CACI
Deloitte
EY
Guidehouse
Leidos
National Center for Missing and Exploited Children (NCMEC)
Noblis
Northrop Grumman
The International Criminal Police Organization (INTERPOL)
Cybersecurity and Infrastructure Security Agency (CISA)
Department of Defense
Department of Homeland Security
Diplomatic Security Service (DSS)
Federal Bureau of Investigation
Police Departments
U.S. Coast Guard
U.S. Customs and Border Protection
U.S. Marshals Service
U.S. Secret Service
Master's Program
In today’s world, where cybercrime and terrorism are rapidly increasing, cybersecurity has become the foremost national security concern. Despite the growing threats, there is a critical shortage of skilled cybersecurity leaders who are equipped to tackle these complex challenges. Addressing this gap is essential to securing our digital future.
The George Washington University's master's degree program in Cybersecurity Strategy and Information Management is designed to prepare students to fill this crucial need. Developed in collaboration with key government, military, and law enforcement organizations, the program focuses on the legal, policy, and leadership aspects of cybersecurity.
In as few as 16 months, students learn from top industry experts about the strategic approaches and best practices needed to protect critical information and maintain the security of global digital infrastructure. Upon completion, graduates are prepared to lead and innovate in the fight against the world’s most pressing cyber threats.
Learning Outcomes
By the end of these comprehensive course samplers, learners will have developed the ability to:
- Cyber Investigation: Framework and tools for investigating cybercrime.
- Digital Forensics: Introduction to digital forensic science.
- Compliance and Risk Management: Data protection and risk management.
- Incident Response: Detecting and responding to security threats.
- Principles of Cybersecurity: Fundamentals of information security and assurance.
- Ethics, Law, and Policy: Ethical, legal, and policy issues related to technology.
- IP Security and VPN Technology: Network security risks and defensive technologies.
- Network Security: Security for networks and network technology.
- Cloud Security: Secure cloud-based services design and management.
- IT Security System Audits: IT system audit procedures and compliance.
- IT Security Defense Countermeasures: Defense countermeasures for system vulnerabilities.
- Project Management in IT: Concepts of project management in IT.
- Intrusion Detection and Vulnerability Management: Implementation and testing of intrusion detection systems (IDS).
- Data Communication and Networking Technologies: Overview of enterprise networking technologies.
- Cyber Attack Tools and Techniques: Introduction to attack tools and techniques.
- Information Systems Protection: Information security and cyber conflict fundamentals.
- Cybersecurity Law and Policy: Legal aspects of federal response to cyber threats.
Meet the Program Director
Connie Peterson Uthoff is the Program Director of the Cybersecurity Strategy and Information Management Program. A frequent contributor to the United States Cybersecurity Magazine, she explores areas related to cyber intelligence, risk, critical infrastructure cyber threats, nation state cyber aggression and cybersecurity in the fourth industrial revolution.
She is the author of the book Cyber Intelligence: Actors, Policies and Practices, chapter author of Strategic Cyber Intelligence: An Examination of Practices Across Industry, Government and Military, and co-author of the chapter A National Strategy for the United States Cyberspace (with Maj. General Harold ‘Punch’ Moulton (retired) and Vice Rear Admiral James Stavridis (retired)).
She has participated in and led cyber tabletop exercises in the U.S. and Europe, and has created scenario-based courses and workshops at the master's level for professional students. A cyber scenario created by Ms. Uthoff was highlighted at the Emerge Tech Conference and profiled in the College’s newsletter, “CPS Faculty Shine at Cutting-Edge Tech Conference."
With over 20 years of professional security experience, she continues to create cyber seminars for professional programs and currently instructs in areas related to cyber intelligence, risk, incident response and cybersecurity.
Ms. Uthoff sat on the Board of Directors for an agricultural management corporation for over 15 years.
More Information on ProgramConnie Peterson Uthoff
Program Director
Upcoming Homeland Security Events
Thank you for your interest in the George Washington University's College of Professional Studies. Please fill out the request for information form below and we will be in touch shortly