The minimum graduation requirement is 30 credits (15 courses) including 7 required courses (14 credits) and 8 elective courses (16 credits). Each course carries two credits. Students can take up to 34 credits without extra costs.

Subject to the approval of the MScICSM Academic Director, students with CISSP, CISM or GCIH or other relevant professional certifications may apply for course substitution of no more than four courses (8 credits) in the program.

Required Courses (14 credits)

  • ISOM 5070 Cyber Security Risk Management

    This course provides students with a comprehensive understanding of how business organizations assess, evaluate and monitor information and cyber security risks and threats. With the identified risk and vulnerabilities, students will also learn how to plan, develop and execute information security strategies and framework that align with organizational goals and objectives. Topics include risk assessment and analysis, risk monitoring and reporting, information security strategy and strategic planning.

  • ISOM 5100 Information Strategy and Management

    Examination of economic principles of information systems strategy, highlighting application of economics and management principles to the unique environment of information services and information-enabled competition.

  • ISOM 5160 Python Programming for Business Applications

    Python is the fastest-growing programming language, and its business applications are vast. This course starts from ground zero, with no programming background required. Students will learn via case studies using real-world data sets and step-by-step in-class demos. The course is a combination of introducing coding fundamentals such as data type, variables, basic operator, flow control, data structure, and applying Python in collecting, processing, and interpreting data in business contexts.

  • ISOM 5180 Applied Network Management

    In an interconnected economy, the management of network applications becomes increasingly important. This course provides an overview of the basic networking management principles and concepts. Both theoretical knowledge and practical training in applications of network management (e.g. Cisco) are included.

  • ISOM 5280 Computer and Internet Security Management

    In-depth study of information systems security in business organizations. Basic principles and functions of secure systems reviewed; management policy, plans and programs discussed.

  • ISOM 5360 Information Systems Auditing

    This course introduces the fundamental concepts of information systems (IS) auditing. Topics include IS control and assurance, COBIT, business continuity planning, protection of information assets, auditing the network infrastructure, physical access exposures and controls, and disaster recovery management.

  • ISOM 5460 Project Management

    This course covers the essential project management skills to ensure successful implementation of high-technology projects. Topics include investment decisions, resource planning, budgeting, scheduling, outsourcing, and risk assessment and control, as major components of the PMBOK (Project Management Body of Knowledge).

Elective Courses (16 credits)

  • CSIT 5710 Cryptography and Cybersecurity

    The design and analysis of encryption schemes, public-key cryptography, digital signatures, user authentication, data integrity, cryptographic protocols, public-key infrastructure, key management, systems security, network and Web security.

  • CSIT 5740 Introduction to Software Security

    This course serves as an introduction to the concept of software security. The students will learn fundamental concepts on software security, security mechanisms in software and operating systems, secure coding guidelines and exploits, and advanced analysis techniques for security. Students will also have hands-on experience in deploying security attacks and analysis of real world security vulnerabilities.

  • ISOM 5040 Incident Response Management

    This course provides students with fundamental concepts of how business organizations address cyber-attacks. The course delves into the concepts of incident management, incident classification and categorization, tools and techniques in managing incidents, procedures involved in managing key elements when developing a robust Incident Response Plan.

  • ISOM 5060 Protection of Information Assets

    This course covers the fundamental principles and practices of protecting information assets of business organizations. Multiple aspects of protecting information assets of business organizations are covered. Students will gain a comprehensive understanding of auditing and evaluating business organizations in safeguarding information assets, ensuring data privacy and security, and managing risks associated with information systems in business organizations.

  • ISOM 5080 Digital Forensics

    The course provides students with a comprehensive understanding of computer forensics and digital forensic investigation. Topics include fundamental principles of conducting digital forensics acquisition, investigation, collecting and preserving digital evidence, analysis of various kinds of digital evidence, tools and techniques to perform a complete forensic investigation, documenting a digital forensic investigation, case studies, as well as the latest trends of digital forensics.

  • ISOM 5090 Security Assessment and Protection

    In today’s digital landscape, understanding cybersecurity is crucial due to the rising complexity of cyber threats. This course equips IT management with practical frameworks for conducting cybersecurity assessments, including Security Risk Assessment and Audit (SRAA), penetration testing, and vulnerability scanning. Students will explore various assessment methodologies, learning when and how to apply them effectively. Through hands-on lab experiences, they will delve into techniques like network scanning, penetration test, web penetration tests, and develop skills to evaluate security assessments and create a comprehensive security assessment framework. Ultimately, this course aims to empower students to proactively identify and mitigate vulnerabilities, ensuring better protection of organizational assets and compliance with regulatory standards.

  • ISOM 5140 Cloud Security Management

    This course explores the essential concepts of the cloud ecosystem, such as various kinds of cloud service models, the threats of cloud infrastructures and developing a cloud security framework and techniques used to safeguard the cloud data and operations of business organizations.

  • ISOM 5190 Advanced Network Security Management

    This course offers a comprehensive overview of advanced network administration and security management. Students will explore key concepts and practices essential for effectively managing and securing modern network environments. Through a blend of theoretical knowledge and hands-on experience, participants will develop the skills necessary to navigate the complexities of network technologies and enhance organizational security. By the end of the course, students will be well-prepared for careers in network management and security.

  • ISOM 5220 FinTech Regulation and Compliance

    This course provides students with frameworks, concepts, and background to understand the role of regulation, compliance and assurance in FinTech markets from both technology and business perspectives. The course will also examine the perspectives of government officials, investors, managers, and consumers in how they benefit from, guide, and influence the evolution of regulation and associated compliance activities.

  • ISOM 5230 Privacy Management in the Digital Age

    This course provides an overview of privacy management in the digital age. It covers the fundamental concepts and dimensions of privacy, the regulatory requirements, and various management tools to comply with data protection laws and meet public expectation. Through the analysis of privacy impacts on a number of new technologies such as artificial intelligence, blockchain, cloud, data analytics and their applications, students may learn how to respect individuals’ privacy when applying technologies.

  • ISOM 5260 Fundamentals of Database Management

    Introduction to database management systems with emphasis on business applications. Technical and administrative considerations in database implementation. Students implement a business system using a commercial-off-the-shelf software package.

  • ISOM 5290 Information Systems Analysis and Design

    This course provides an overview of the main aspects of information systems (IS) development with a focus on defining/modeling the business requirements following the Unified Modeling Language (UML) standard. Major topics include use case modeling, object-oriented modeling, data flow and process diagramming, and the key management issues and methodologies in IS development.

  • ISOM 5310 Transforming Business with Artificial Intelligence

    The use of artificial intelligence (AI) becomes an emerging trend in various business areas and industries, as its power to transform operations, customer experiences, and management is exponential. Harnessing AI’s potential for competitive performance requires a new type of professionals, who understand how machine learning (ML) works, what they can deliver and how they can be applied into different business context. This course is intended to bridge the gap between the business strategy and technical how-to. Through lectures, case discussion, and experiments in real-world data sets, students will gain a broad understanding of ML and AI concepts, explore the state-of-art use cases of AI technology in business, identify new opportunities and potential risks brought by AI, and recognize how to effectively communicate with the data science and machine learning team.

  • ISOM 6000S Blockchain Applications in Decentralized Finance

    This course discusses blockchain, also known as distributed ledger technology (DLT), and its business applications in the world of decentralized finance (DeFi). The course not only provide a basic understanding of blockchain/DLT, but students will also learn about different DeFi companies and able to develop their own DeFi business models after the program.

  • ISOM 6010 Special topics (e.g., Criminal Psychology)

    Advanced topics Information and Cyber Security Management. Topics vary with recent developments and current interest.

Course Descriptions

Required Courses (14 credits)

This course provides students with a comprehensive understanding of how business organizations assess, evaluate and monitor information and cyber security risks and threats. With the identified risk and vulnerabilities, students will also learn how to plan, develop and execute information security strategies and framework that align with organizational goals and objectives. Topics include risk assessment and analysis, risk monitoring and reporting, information security strategy and strategic planning.

Examination of economic principles of information systems strategy, highlighting application of economics and management principles to the unique environment of information services and information-enabled competition.

Python is the fastest-growing programming language, and its business applications are vast. This course starts from ground zero, with no programming background required. Students will learn via case studies using real-world data sets and step-by-step in-class demos. The course is a combination of introducing coding fundamentals such as data type, variables, basic operator, flow control, data structure, and applying Python in collecting, processing, and interpreting data in business contexts.

In an interconnected economy, the management of network applications becomes increasingly important. This course provides an overview of the basic networking management principles and concepts. Both theoretical knowledge and practical training in applications of network management (e.g. Cisco) are included.

In-depth study of information systems security in business organizations. Basic principles and functions of secure systems reviewed; management policy, plans and programs discussed.

This course introduces the fundamental concepts of information systems (IS) auditing. Topics include IS control and assurance, COBIT, business continuity planning, protection of information assets, auditing the network infrastructure, physical access exposures and controls, and disaster recovery management.

This course covers the essential project management skills to ensure successful implementation of high-technology projects. Topics include investment decisions, resource planning, budgeting, scheduling, outsourcing, and risk assessment and control, as major components of the PMBOK (Project Management Body of Knowledge).

Elective Courses (16 credits)

The design and analysis of encryption schemes, public-key cryptography, digital signatures, user authentication, data integrity, cryptographic protocols, public-key infrastructure, key management, systems security, network and Web security.

This course serves as an introduction to the concept of software security. The students will learn fundamental concepts on software security, security mechanisms in software and operating systems, secure coding guidelines and exploits, and advanced analysis techniques for security. Students will also have hands-on experience in deploying security attacks and analysis of real world security vulnerabilities.

This course provides students with fundamental concepts of how business organizations address cyber-attacks. The course delves into the concepts of incident management, incident classification and categorization, tools and techniques in managing incidents, procedures involved in managing key elements when developing a robust Incident Response Plan.

This course covers the fundamental principles and practices of protecting information assets of business organizations. Multiple aspects of protecting information assets of business organizations are covered. Students will gain a comprehensive understanding of auditing and evaluating business organizations in safeguarding information assets, ensuring data privacy and security, and managing risks associated with information systems in business organizations.

The course provides students with a comprehensive understanding of computer forensics and digital forensic investigation. Topics include fundamental principles of conducting digital forensics acquisition, investigation, collecting and preserving digital evidence, analysis of various kinds of digital evidence, tools and techniques to perform a complete forensic investigation, documenting a digital forensic investigation, case studies, as well as the latest trends of digital forensics.

In today’s digital landscape, understanding cybersecurity is crucial due to the rising complexity of cyber threats. This course equips IT management with practical frameworks for conducting cybersecurity assessments, including Security Risk Assessment and Audit (SRAA), penetration testing, and vulnerability scanning. Students will explore various assessment methodologies, learning when and how to apply them effectively. Through hands-on lab experiences, they will delve into techniques like network scanning, penetration test, web penetration tests, and develop skills to evaluate security assessments and create a comprehensive security assessment framework. Ultimately, this course aims to empower students to proactively identify and mitigate vulnerabilities, ensuring better protection of organizational assets and compliance with regulatory standards.

This course explores the essential concepts of the cloud ecosystem, such as various kinds of cloud service models, the threats of cloud infrastructures and developing a cloud security framework and techniques used to safeguard the cloud data and operations of business organizations.

This course offers a comprehensive overview of advanced network administration and security management. Students will explore key concepts and practices essential for effectively managing and securing modern network environments. Through a blend of theoretical knowledge and hands-on experience, participants will develop the skills necessary to navigate the complexities of network technologies and enhance organizational security. By the end of the course, students will be well-prepared for careers in network management and security.

This course provides students with frameworks, concepts, and background to understand the role of regulation, compliance and assurance in FinTech markets from both technology and business perspectives. The course will also examine the perspectives of government officials, investors, managers, and consumers in how they benefit from, guide, and influence the evolution of regulation and associated compliance activities.

This course provides an overview of privacy management in the digital age. It covers the fundamental concepts and dimensions of privacy, the regulatory requirements, and various management tools to comply with data protection laws and meet public expectation. Through the analysis of privacy impacts on a number of new technologies such as artificial intelligence, blockchain, cloud, data analytics and their applications, students may learn how to respect individuals’ privacy when applying technologies.

Introduction to database management systems with emphasis on business applications. Technical and administrative considerations in database implementation. Students implement a business system using a commercial-off-the-shelf software package.

This course provides an overview of the main aspects of information systems (IS) development with a focus on defining/modeling the business requirements following the Unified Modeling Language (UML) standard. Major topics include use case modeling, object-oriented modeling, data flow and process diagramming, and the key management issues and methodologies in IS development.

The use of artificial intelligence (AI) becomes an emerging trend in various business areas and industries, as its power to transform operations, customer experiences, and management is exponential. Harnessing AI’s potential for competitive performance requires a new type of professionals, who understand how machine learning (ML) works, what they can deliver and how they can be applied into different business context. This course is intended to bridge the gap between the business strategy and technical how-to. Through lectures, case discussion, and experiments in real-world data sets, students will gain a broad understanding of ML and AI concepts, explore the state-of-art use cases of AI technology in business, identify new opportunities and potential risks brought by AI, and recognize how to effectively communicate with the data science and machine learning team.

This course discusses blockchain, also known as distributed ledger technology (DLT), and its business applications in the world of decentralized finance (DeFi). The course not only provide a basic understanding of blockchain/DLT, but students will also learn about different DeFi companies and able to develop their own DeFi business models after the program.

Advanced topics Information and Cyber Security Management. Topics vary with recent developments and current interest.