Archive | MS in Management of Secure Information Systems RSS feed for this section

Why America Needs Graduates with a Cyber Security Degree

September 3, 2014

0 Comments

The need to protect our personal information and for companies to protect themselves and their customers has grown exponentially. The same can be said for the U.S. government. Cyber security protection has become a vital component of national security. This means the need for professionals with a cyber security degree has increased, and will continue […]

Continue reading...

Consumer Electronics Show To Be “Classroom”

August 10, 2014

0 Comments

Students to Learn First-Hand about Emerging Technologies and Business Models Imagine starting your graduate program with an immersion into a range of emerging technologies exhibited in 2 million square feet of space, hosted by more than 3,600 global companies, and including approximately 20,000 new product announcements. This is how the incoming MS in Technology Management […]

Continue reading...

Am I a good candidate for a Cyber Security Masters?

June 24, 2014

1 Comment

Are you a technology professional? Looking to hone your leadership skills? Then maybe you are a good candidate for a cyber security masters program. George Mason University’s MS in Management of Secure Information Systems, our cyber security masters program, provides you with the leadership and management expertise you need while addressing the specific technology and […]

Continue reading...

Cyber Security Degree Salary Expectations

June 3, 2014

0 Comments

Demand for cyber security professionals has been 3.5 times greater than that for other IT positions, and 12 times greater than other jobs. CNN Money’s website listed cyber security in the top 10 ten “Best Jobs” in the US. Innovators and entrepreneurs in the cyber security field will also find a wealth of opportunity. In […]

Continue reading...

Alumni Profile: Ashley Pyles ’13

May 27, 2014

0 Comments

Speak Geek: Alumna Perfects Communication Skills in Cybersecurity Program Asymmetric Warfare. AES. Polymorphism. Malware. APT. Non-repudiation. Deprecated. To many, these words or acronyms could be a foreign language, but in fact, they are cyber security terms that float through the industry. Discussions about cybersecurity often focus on the importance of protecting against cyber-attacks, but another […]

Continue reading...