Management of Technology: Cybersecurity Management Badge
Program Summary
As cybersecurity threats intensify across industries, there is a growing need for leaders who can integrate technical expertise with strategic decision-making. Professionals with combined strengths in cybersecurity and technology management are uniquely positioned to drive innovation while protecting organizational assets.
The NYU M.S. in Management of Technology in collaboration with the M.S. in Cybersecurity program designated a fifteen (15) credit pathway in the Cybersecurity Management knowledge area. Students earn the Management of Technology: Cybersecurity Management badge by completing six (6) credits of designated Technology Management Tools courses and nine (9) credits of elective courses, from the Computer Science & Engineering department.
Technology Management Tools:
MG-GY 8213 Information Security for Managers
MG-GY 8363 Fundamentals of Information Security Management (Prior: MG-GY 9753 SELECTED TOPICS IN MANAGEMENT: Fundamentals of Information Security)
Electives:
CS-GY6813 Information, Security and Privacy
CS-GY6843 Computer Networking
CS-GY6823 Network Security
Outcomes/Objectives
Students will develop the ability to:
Approach cybersecurity management through an interdisciplinary lens, combining technical insight with strategic thinking.
Evaluate and implement security frameworks, policies, and controls aligned with organizational goals and regulatory requirements
Translate complex cybersecurity challenges into actionable business strategies that support innovation and resilience.
Earning Requirements
Graduate standing in MOT Online program only. Students must complete six (6) credits of designated Technology Management Tools courses and nine (9) credits of elective courses in Cybersecurity Management Knowledge Area, with a final letter grade of B or above in each course.
Program Duration
15 credit hours
*This is an NYU Tandon internal, co-curricular micro-badge credential.
Skills / Knowledge
- Cyber risk assessment
- Cybersecurity governance
- Information security
- Threat modeling
- Security frameworks
- Network security
- Regulatory compliance
- Incident response
- Data privacy
- Security policy development
- Risk-based decision-making
- Technology leadership