"Global demand for cyber security or information security professionals/managers are on the rise as there is an increasing need to protect organisations (and individuals) against the growing threats from cyber-attacks. This course intends to provide students with the concepts of cyber security and the pertinent skills to help protect businesses against such malicious attacks. The course is structured around two main areas: (1) Information Security & Crisis Management and (2) Cyber-Security Implementation. A comprehensive understanding of cybersecurity is critical to any business in this era of hyper-connectivity or digital business world. This course will bring students along the cybersecurity ecosystem, allowing them to get glimpses into network security, application security, cloud security and computer security"
The MBM in Cyber Security is one of the specialisations in our Master of Business Management (MSc) programme offered at Wittenborg University of Applied Sciences to full-time and part time students, with a 'tech' background, from the Netherlands and around the World. This programme is fully taught in English and will introduce students to the job market and prospective employers.
This specialisation is aimed at exposing students to this fast-growing and exciting immersion into the world of Cyber Security, while emphasising the role digital risks and security plays in business operations. The curriculum is devised to equip students with the skills, knowledge and experience to manage the security complexities of an digitally-driven business world and to improve business process efficiency and effectiveness.
With an MBM in Cyber Security, you will lead teams to the frontlines of technological development, all while keeping track of profitability and economic sustainability. In shaping tomorrow’s businesses. The course is built around theory as well as tools and techniques to solve concrete with varied constraints or voluminous data. Through case studies, guest lectures, and group projects, you’ll be immersed in a world which will help you to upgrade your competencies and skills In this area.
We welcome students with an academic background in science and technology to apply for this programme. Having a background in business or management is not a prerequisite for admission. This programme is modular in nature, with the first semester designed to equip you with the foundations in management, providing the tools you require to specialise further in the MBM in Cyber Security programme.
- Globalisation, Society & Culture
- Marketing Management
- Research Methods Introduction (Final Project)
- Micro Economics - Global Perspectives
- Professional Inquiry
- Ethics in the Digital Technologies
- Cyber Security in Integrated Autonomous Business Operations
- Research Methods (Final Project)
- The World Economy
- Financial & Strategic Management
- Project Module (3 Project Weeks, linked to Final Project)
- Cyber Security Application & Implementation
- Digital Security & Crisis Management
Semester 3 (Work Placement & Graduation)
- Professional-Based Learning
- Final Project
The master's programme is delivered in a 'block format', with 2 modules being covered every 6 weeks. Core module classes are inter-disciplinary - you study shared modules with master's students from different business management specialisations. Due to the rolling entry (6 times a year), groups are dynamic, extremely international and diverse.
The modules are delivered intensively over consecutive days in the block format, which means that each module has 6 days of teaching split into two blocks of 3 days. Teaching methods include group work, case studies, presentations, and live projects. The course is delivered through a variety of approaches including lectures, presentations, tutorials and case studies, with an emphasis on interactive learning. Each module is taught by two lecturers, often a full-time Wittenborg lecturer and a guest lecturer from a partner university. Modules include regular guest speakers from industry.
The cybersecurity industry is focused on protecting computers, servers, mobile devices, electronic systems, networks, and data from digital attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.
The industry includes a wide range of practices, technologies, and solutions designed to protect networks, devices, programs, and data from attacks or unauthorized access. Here are some of the main components:
1. Network Security: Protects the integrity and usability of network and data by preventing unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure.
2. Information Security (InfoSec): Focuses on protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
3. Endpoint Security: Protects corporate networks when accessed via remote devices like laptops or other wireless devices. It includes monitoring status, activities, software, authorization and authentication.
4. Cloud Security: A sub-domain of computer security specifically involved with securing cloud computing systems, and the data stored in them.
5. Internet of Things (IoT) Security: This is about defending internet-enabled devices that connect to each other (IoT), such as smart home devices, wearables, and industrial sensors, from potential cyber threats.
6. Cybersecurity Software Tools: These are software solutions that help detect, prevent and mitigate cyber attacks. Examples include firewalls, antivirus software, and encryption tools.
7. Incident Management and Cyber Threat Intelligence: This involves identifying, investigating, and responding to potential security incidents. Cyber Threat Intelligence focuses on understanding sophisticated cyber threats and the actors behind them.
8. Regulatory Compliance: Given the sensitivity of data, various regulations have been put in place to ensure that companies follow best practices in securing data, such as GDPR in the European Union.
Cybersecurity is a rapidly evolving field, with new threats appearing and new solutions being developed constantly. As such, the industry is growing at a fast pace, with demand for cybersecurity professionals expected to continue outpacing supply for some time. This makes cybersecurity a highly attractive field for job seekers with the necessary skills.
Jobs in the cybersecurity industry range from ethical hackers, who test and penetrate networks to discover vulnerabilities, to Chief Information Security Officers (CISOs), who oversee all aspects of an organization's information security. Other roles include security analysts, security engineers, and information security auditors. There is also a growing need for legal and regulatory experts in cybersecurity, as well as professionals who can combine knowledge of cybersecurity with specific industry knowledge, like healthcare or finance.
An MBM graduate specialising in Cyber Security can leverage their dual understanding of business strategy and information security to pursue a wide variety of roles within organizations. As virtually all businesses today are increasingly dependent on digital processes, cybersecurity is a critical concern across industries.
Here are some of the career prospects:
1. Chief Information Security Officer (CISO): This is a senior-level role responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected.
2. Information Security Manager: This role oversees the company's information security program, including managing staff and budgets, establishing security policies and standards, and working with other managers to ensure security is integrated into all projects and processes.
3. Cybersecurity Consultant: Consultants provide expert guidance to organizations that need help protecting their data and digital assets. This could involve assessing current security measures, recommending solutions, and helping to implement and manage security technologies.
4. Risk and Compliance Manager: This role involves overseeing the company's compliance with security standards, laws, and regulations. This could involve conducting audits, identifying potential vulnerabilities, and working with other teams to ensure compliance.
5. Business Continuity Planner: This role involves planning for potential threats and disruptions to business operations. This includes identifying potential risks, from cyberattacks to natural disasters, and developing plans to minimize the impact of such events.
6. Cybersecurity Sales and Marketing: If you have a knack for business development, you can work in sales and marketing roles for cybersecurity products and services. In this role, you would leverage your cybersecurity knowledge to effectively communicate the value proposition of these products or services.
7. Cybersecurity Product Manager: You could work as a product manager, overseeing the development of new cybersecurity products. This would involve coordinating with technical teams, understanding market needs, and guiding the product development process.
An MBA focusing on cybersecurity can also provide a stepping stone to broader roles in IT management or strategic roles in technology-focused companies. Moreover, given the increasing importance of cybersecurity across industries, this specialization can provide a significant advantage for a variety of other roles, from general management to consulting to entrepreneurship.
The admission requirements (criteria) for the Master of Business Management programmes (all specialisations) are as follows:
- A bachelor's degree or equivalent recognised qualification.
- Applicants are requested to provide an academic reference from their previous education institute.
- It is necessary to have obtained a bachelor's degree from the domains of business management, economics or trade. In their bachelor's degree, applicants must have completed an academic piece of work (final project or dissertation) that demonstrates a degree of academic writing and research experience.
- No professional experience is required for these master's programmes.
English Language Requirements
IELTS 6.5 or TOEFL equivalent. Click here for an overview of the equivalent scores.
The TOEFL Code of Wittenborg is 4889.
The English language proficiency level requirement is ½ a point higher than the minimum national requirements in the Netherlands.
There is no specific selection criteria for students wishing to enter the master's programmes at WUAS; however, all students are interviewed and must demonstrate motivation. Students will be advised of their suitability prior to signing an initial study agreement as a pre-requisite to obtaining admission (offer letter).
Non-EU students requiring sponsored visa for study
Non-EU (visa) students are “screened” according to their background, in order for the institute to be able to guarantee their immigration status.
The screening comprises an interview, collection and correlation of all IND-required documents, including proof of sufficient funds, taking into account any scholarships provided by Wittenborg (Orange Tulip Scholarship, for instance) or by third parties (NUFFIC, EU, etc).
Details on scholarships at Wittenborg can be found at http://www.wittenborg.eu/wittenborg-financial-assistance.htm.
Applicants are required to provide a motivation letter in which they describe the reasons for choosing Wittenborg’s programme, as well as the reason for wanting to study in the Netherlands (international students). Student motivation is important as the programmes are demanding and, especially for international students, there is a criteria that they complete at least 50% of all their credits in a year.
Apply / Information Request
Fill in the Information Request Form to get more information about our programmes and admissions process. You can also send an email to email@example.com, and one of our team members will reply to you as soon as possible.
If you wish us to call you back, then simply send an email to firstname.lastname@example.org with your phone number and preferred time.
A member of our Admissions Team will call you back soon during our office opening hours, which is Monday-Friday 08:30-17:30, Dutch time.
If you which to directly start you application online, then please follow the steps on this page and complete the form. All necessary application documents can be downloaded on the same page, and scanned copies can easily be uploaded before submitting the form. Alternatively, you can also send your application documents by email to email@example.com.