Skip Navigation. Apply Now Request Info. What You Will Do Appraise classic and contemporary theories, strategies, doctrines, and procedures related to the causes, conduct, and termination of armed conflict and the maintenance of peace Assess and predict traditional and nontraditional threats to national and international security Compare the structures, functions, capabilities, and activities of national and international security community members Conduct advanced research and compose professional and academic analyses on issues critical to national and international security.
Degree at a Glance Number of Credits. Cost Per Credit. Courses Start Monthly. Students must choose a concentration for this degree program: Terrorism Studies 12 semester hours. Objectives: Upon successful completion of this concentration, the student will be able to: Appraise the causes of and threats from domestic and international terrorism and the organizations, capabilities, and activities of the international security community in the Global War on Terrorism.
Course ID: Academic Calendar View Syllabi. This course explores the threat of weapons of mass destruction WMD as a unique phenomenon within the homeland security landscape. Specifically, this course provides students with a historical perspective on the development and use of WMD from both an international and a domestic perspective. The course also explores the efforts to prevent, prepare, and respond to the use of WMDs. This course traces the history, emergence, and growth of domestic terrorist and extremist groups within the United States.
Students will assess various groups' intentions, capabilities, and activities within contexts of and ramifications on political, national security, and legal paradigms. This course will examine the evolution of intelligence and counterterrorism while analyzing a framework for combating terrorism.
This course will focus on terrorism variables that present a problem to international and U. In this course, your studies will focus on a variety of aspects related to terrorism, counterterrorism, to include historical perspectives, analysis of terrorist organizations, and patterns of terrorism.
You will be required to study a range of topics related to terrorism. You will read an arrangement of books and articles that will develop a comprehensive understanding of how counterterrorism impacts national security. This course will expose the students to a variety of counter-terrorism intelligence methodologies and analytic tools, and extensive academic, government, policy literature on the challenges, opportunities, and assumptions related to forecasting terrorism.
The course will provide students with the analytic capability to understand the types of terrorist threats that are most likely to confront the U. Students address specific individuals and groups as case studies in order to draw out the implications and principles associated with actual non-state military, terrorist, events and actions. Focus is on the individuals and cells that carry out the military and terrorist plans to further insurgencies and revolutions.
This course focuses on analyzing terror groups from a political psychological perspective. In particular, the course approaches terror groups from two different political psychological perspectives, individual and group processes. Together these two perspectives provide a solid foundation from which to understand terror groups. Cyber 12 semester hours. Objectives: Upon successful completion of this concentration, the student will be able to: Analyze the cyber discipline from a multidisciplinary perspective.
The global reach of the Internet, the low cost of online activity, and the relative anonymity of users has led to an increase in computer related crimes. This course focuses on cybercrime investigation and prevention; it appraises the legal issues related to on-line criminal conduct, the collection of electronic evidence, and the onslaught of new technology. This course also analyzes the phases, processes, and challenges of cybercrime investigations, and it examines technical, legal, and social issues relating to the search and seizure of digital evidence and computer forensics.
Students will encounter the challenges of the latency between technology and the law. This course is an advanced study of information ethics, cyber privacy, and intellectual property. The explosive growth of information technology, the increased competition in the global marketplace, and the surge in the use of information to protect society from terrorism has led to the unintended erosion of fundamental rights and values.
This course focuses on the ways that law, ethics and cybersecurity overlap and intersect. Besides laws related to cybersecurity, the course examines laws related to intellectual property, civil litigation, criminal prosecutions, and privacy. This examination will provide the means to identify and analyze the policies reflected in those laws. Those policies could guide the creation of policies on a business-level, using qualitative risk assessment and planning. An exploration of ethics and cybersecurity, as well as of workplace ethics, will involve the use of an ethical framework.
This course will provide an overview of current cyber policy and strategy for non-practitioners in a national security framework.
Students will study the cyber threat environment; laws and policies that govern cyber security; current and historical structure, functions, and capabilities of private and governmental agencies comprising the cyber community; and future trends that affect national security.
Homeland Security 12 semester hours. Objectives: Upon successful completion of this concentration, the student will be able to: Appraise the contemporary threats to the United States; and the organizations, capabilities, and activities of the national defense community.
This course covers the development of the drug cartels and their organization, production, and distribution networks. This course will focus on the regions known as the Golden Triangle and Golden Crescent, and the drugs that are typically manufactured and transported from these areas. This course also provides an overview of U. Additionally this course provides an historical overview of drug trafficking including a focus on the opium wars in China.
This overview will have students examining, discussing and analyzing homeland security operational and policy concerns which have continued to evolve in the wake of the terrorist attacks of September 11, and the creation of the Department of Homeland Security. This course introduces students to risk management components including plans and strategies to mitigate risk. Students in this course will examine the role of risk management at the strategic and enterprise levels in the prevention of loss and mitigation of consequences through risk identification and control.
This course will allow students to develop and apply risk management techniques to include selection of risk management measures and implementation of those measures. This course examines intelligence community responses to threats to the U. Threats to the U. Security and Intelligence Analysis 12 semester hours. Objectives: Upon successful completion of this concentration, the student will be able to: Apply advanced security and intelligence analysis methods in composing professional and academic analyses on issues critical to national and international security.
This course examines the current structure, function, capabilities, and contributions of individual U. Students appraise the intelligence cycle by an overview of the intelligence planning, collection, exploitation, analysis, production, and dissemination phases. The course also evaluates the intelligence oversight system, the restrictions on national intelligence community activities prescribed by federal law, executive and agency directives. This course is a study of intelligence collection and information gathering.
It focuses on a variety of aspects related to how both the United States and foreign nations gather and process intelligence. The student will develop a comprehensive understanding of the role collection plays in the intelligence community, how various policies affect collection, and how different intelligence agencies monitor and collect intelligence.
This course provides an introduction to the theory and practice of intelligence operations. The course will focus on the intelligence resources necessary to carry out the full range of intelligence operations using the tools, techniques, and resources available to intelligence agencies. This prestigious degree The main objective is the training of professionals in the analysis, decision-making and management of phenomena related to the risk society, with special exhaustiveness in th Norwich University's online Master of Arts in International Relations program explores diverse worldviews and the intricacies of foreign relations to prepare students for care List your programs.
Master Degrees. Masters of Science. Masters of Arts. Student Resources. See Results. Other options within this field of study:.
Master of Arts in National Security Studies. Read More. Taught in English over one year from September through August, the International Graduate Program in National Security Studies is designed for students and professionals who are seriously interested in the field of national security in the broadest sense of the term.
Master of Professional Studies in Homeland Security. Designed to prepare working professionals with experience in fields including law enforcement, emergency management, corporate security, public safety, public health preparedness and the military for future leadership positions, the program is taught by acknowledged experts who draw upon their firsthand practical knowledge and strategic expertise.
Master in Defense and Security Systems Development. Criminal Justice College of Liberal Arts. Main Content. Master of Intelligence and National Security Studies. Admission Requirements: Completion and submission of a graduate admissions application.
Click here to be directed to the Graduate School website. Submission of official transcripts in accordance with the requirements of the Graduate School. This requirement is waived if the student already possesses an accredited graduate degree. A brief statement of purpose pages that addresses educational and career goals and reasons for pursuing the MS degree.
Three academic letters of recommendation from university faculty who can evaluate your ability to succeed in a rigorous graduate program. Letters of recommendation from employers or work supervisors are acceptable for applicants who have been out of school for five years or more.
Admission Requirements for Graduate Certificates: Completion and submission of a graduate admissions application. In most circumstances, a minimum undergraduate GPA of 2. Requirements Five courses 15 semester credit hours are required of all students. The Master of Science in Intelligence and National Security Studies is designed primarily to prepare students for careers as intelligence professionals, particularly analytical positions.
Our students are also well prepared to work in related areas such as intelligence operations and support. Some of our students also find work in law enforcement and homeland security, as well in the private sector as security professionals. You must take INSS first. The internship course must be completed at the same time you are taking your internship. Additional course work will be required. Begin the process by contacting Dr. Stacie Ordonez at: saordonez utep. Classes are offered in a variety of times online, early afternoon, late afternoon, evenings.
Required courses are offered only ONCE per year, so students should take all required courses as soon as they available. The list of elective course choices are long, so we try to rotate and offer an elective course once every years.
0コメント