Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Class Act

By Bill Zalud
June 1, 2007
Professor Greg Allen of Bellevue University sees diversity and the growth of technology as two areas that have changed the security profession and impacted degree programs.


From day one, people have had a fascination with the causes and the prevention of crime. Theories have come and gone, and some have come back again and again.
   
Italy’s Cesare Lombroso, influential in the 19th Century, dissed the so-called Classical School, which believed crime was just part of human nature. Lombroso’s theory: criminality was inherited. A person “born criminal” could be IDed by physical defects. Welcome to phrenology, in which people and the police would study bumps on a person’s head to identify a criminal.



While degree students have myriad reasons for attending class, all share a commitment to improve the profession and their service to it. Pictured: Chuck Thiele; Lt. Debra Johnson, retired, California Department of Corrections; Professor Greg Allen; and Gordon Brown, training officer, Douglas County Youth Center.

There have been a lot of other bumps. But we’ve come a long way, with scores of U.S. colleges and universities now offering degree programs in criminal justice, security management, loss prevention and information assurance, to name a few. The greatest number of programs center on criminal justice to reflect the employment areas of interest to graduates.
   
Still the fastest growth centers on programs about security management, homeland security and computer security.
   
Security Magazine, with the help of industry research firm Maddry Associates,  sent inquiries to more than three hundred educational institutions to determine if they offer security degree programs in the related areas of criminal justice and security management. The chart, part of this cover article, is not intended to be a complete listing. If you know of a college or university that should be listed, please e-mail the information to Security Magazine’s Editor at zaludb@bnpmedia.com.

But there is no doubt that more institutions offer bachelor, masters, doctorate
and specialized certificates in security and criminal justice.
   
One example of degree growth is Bellevue University. When the Omaha-based institution first started offering degree programs in security management, it was one of only a handful of colleges offering such programs to a limited number of students.  Today Bellevue University has more than 650 students enrolled in its diverse programs.
   
Professor Greg Allen, director of the security management program at Bellevue, teaches many of those enrolled in the two undergraduate and four graduate degree programs in the areas of security management, information security management, computer information systems with a concentration in security and the college’s most recent security degree program,
investigations.
   
Unusual for some instructors, Allen has 25 years of law enforcement and private security experience prior to joining Bellevue University.
   
Many of the degree programs listed are developed for individuals already working in the security industry. Most often master's degree programs emphasize a leadership style and expertise.

Program attendance varies but so do the types of students who enroll in security management, criminal justice and homeland security degree programs.

A Total Package

“It’s important to look for a program that goes full circle. Risk analysis, security methods, security management, ethics, fundamentals of homeland security, issues in security management,” Allen said. Graduate program are even more in depth. “We see many second career people,” he added. Some individuals enter into criminal justice, security management and homeland security degree programs because their employer requires it for a job or for a promotion.
   
“We also see security directors in our programs,” he said. “With a security management degree, there is increased visibility that only helps that person’s program and company relationships.”
   
At Bellevue and some other educational institutions, students have worked on projects that have impacted the industry and the nation.

For instance, as part of one class, Allen gave students the choice of writing individual papers or working as a class on a group project.  They chose the latter and for their project created a new U.S. Department of Homeland Security (DHS).  They used the current DHS strictly as a reference for statistical and budgetary information.  Then they organized their new department along a corporate strategy, focusing on a global mission. They researched, gleaned, debated, argued, battled and finally developed a new department.
   
“We sent the plan to Michael Chertoff, and have seen some of the recommendations enacted. I don’t know if one thing led to another, but it was encouraging to know the students were on the right track,” said Professor Allen.
   
In another project, master’s degree students designed and conducted a multi-jurisdictional tabletop exercise demonstration.  Here role players simulated key positions within an emergency operations center working to coordinate local emergency responders, make critical decisions and integrate external assets necessary to save lives and protect public health during the first 24-48 hours after the incident.  It was the results of this exercise that earned these students an invitation to present an advanced education seminar to attendees of last year’s ASIS International in San Diego.  The students were Robert Kizzire, Donald Crider, Michael McClellen, Michael Mulligan and Wes Latchford. Two of these students are currently in the military, another works in security for a defense contractor and the other two work in security for private corporations.

A number of institutions offer degree programs in criminal justice, security management and security administration. This chart is based on a survey of colleges and universities that have responded. It is not intended to be a complete listing. If you know of a program that should be listed, e-mail zaludb@bnpmedia.com and the editors will add confirmed information to the Security Magazine Web listing.

There are other trends identified in the Security Magazine research, including  growth of degree programs in homeland security, information systems security and public security.
   
At Texas A&M, for example, there’s a wide range of courses that help advance a student’s knowledge of homeland security issues. It is developing a master's degree program in homeland security to encompass myriad areas including agriculture, public health, urban planning and many others.
   
At Northwestern University, the going-forward emphasis is on information systems security management. Program developers there said that what is emerging is a “multi-faceted individual” combining risk manager, security strategist and technologist, who can also interact with physical security.
   
At Rutgers University, the Center for the Study of Public Security offers a multi-disciplinary approach bringing together terrorism, policing, globalization, Constitutional rights, law, environmental safety, business and public health.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • RFID: The 'Almost Everything' Tool

    RFID: The 'Almost Everything' Tool

    See More
  • Rx for Secure Healthcare Access

    Finding the Right Prescription for Secure Healthcare Access Control

    See More
  • Passengers purchase the RFID bag tags which provide convenience and unique services for passengers as well as operations data for airlines.

    Just How Versatile is RFID Technology?

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!