Master of Science in Cybersecurity
School of Cybersecurity and Digital Sciences
Now Accepting ApplicationsProgram Overview
The MS in Cybersecurity program develops professionals capable of defending modern organizations against sophisticated cyber threats. The curriculum integrates technical depth in areas such as secure systems architecture, cloud security, incident response, applied cryptography, and automation with strategic perspectives on governance, risk management, law, and ethics. Graduates are prepared to design secure systems, lead security initiatives, and shape organizational security posture across technical and executive contexts.
Program Highlights
- Fully online and flexible for working professionals
- Balanced technical, governance, and risk-focused curriculum
- Strong emphasis on scripting and automation (Python, Bash, PowerShell)
- Coverage of cloud security, AI/ML security, ICS/IoT, and post-quantum cryptography
- Individual applied capstone project integrating technical and strategic skills
- Curriculum aligned with NIST frameworks, CISSP domains, and ABET-style outcomes
Curriculum
Core Courses (7 courses)
Foundations of Cybersecurity
3 creditsCore principles of cybersecurity, threat models, security foundations, and professional communication.
View SyllabusCloud Security Architecture & Operations
3 creditsSecurity architecture, shared responsibility models, and operational security across major cloud platforms.
View SyllabusCyber Governance, Risk, Law & Ethics
3 creditsOrganizational cybersecurity governance, risk assessment, legal frameworks, and ethical responsibilities.
View SyllabusSecure Software & Automation for Cybersecurity
3 creditsSecure coding principles and automation using Python, Bash, and PowerShell.
View SyllabusSecurity Operations, Monitoring & Incident Response
3 creditsSecurity operations center design, detection, and structured incident response.
View SyllabusSecure Systems & Network Architecture
3 creditsDesign and evaluation of secure systems and network architectures.
View SyllabusApplied Cryptography & Data Protection
3 creditsApplied cryptography, key management, data protection, and post-quantum cryptography.
View SyllabusCapstone (1 course)
Applied Cybersecurity Capstone
3 creditsIndividual, student-proposed applied cybersecurity project integrating technical and governance competencies.
Elective Specializations
Students complete one 6-credit specialization (two courses).
Offensive Security & Penetration Testing (2 courses)
- Advanced Penetration Testing & Red Teaming
- Vulnerability Research & Exploit Development
Cyber-Physical Systems, ICS & IoT Security (2 courses)
- Industrial Control Systems (ICS) Security
- IoT & Embedded Systems Security
Privacy, Compliance & Cyber Law (2 courses)
- Advanced Privacy Engineering & Regulation
- Advanced Cyber Law, Compliance & Investigations
Secure Software Engineering (2 courses)
- Advanced Secure Software Design
- Software Supply Chain & DevSecOps Security
AI / ML Security (2 courses)
- AI / ML Security in Organizations
- Adversarial Machine Learning & Model Risk
Career Outcomes
- Cybersecurity Analyst / Engineer
- Security Architect
- Penetration Tester / Red Team Analyst
- Security Operations or Incident Response Lead
- GRC or Compliance Specialist
- Cloud or DevSecOps Security Engineer
- AI Security or Model Risk Analyst
Program Learning Outcomes
Upon successful completion of this program, graduates will be able to:
-
PLO1: Analyze complex cybersecurity problems and apply appropriate principles, tools, and frameworks to identify defensible solutions.
- Threat Modeling
- Risk Analysis
- Security Frameworks (NIST, ISO)
-
PLO2: Design, implement, and evaluate secure computing systems, networks, cloud architectures, and software solutions.
- Systems Architecture
- Cloud Security
- Secure Software Design
-
PLO3: Apply cybersecurity principles across operational, governance, and compliance environments.
- Security Operations
- Governance, Risk, and Compliance
- Privacy and Regulatory Frameworks
-
PLO4: Communicate cybersecurity risks, findings, and recommendations effectively to technical and non-technical stakeholders.
- Incident Reporting
- Executive Communication
- Policy Development
-
PLO5: Apply ethical, legal, and professional standards in cybersecurity decision-making.
- Cyber Law
- Ethics
- Responsible Disclosure
-
PLO6: Demonstrate proficiency in scripting and automation to support cybersecurity analysis and operations.
- Python Automation
- Bash and PowerShell
- Security Tool Integration
-
PLO7: Evaluate emerging technologies and evolving threat landscapes, including cloud, AI/ML systems, and post-quantum cryptography.
- AI / ML Security
- Post-Quantum Cryptography
- Cloud Security
Admission Requirements
Required
- Bachelor's degree from an accredited institution
- Minimum 3.0 GPA (or equivalent professional experience)
- Statement of purpose
- Resume/CV
Preferred Qualifications
- Background in IT, computer science, business, or risk management
- Professional experience in IT or cybersecurity roles
- Industry certifications (Security+, Network+, CISSP, cloud certifications)
Prerequisites
- Applicants without sufficient technical background may be required to complete prerequisite coursework.
- Prerequisites may be waived based on examination or documented work experience.