Program Overview

The MS in Cybersecurity program develops professionals capable of defending modern organizations against sophisticated cyber threats. The curriculum integrates technical depth in areas such as secure systems architecture, cloud security, incident response, applied cryptography, and automation with strategic perspectives on governance, risk management, law, and ethics. Graduates are prepared to design secure systems, lead security initiatives, and shape organizational security posture across technical and executive contexts.

Program Highlights

  • Fully online and flexible for working professionals
  • Balanced technical, governance, and risk-focused curriculum
  • Strong emphasis on scripting and automation (Python, Bash, PowerShell)
  • Coverage of cloud security, AI/ML security, ICS/IoT, and post-quantum cryptography
  • Individual applied capstone project integrating technical and strategic skills
  • Curriculum aligned with NIST frameworks, CISSP domains, and ABET-style outcomes

Curriculum

Core Courses (7 courses)

CYB601

Foundations of Cybersecurity

3 credits

Core principles of cybersecurity, threat models, security foundations, and professional communication.

View Syllabus
CYB602

Cloud Security Architecture & Operations

3 credits

Security architecture, shared responsibility models, and operational security across major cloud platforms.

View Syllabus
CYB603

Cyber Governance, Risk, Law & Ethics

3 credits

Organizational cybersecurity governance, risk assessment, legal frameworks, and ethical responsibilities.

View Syllabus
CYB604

Secure Software & Automation for Cybersecurity

3 credits

Secure coding principles and automation using Python, Bash, and PowerShell.

View Syllabus
CYB605

Security Operations, Monitoring & Incident Response

3 credits

Security operations center design, detection, and structured incident response.

View Syllabus
CYB606

Secure Systems & Network Architecture

3 credits

Design and evaluation of secure systems and network architectures.

View Syllabus
CYB607

Applied Cryptography & Data Protection

3 credits

Applied cryptography, key management, data protection, and post-quantum cryptography.

View Syllabus

Capstone (1 course)

CYB690

Applied Cybersecurity Capstone

3 credits

Individual, student-proposed applied cybersecurity project integrating technical and governance competencies.

Elective Specializations

Students complete one 6-credit specialization (two courses).

Offensive Security & Penetration Testing (2 courses)

  • Advanced Penetration Testing & Red Teaming
  • Vulnerability Research & Exploit Development

Cyber-Physical Systems, ICS & IoT Security (2 courses)

  • Industrial Control Systems (ICS) Security
  • IoT & Embedded Systems Security

Privacy, Compliance & Cyber Law (2 courses)

  • Advanced Privacy Engineering & Regulation
  • Advanced Cyber Law, Compliance & Investigations

Secure Software Engineering (2 courses)

  • Advanced Secure Software Design
  • Software Supply Chain & DevSecOps Security

AI / ML Security (2 courses)

  • AI / ML Security in Organizations
  • Adversarial Machine Learning & Model Risk

Career Outcomes

  • Cybersecurity Analyst / Engineer
  • Security Architect
  • Penetration Tester / Red Team Analyst
  • Security Operations or Incident Response Lead
  • GRC or Compliance Specialist
  • Cloud or DevSecOps Security Engineer
  • AI Security or Model Risk Analyst

Program Learning Outcomes

Upon successful completion of this program, graduates will be able to:

  1. PLO1: Analyze complex cybersecurity problems and apply appropriate principles, tools, and frameworks to identify defensible solutions.
    • Threat Modeling
    • Risk Analysis
    • Security Frameworks (NIST, ISO)
  2. PLO2: Design, implement, and evaluate secure computing systems, networks, cloud architectures, and software solutions.
    • Systems Architecture
    • Cloud Security
    • Secure Software Design
  3. PLO3: Apply cybersecurity principles across operational, governance, and compliance environments.
    • Security Operations
    • Governance, Risk, and Compliance
    • Privacy and Regulatory Frameworks
  4. PLO4: Communicate cybersecurity risks, findings, and recommendations effectively to technical and non-technical stakeholders.
    • Incident Reporting
    • Executive Communication
    • Policy Development
  5. PLO5: Apply ethical, legal, and professional standards in cybersecurity decision-making.
    • Cyber Law
    • Ethics
    • Responsible Disclosure
  6. PLO6: Demonstrate proficiency in scripting and automation to support cybersecurity analysis and operations.
    • Python Automation
    • Bash and PowerShell
    • Security Tool Integration
  7. PLO7: Evaluate emerging technologies and evolving threat landscapes, including cloud, AI/ML systems, and post-quantum cryptography.
    • AI / ML Security
    • Post-Quantum Cryptography
    • Cloud Security

Admission Requirements

Required

  • Bachelor's degree from an accredited institution
  • Minimum 3.0 GPA (or equivalent professional experience)
  • Statement of purpose
  • Resume/CV

Preferred Qualifications

  • Background in IT, computer science, business, or risk management
  • Professional experience in IT or cybersecurity roles
  • Industry certifications (Security+, Network+, CISSP, cloud certifications)

Prerequisites

  • Applicants without sufficient technical background may be required to complete prerequisite coursework.
  • Prerequisites may be waived based on examination or documented work experience.